Friday, February 27, 2015

Chrome adds a warning against malicious software – Wired.it

A new warning before access to the site and new policies in research and in Ads: The Big G well fronting the sites that encourage the download wild

 alert

For now Google is hard line. Block of sex and nudity on Blogger, and now war on malicious software . The novelty is a warning (pretty clear, as evidenced by the picture) that will appear to users of Chrome every time you will find in front of a site that encourages downloading unwanted software. Of those that push those who visit them to download any software, and to “entice” the opening before 5 windows with proposals of any kind.

The new measure is added Google to the previous one, namely ‘notice before allowing the download of software from particular sites.

It’s not all: Changes to Google Search reduce the chances of being in front of these sites, at least between the results of search. Same attitude towards Ads: We recently started to disable the Google ads that lead to sites with unwanted software “, says the official note.

Enter your email -> -> Follow



LikeTweet

Darkleaks, the black market for secret information, movies and software – Wired.it

Who is behind Zozan Cudi, the young fighter anti Isis? Certainly a good developer who has crossed the blockchain and platforms whistleblowing to launch an anonymous market where exchange a bit ‘of everything. Maybe even the identity of some terrorist

The woman is Kurdish. It is a guerrilla fighting against Isis. And is the name to get to Darkleaks, a black market where electronic usurps any kind of secret. you say it is the engineer who developed the software, but his twitter profile, @ zozancudi , could be bogus. Behind us was a former Google engineer who already helps OpenBazaar.
Software Darkleaks, which of course is Github , along with Slashdot the largest store in the world of software projects, is steadily improving, but already works, with the goal of allowing anyone to buy and sell state secrets, commercial information, even Hollywood movies before distribution.

Screenshot from 25.02.2015 18_41_51

The news, almost a Launch without making too much noise, but able to get to those who have to get, was published by medium.com, the self-publishing site created by Evan Williams of Twitter to make room for quality content longer than 140 characters. With a little ‘patience by post (it’s called just that, not “article”), it goes back to the software and its contributors and you find that Zozan Cudi is only the author of the article that talks about Darkleaks and Zozan, beautiful girl in uniform on Twitter, is a sniper Rojava, a body communist militant Kurdish always close to the positions of Abdullah Ocalan, the historic leader of the PKK, the Kurdistan Workers Communist Party.

darkleaks_2015-02-25 11_56_18

What is actually the software Darkleaks? Simply is used to buy and sell information anonymously, and no one can stop it . He does bitcoin and using the same technology that has given his statement as criptomoneta, the “block chain”. The block chain is in fact a public register and shared that keeps track of all transactions relating to payments made by the bitcoin, but can be used to do other things, how to build a black market and distributed equally. So the bitcoin block chain – electronic money whose creation in 2009 has been attributed to Satoshi Nakamoto , collective pseudonym of a group of cypherpunks -, has not only solved the problem of double payment to the its appearance prevented the spread of criptomonete, but can serve other purposes, such as those of Darkleaks.

comefunziona_darkleaks

In summary Darkleaks allows trading confidential information based on a mechanism of authentication of documents via blockchain, sold through a particular mechanism cryptographic . The authentication of documents is “acceptable”, and “provable”, according to the creators. Before you pay for the file, some random pieces of paper are released publicly to show that the content of the file is what it claims to be the seller, who can be a leaker, a mole, an official tired of robberies, a clerk subject of bullying, a reporter watched that have identified Darkleaks a tool to blurt out everything to everyone and make profit on it.

The program then uses the technology of Bitcoin to encrypt files that are released in full only when the seller receives payment. In fact, the files are divided into segments and encrypted, and can be fully decrypted with the proper encryption key only after its sale by the leaker once it has been paid. No identity, no operator, no interaction between the leaker and the buyers.

At this point it is interesting to understand who are the authors of the software and what their motives. One option is the statements made by Zozan Cudi who say “we gave the world a new system to sell any kind of information and it is our gift against corruption and power.” But what are these secrets be placed on the market? Commercial and government secrets, patents and industrial designs, pharmaceutical and military projects, software codes with their vulnerability, corporate databases, evidence of corruption and extreme sex of politicians and celebrities. In short, just that information floating in the dark web, well below the tip of the iceberg of the Internet surface that we use every day to browse, search, communicate with the social network. Just try it. Code, to see if it works, is right here.

Thursday, February 26, 2015

Attendance, discussion jumps because of the new software – Primonumero.it

->


02/26/2015 – Attendance fees, discussion jumps because of the new software

Council / 2 Termoli. The technology in the town of Termoli is haywire, and the new software for data management and electronic services continues to cause problems. Due to a mixup electronic, in fact, jumped in the City Council Thursday night the debate on the motion presented by Paolo Marinucci (LiberaTermoli) that aims to drastically reduce the amount allocated to pay the fees, the money saved and destined to social emergencies in the interests of citizens.
The motion, back topical these days with the “scandal” of 30 euro for each counselor even if fees jump to lack of quorum or last just long of a reference, should have been put to the vote but the document sent regularly by Marinucci through certified mail never arrived Protocol Office. President Manuela Vigilante admitted it after verification “technique”, explaining that despite having been sent by the adviser, is not the scanned document to the system protocol. In practice it was not possible to do anything because of the telematics system which apparently got crazy. All postponed to the next City Council.

->

LikeTweet

Wednesday, February 25, 2015

Lumia 535: new software update (OS and firmware … – HDblog (Blog)

A new software update dedicated to the Lumia 535 was recently spotted in a limited number of markets. News that could go unnoticed by the user perspective Italian – update is currently not available in our country over the air – were it not for the fact that Microsoft had confirmed in early February to be still working to solve the problem of the touchscreen smartphone.

Specifically, the new versions of the OS and firmware are:

  • OS: 8.10.14234.375
  •  

  • Firmware: 02060.00000 .15053. 24002/03 (the last group of four digits varies depending on the model)
  •  

There is still no confirmation that the new update is actually the resolving of the problems mentioned, but the change of firmware that brings with it bodes well. Specifically, the update, spotted, at the time, for the single SIM version distributed in Poland and for the Dual SIM marketed in Brazil .

It is possible that Microsoft is testing the new firmware in limited markets before proceeding to a full-scale deployment. Some users report the ability to proceed to download the firmware via the software Lumia Recovery Tool, which, however, shall fully restore the software on the phone (this option also may not exist to the same extent for all variants brand / name; brand of the Lumia 635).

LikeTweet

Tuesday, February 24, 2015

The hidden software Lenovo reveals questionable practices of the industry … – TechWeekEurope

Lenovo had publicly apologize for having installed a software company Superfish on a number of personal computers for the public consumer. It has put in place “all possible measures to help users to solve problems related to Superfish” . But the Chinese manufacturer number one PC had also used the services and expertise of McAfee and Microsoft to completely eradicate this adware, software particularly intrusive.

‘);}googletag.cmd.push(function(){googletag.display(“div-gpt-ad-DESKTOP_IN_ARTICLE-0″);});}})(jQuery);

LikeTweet

Apple acquires Camel Audio, the software development company in … – HDblog (Blog)

Apple may have absorbed the company creator of popular plug-ins and audio effects in music known as the Camel Audio , to bring the site MacRumors on the basis of the information found in the register of British companies. A first element to attract attention was the change of address updated 100 New Bridge Steet London, the same Apple in the capital. As further confirmation, the sole director of the company is now Apple’s lawyer, Heather Joy Morrison.

Camel Audio is known for its range of plug-ins, synthesizers, effects and sound libraries. Previously available for $ 249 and recently removed from the sale, the software produced by the company included over 5.5 GB in samples and sounds, a powerful synthesis engine spectral, a virtual analog synthesizer, and much more.

Camel Audio has closed its doors on January 8, 2015 eliminating all access to its software from the official website. Although the company has never disclosed the reason for this move, the news today seems to shed light on the matter.

LikeTweet

Monday, February 23, 2015

Zucchetti software between tradition and innovation – ChannelCity

The crisis of Italian companies is visible to everyone. hard to support their activities in a scenario that has gone year deteriorating. counts, however, the willingness to change, adaptability in a market that, beyond the economic and financial difficulties, it went quickly changing in most sectors of industry. However, there are areas of opportunity, there are conditions to create something different overcoming the traditional approach to the market.
Under IT company that has been able to interpret the change, innovating and diversifying its offerings, both for organic growth and through acquisitions, is Zucchetti. According to estimates released by the Group revenues in 2014 were 352 million euro, an increase compared to 2013 of + 9%.
Sales cross applications (CRM, DMS, Mobile Applications, Portal, Safety Solution, ZTravel, ZScheduling, ZTimesheet, Safety Solution) increased by 40%, BI solutions by 14.5%. Just as well the HR market, an increase of 10%, while core activities in ERP environment increased 7% Finally, in the last year have acquired more than 5000 new customers (+ 33%) recorded the acceleration in cloud services where customers have increased by over 50%.
committee-steering-section-primopiano.jpg

“The results of 2014 – notes Grioli Antonio, chairman of the steering committee Zucchetti – Zucchetti show that not only confirms a strong organic growth in traditional markets, namely software solutions for businesses and professionals, but also shows the first generator of new opportunities and new markets. Essentially confirms the growth in the offer traditional, but also the rise of new products targati Infinity and this double positive result is crucial for us because the Zucchetti wants to continue to be as solid Software Foundation, but at the same time aims to become the fastest, sophisticated and ambitious start-up of the software. “With regard to the increase
activations in software as a service in the ERP and human resources Grioli states that” the This is mainly in having invested in content applications. The customer does not buy cloud infrastructure, but the benefits that cloud can give him. “
Giorgio Mini, one of two vice Zucchetti, detects a change approach to IT by companies : “The customer does not use the technology only as a factor of cost reduction or improvement of business management, but considers a technology enabler for developing a competitive advantage, which can result in better customer service thanks to a CRM solution, the better and more timely understanding of the market and demand with business intelligence tools, digitizing processes with document management solutions and in particular the ability to work anywhere, any time with mobile applications. ”
should also be noted the ability to integrate Zucchetti in its ecosystem offer new technologies and companies . “The companies that become part of the Group, after the necessary integration with the products and services of our offer, usually grow more and better, says Alessandro Zucchetti, President of Gruppio. Is not always so in our market, where sometimes the acquisition of a product decreed decline. In Zucchetti, however, Longwave, a company specializing in networking services and video communications, has acquired 200 new customers; Macnil, which among other activities also deals with geolocation of corporate fleets in motion, has installed more than 22,000 devices. “

LikeTweet

Sunday, February 22, 2015

Wii U: software sales increased by 200% compared to 2013 – Eurogamer

During the meeting with investors that was held yesterday, the boss of Nintendo Satoru Iwata has revealed new financial details.

We learn, then, that sales of software Wii U for the April / September 2014 increased by 200% compared to the equivalent half year earlier, mainly due to the publication of Mario Kart 8 which took place in May. Although the console has seen an increase in sales, but there are no precise data about it.

Iwata also talked about the extraordinary success of New 3DS and New 3DS XL in Europe and the US: the new console, in fact, has achieved outstanding results, exceeding three times those obtained by the launch of the original 3DS.

Amiibo also continue to grind impressive sales: Nintendo, in fact, well-distributed 5.7 million of figurines from November to 31 December 2014. Specifically, the US and Australia have appreciated more than the other Amiibo, and many characters have become unobtainable in early around the world (such as Captain Falcon in Japan, Marth in the US / Canada, Little Mac in Europe and Ike in Australia).

Satoru Iwata finally announced that sales of downloadable software, in the period which runs from April to September 2014, generated 21.1 billion yen in revenue, an increase of 17% over the same period last year. The increase was more pronounced in the US.

At the bottom are some charts of the financial results of Nintendo.

Source: DualShockers

LikeTweet

Legal battle on the choice of software in the town hall, the Halley … – Termoli Online

TERMOLI. Grane legal exchange of management software to the City of Termoli, that abandoning the system used for years in via Sannitica n. 5, that of Halley South East, has opted for the computer protocol of the digital PA. All is not yet fully operational, so some dysfunction persists and there have already been both political protests by citizens who expect certain payments and disbursements, but this decision to jump from one system to another has also sparked a legal battle administrative .

The old manager, in fact, relying lawyer Pine Road, has appealed the products at city hall, asking with a special appeal to the TAR Molise “cancellation after suspension of the determination of 30 n.2149 / 12/2014 on the ‘reorganization of offices and municipal services – new digital platform for the management of the information system and management of the institution “, with which it was entrusted to the PA Digital Adriativa LTD ‘The contractual relationship subscription Asp on the use of the software Urbi Pa smart, integrated system for the government for 36 months starting from January last as offered acquired by Mepa. “

Contested also the resolution splice 347 of 29 December and all acts related. Among the defects found by the applicant and former manager, the violation of the principles of competition, equal treatment, non-discrimination, impartiality, transparency, proportionality and good performance of public administration, excess power to manifest illogicality and misuse of the public interest, for does not derogate from the procedure Mepa tendering procedures under the Code of contracts, nor with tendering of bids. ” The junta Sbrocca is before the court, entrusting the defense lawyer of the institution of the Bari Bar Lorenzo De Robertis.

LikeTweet

Cybersecurity, “more virus with pirated software” – The Republic

USE unlicensed software, as well as being an illegal practice, it can be a fatal choice for our personal computers. The risk of viruses, worms, Trojan horses and other types of malware increases exponentially with the use of unlicensed software. This correlation has been demonstrated thoroughly by a survey conducted by IDC (International Data Corporation) for the Business Software Alliance (BSA), the international association that is responsible for years of anti-piracy, mainly in the field of copyright infringement on software by the companies.

It really is not the first time that analysts speak of this connection. When the worm “Conficker” spread in computers around the world between 2008 and 2009 online security experts had already warned about the dangers arising from the download of unlicensed software. A few years later it was discovered by the network of computers infected with malware “Citadel” (who created 5 million “zombie” computers in 90 countries) that the criminals behind this illegal network had managed to infect PCs in part by selling free versions Windows license pre-infected Citadel. Even the FBI has launched in recent years the alarm about the presence of virus in the software without a license.

The innovation resulting from this analysis is that, according to people who made them, is the first study that reveals a statistical correlation between unlicensed software and the threat to the security of the computer represented by malware. The research, entitled “Software unlicensed and threats to cybersecurity,” seems to leave no doubt that there is a strong relationship between the use of unlicensed software and the infection of malware and viruses. Analysts have come to these conclusions through a statistical analysis of data from 81 countries: the data on unlicensed software were taken from Global Software Survey, a study two years that leads IDC for BSA, while information on cybersecurity are from Microsoft’s Security Intelligence Report, information based on the activity of 600 million users per month. In 2013 about 20% of personal computers worldwide met malware every three months.

But to make clear the correlation is a graph that relates the percentage of computers with unlicensed software and the percentage of computers infected with malware in 2013: it is clear that the growth of computer software without license increases the percentage of PCs affected by malware (and vice versa). And this report does not change by changing the country: the United States, for example, the rate of unlicensed software in 2013 was 18% and the rate of malware (the “encounter rate”) was 13% in the quarter. In Indonesia at a rate of unlicensed software by 84% corresponded an “encounter rate” of 44% per quarter. In Brazil to a level of unlicensed software by 50% corresponded an “encounter rate” of 31%. Statistics confirm that the two variables have a close relationship, going up and down together. The correlation coefficient is 0.79%, where 1.0 represents a perfect correlation and 0 no correlation. To make a useful comparison, the correlation between smoking and cancer is the 0.72,7% and the correlation between anti-corruption policies and economic growth of 0.77%.

cybersecurity, & quot; pi & # xF9; viruses with pirated software & quot;


Analysts were not satisfied to demonstrate a simple connection statistics but have taken steps to develop a model that shows carefully as the possession of unlicensed programs can be a valuable indicator of future malware infection. The mechanism is that the regression analysis involves the use of data to derive a formula by which a variable can predict another. Data graphically create a straight line if the formula works perfectly the data will all along this line, alterimenti not. In this case, many of the data are in the vicinity of the line with a statistically strong predictive value of 0.62. This shows that the differences between malware infections recorded in various countries comes to 62% of the differences between the different rates of use of unlicensed software.

To confirm this theory, there is also a study of 2014 conducted by IDC and the National University of Singapore (NUS) which revealed significant quantities of virus in unlicensed software in over 800 PCs with unlicensed software pre-installed. The test involved a dozen countries in Asia, Europe and America. The test showed that with an unlicensed software is a three chance of contracting malware. A survey of 1,000 owners of pc has revealed that one in five of those surveyed said that an unlicensed software has infected their PC with a virus; 2 of 5 said the software have slowed down their computers and have had to uninstall it (a possible sign of hidden viruses) and one in 10 said they had destroyed those programs.

Of course there ‘ is a total certainty, it is only statistical evidence on which, however, must reflect. It ‘obvious that not all security threats come from malware and not all malware are by unlicensed software. But it is clear that many malware derive from unlicensed software and are a threat to computer security. “For this – says the study – it is necessary for companies, governments and consumers strive to lower the rate of risk by reducing the use of unlicensed software.”

Unfortunately – says Simonetta Moreschini , president of BSA Italy – on these issues seems to be a trend in the last period in Italy to go against. For if through the approval of Law no. 67 of 28 April 2014, had made a significant step forward even from a legislative point of view, today the same measure is likely to be weakened to an action that is putting at risk the real applicability. The legislative decree containing provisions on ‘non-punishment for a tenuous nature of the fact’, currently before the Finance Committees of the House and Senate, is likely to hit the system of enforcement of intellectual property rights and industrial, with negative consequences for our country, both from the economic point of view, both in employment but also to the implications in terms of security. “

Arguments:
BSA
idc
software
malware
virus
unlicensed software
Piracy
microsoft
Citadel
worms
National University of Singapore
cyber security
Starring:
Simonetta Moreschini

LikeTweet

New paradigms for the IBM Storage thanks to the role of software – Data Manager Online

SUBSCRIBE TO OUR NEWSLETTER

PGlmcmFtZSBzcmM9Imh0dHA6Ly9jb250ZW50Lmp3cGxhdGZvcm0uY29tL3BsYXllcnMveGRjQjBBblQtR21SMW1XUlkuaHRtbCIgd2lkdGg9IjQ4MCIgaGVpZ2h0PSIyNzAiIGZyYW1lYm9yZGVyPSIwIiBzY3JvbGxpbmc9ImF1dG8iPjwvaWZyYW1lPg==

… since 1976, only the best information ICT …

LikeTweet

The close link between pirated software and malware threats – Data Manager Online

SUBSCRIBE TO OUR NEWSLETTER

PGlmcmFtZSBzcmM9Imh0dHA6Ly9jb250ZW50Lmp3cGxhdGZvcm0uY29tL3BsYXllcnMveGRjQjBBblQtR21SMW1XUlkuaHRtbCIgd2lkdGg9IjQ4MCIgaGVpZ2h0PSIyNzAiIGZyYW1lYm9yZGVyPSIwIiBzY3JvbGxpbmc9ImF1dG8iPjwvaWZyYW1lPg==

… since 1976, only the best information ICT …

LikeTweet

iSharkFin, software that can save sharks – The Republic

Rome – The sharks will swim one day more peacefully thanks to a new digital tool developed by FAO that allows rapid identification – in five minutes – of these species. The new software, called iSharkFin, will help protect shark species threatened with extinction, and to combat the illegal trade in shark fins. It ‘a tool for employees at customs, port inspectors and fish markets that do not have specific training in the recognition and scientific classification of species, but also for fishermen who want to avoid the capture of protected species, explained Monica Barone, who has led a team of Fisheries and Aquaculture Department of FAO in software development. iSharkFin could allow the authorities to unravel the mystery of the real extent of shark fishing in the world.

The work on this project began in 2013, after five shark species have been added to the Convention on International Trade in species wildlife at risk of extinction (CITES). According to a recent study, recalls the FAO, sharks killed could be about 73 million units, more than 6% of the total stock per year.
ISharkFin, says FAO, is based on artificial intelligence techniques: loads a photograph, the user chooses some key points of the shape of the fin and other details, an algorithm compares the information with its database and identifies the species of shark in five minutes.

The FAO is also developing iSharkFin application that can be used on tablets or smartphones, thus broadening the scope and use. So far iSharkFin is able to identify 35 species of sharks from the dorsal fins – the fin of the shark par excellence – and seven only by the pectoral fins. Many of these species are the most frequently traded internationally. There will be more, but since some species are becoming quite rare, it will take time to collect complete data.
The software was developed by FAO in collaboration with the University of Vigo, Spain. Cites and the Government of Japan has provided financial support.

Arguments:
isharkfin
software
Sharks
mammals
Animal
cites
Flora
fauna
fao
Japan
Starring:

LikeTweet

Superfish is the software pre-installed on Lenovo PCs that provides … – The Press

‘); adX25Out var j = $ (‘

‘); adX25Out.append (adX25); $ J (“. Ls-articoloSuperIntestazione”). After (spacer); adX25Out.insertAfter (spacer); } Else {adX25.insertAfter ($ j (“# ls-multimedia”)); }} WriteCapture.write (document.getElementById (‘ad_x25′), ‘ OAS_AD (“x25″) ‘ + ‘ipt & gt;’); }); }); }); }

Superfish is the software pre-installed on Lenovo PCs that jeopardizes the safety

The adware breaks encryption of Web sites to track navigation and propose targeted advertising

Lenovo publishes on Twitter instructions to allow owners of its portable remove the preinstalled software that potentially exposed them to hacking attacks and unauthorized activity monitoring. So the first manufacturer in the world of computer recognizes the error and apologizes for having provided a highly dangerous program, created by a company called Superfish.

The company based in Beijing runs for cover after the rain of criticism from practitioners of cyber-security about the ability of Superfish to track browsing to propose advertising related to what is displayed on the screen. In particular, the software uses algorithms that identify areas of pointing and suggest ads based on the images that users are looking at within the browser.

The problem is that this technology is able to interfere in connections protected by encryption, used by banking sites, e-commerce and others dealing with sensitive information, exposing the devices to big risks. The software has been included in some models of laptops consumables sold worldwide between September and December and has been disabled since January, after complaints from users.

According to the specialized website Ubuntu the problem occurs on Chrome and Internet Explorer, and is sure the Mozilla browser. In any case, you should uninstall the adware and run a virus scan.

(Agb)

Print with you anywhere, anytime

 

Reuters

 19/02/2015

 giovannini roberto, roberto Pavanello

 

Reuters

 02/20/2015

 

Reuters

 02/20/2015

“);} // ——————— —————————– // // Move to column 2 related articles // // —— ——————————————– if (device.mobile ( )) {var ArtCorr j = $ (“# col1ContainerArtCorr”). detach (); $ j (“# ed_Related_Box”). before (ArtCorr); var cont = ArtCorr.find (“. ls-box-related articles. ls-boxcontent-body-.ls boxcontent-body-view “); ArtCorr.find (“. ls-boxcontent #scrollArrows “). css (” display “,” none “); if (cont.find (“. ls -boxUltimoArticolo “). length & gt; 0) {cont.find (“. ls-boxUltimoArticolo “). each (function (index) {cont.append (j $ (this) .html ()); j $ (this) .detach ();}); ArtCorr.show (); var base = ArtCorr.find (“. ls-box-related items”); base.swiper ({container: base.find (“. ls-boxcontent- body “), content: base.find (“. ls-boxcontent-body-view “)}); } Var ExpertCorr j = $ (“# col1ContainerExpertCorr”). Detach (); $ J (“# ed_Related_Box”). Before (ExpertCorr); var cont = ExpertCorr.find (“. ls-box-items-related .ls-boxcontent-body-.ls boxcontent-body-view”); ExpertCorr.find (“. Ls-boxcontent #scrollArrows”). Css (“display”, “none”); if (cont.find (“. ls-boxUltimoArticolo”). length & gt; 0) {cont.find (“. ls-boxUltimoArticolo”). each (function (index) {cont.append (j $ (this) .html ()); j $ (this) .detach ();}); ExpertCorr.show (); var base = ExpertCorr.find (“. ls-box-related items”); base.swiper ({container: base.find (“. ls-boxcontent-body”), content: base.find (“. ls-boxcontent-body-view”)}); }} Else {if ($ j (“# col1ContainerArtCorr”). Length & gt; 0) {$ j (“# ad_frame1″). After (“

” + $ j (“# col1ContainerArtCorr”). Html () + “

“); } If ($ j (“# col1ContainerExpertCorr”). Length & gt; 0) {$ j (“# ad_frame1″). After (“

” + $ j (“# col1ContainerExpertCorr”). Html () + “

“); }} // ———————————————- —- // // Hides the box if there are no related articles and multimedia // // ————————— ———————– if ($ j (“# containerMMCorr .ls-boxUltimoArticolo”). size () == 0) {$ j (” #containerMMCorr “). css (” display “,” none “); } If ($ j (“# containerArtCorr .ls-boxUltimoArticolo”). Size () == 0) {$ j (“# containerArtCorr”). Css (“display”, “none”); } If ($ j (“# containerExpertCorr .ls-boxUltimoArticolo”). Size () == 0) {$ j (“# containerExpertCorr”). Css (“display”, “none”); } // ———————————————– — // // Management box recent articles in opening // // ——————————– —————— $ j (“. ls-new-leaf-.ls boxUltimiArticoli-top-.ls boxcontent-body”). height (60); boxManual = true; boxOpened = false; var topBannerHeight; var topUltimiArticoliHeight; var topTotalTopHeight; // // ———————————————- —- // // // // Display Expert System ———————————- —————- if ($ j (“. ls-articoloTesto”). height () & gt; 550) {$ j (“. ls-articoloImmagini-Spacer”). css (“height”, $ j (“. ls-images-item”). height () + 120); $ J (“. Ls-images-item”). Css (“display”, “inline”); } If ($ j (‘. Ls-articoloES-Links’). Height () == 0) {$ j (‘. Ls-articoloES-Links’). Css (‘display’, ‘none’); } // ———————————————– — // // // // Initialization page load ———————————— ————– $ j (document) .ready (function () {// Adaptation of video for mobile if (device.mobile ()) {$ j (‘. ls- articoloScript iframe ‘). width (j $ (window) .width ()); $ j (‘. ls-articoloScript iframe ‘). height (j $ (window) .width () * 9/16);} // // Initialize the top 4px removing the padding-top box to align the thread blue top topbannerSectionHeight // var j = $ (‘. ls-topBannerSection’). outerHeight (true) – 4; // // Initialization of the arrows Recent Articles // j $ (‘. arrow_up_big’). css (‘display’, ‘none’); $ j (‘. arrow_down_big’). css (“display”, “block”); // // Initialize edges Recent Articles // var rightBoxUltimiArticoli = j $ (‘# containerLista #boxUltimoArticolo’). last (); rightBoxUltimiArticoli.addClass (‘BorderRight’); // // // Initialization related articles maxAltezzaBox var = 730; hContainerArt var j = $ (“# containerArtCorr .ls-boxcontent-body-view”). height (); hViewArt var j = $ (“# containerArtCorr .ls-boxcontent .ls-box-items-related .ls-boxcontent-body”) .height (); var height = Math.max (hContainerArt, hViewArt); height = Math.min (height, maxAltezzaBox); $ J (‘# containerArtCorr .ls-boxcontent .ls-box-items-related .ls-boxcontent-body’). Height (height); $ J (“# containerArtCorr #articoliCorrScrollUp”). Attr (‘src’, ‘/ common / img / arrow_up_disabled.png’); $ J (“# containerArtCorr #articoliCorrScrollUp”). RemoveClass (‘. Active’); // // I hide the arrows to scroll if there are less than 3 items // if ($ j (“# containerArtCorr .ls-boxUltimoArticolo”). Size () 60) {$ j (node) .text (titolo.substring (0, 60) + ‘…’); }}); // // Add the div for the management of the scroll // j $ (‘. Ls-topBannerSection’). After (”); $ J (‘# afterTopBanner’). Height (topBannerHeight); $ J (‘# getFixed’). After (”); $ J (‘# afterUltimiArticoli’). Height (topTotalTopHeight); afterUltimiArticoliTop var j = $ (‘# afterUltimiArticoli’). position (). top; // // Managing box in column 2 // var height = (j $ (‘. Ls-articoloTesto’). Height () + j $ (‘. Ls-articoloTesto’). Position (). Top) – $ j (‘# containerMMCorr’). height () – $ j (‘# containerArtCorr’). height () – $ j (‘. ls-column2′). offset (). top; $ J (‘# containerMMCorr’). After (”);
 
 //
 
 
 J $ (window) .scroll (function (event) {
 
 var y = j $ (this) .scrollTop ();
 
 if (($ j (window) .scrollTop () & gt; $ j (‘. ls-articoloTesto’). height ()) & amp; & amp; ($ j (window) .scrollTop () & gt; 800)) {
 if ($ j (“# sh_socialized_bottom”). css (‘display’) == ‘none’) {
 $ J (“# sh_socialized_bottom”). Css (‘display’, ‘block’);
 $ J (“# sh_socialized_bottom”). Html ($ j (“# sh_socialized”). Html ());
 }
 } Else {
 $ J (“# sh_socialized_bottom”). Css (‘display’, ‘none’);
 $ J (“# sh_socialized_bottom”). Html (”);
 }
 
 if (device.tablet () || device.mobile ()) {
 return;
 }
 
 //
 // Management of the top header
 //
 if (y & gt; 0) {
 if ($ j (window) .scrollTop () & gt; j = $ (‘# page_header’). offset (). top) {
 //
 // Top header fixed
 //
 
 if (if! = 1) {
 = 1 case;
 
 $ J (‘. Ls-topBannerSection’). AddClass (‘fixed’);
 $ J (‘. Ls-topBannerSection’). AddClass (‘fixedTopHeader’);
 
 $ J (‘# afterTopBanner’). Css (‘display’, ‘block’);
 
 topBannerHeight j = $ (‘. ls-topBannerSection’). height () + j $ (‘. ls-boxUltimiArticoliLista’). height ();
 
 // Console.log (‘Case:’ + event);
 }
 
 if ($ j (window) .scrollTop () (j $ (‘# getFixed’). offset (). top – $ j (‘. ls-topBannerSection’). height ())) {
 //
 // Management of the box last articles
 //
 if (if! = 3) {
 case = 3;
 
 $ J (‘# afterUltimiArticoli’). Css (‘display’, ‘block’);
 
 $ J (‘# getFixed’). AddClass (‘fixed’);
 $ J (‘# getFixed’). AddClass (‘fixedTopArticoli’);
 
 // $ J (‘. FixedTopArticoli’). Css (‘top’, topbannerSectionHeight + ‘px’);
 // AfterUltimiArticoliTop j = $ (‘# getFixed’). Offset (). Top + $ j (‘# getFixed’). Height () – $ j (‘. Ls-topBannerSection’). Height ();
 
 // Console.log (‘Case:’ + event);
 }
 } Else {
 
 }
 
 //
 // Management of related articles in column 2
 //
 
 if ($ j (window) .scrollTop () & gt; $ j (‘. ls-articoloTesto’). height ()) {
 if ($ j (“# containerArtCorr”). css (‘top’) == ‘0px’) {
 if ($ j (“# containerArtCorr”). css (‘display’) == ‘block’) {
 postop var j = $ (‘# ad_frame2′). offset (). top – $ j (‘. ls-column2′). offset (). top + 250;
 var posBottom postop = + j $ (“# containerArtCorr”). height ();
 
 if ($ j (‘# ed_Related_Box’). offset (). top & gt; posBottom) {
 $ J (“# containerArtCorr”). Css (‘display’, ‘none’);
 $ J (“# containerArtCorr”). Css (‘position’, ‘on’);
 
 
 $ J (“# containerArtCorr”). Css (‘top’, postop + ‘px’);
 $ J (“. Ls-column2″). Height ($ j (‘. Ls-column1′). Height ());
 $ J (“# containerArtCorr”). FadeIn (600);
 }
 }
 }
 } Else {
 $ J (“# containerArtCorr”). Css (‘top’, ‘0px’);
 }
 } Else {
 if (if! = 4) {
 case = 4;
 
 $ J (‘# afterTopBanner’). Css (‘display’, ‘none’);
 $ J (‘# afterUltimiArticoli’). Css (‘display’, ‘none’);
 
 $ J (‘. Ls-colonneArticolo’). Css (‘position’, ‘static’);
 $ J (‘. Ls-colonneArticolo’). Css (‘top’, ‘0px’);
 
 $ J (‘. Ls-topBannerSection’). RemoveClass (‘fixed’);
 $ J (‘. Ls-topBannerSection’). RemoveClass (‘fixedTopHeader’);
 
 $ J (‘. Ls-spinster’). Css (‘position’, ‘static’);
 $ J (‘. Ls-spinster’). Css (‘top’, ‘0px’);
 
 $ J (‘# getFixed’). RemoveClass (‘fixed’);
 $ J (‘# getFixed’). RemoveClass (‘fixedTopArticoli’);
 
 // Console.log (‘Case:’ + event);
 }
 }
 });
 });
 
 // ———————————————— –
 //
 // Management box recent articles in opening
 //
 // ———————————————— –
 
 // Stores the open / closed status of the box to avoid
 // Handle the same event in the scroll
 boxOpened var = false;
 
 // Store if the box has been closed or apreto
 // Manually to not change the state
 // Automatically during the scroll
 boxManual var = false;
 
 $ J (‘. Arrow_down_big’). Click (function () {
 // I open the box
 boxManual = true;
 ultimiArticoliBox (‘open’);
 });
 
 $ J (‘. Arrow_up_big’). Click (function () {
 // I close the box
 boxManual = true;
 ultimiArticoliBox (‘close’);
 });
 
 ultimiArticoliBox function (action) {
 var speed1 = 300;
 var speed2 = 500;
 
 if ((action == ‘open’) & amp; & amp; (boxOpened == false)) {
 var cssProp;
 
 $ J (‘. Arrow_up_big’). Css (“display”, “block”);
 $ J (‘. Arrow_down_big’). Css (“display”, “none”);
 
 cssProp = {height: ‘180px’};
 $ J (“. Ls-new-leaf-.ls boxUltimiArticoli-top-.ls boxcontent-body”). Animate (cssProp, speed2);
 
 cssProp = {top: ’20px’};
 // $ J (‘# getFixed #boxUltimoArticolo .ls-boxUltimoArticolo-info’). Animate (cssProp, speed2);
 $ J (‘# getFixed #boxUltimoArticolo .ls-text-box’). Animate (cssProp, speed2);
 
 
 cssProp = {top: ‘0px’};
 // $ J (‘# getFixed #boxUltimoArticolo .imgUltimoArticolo’). Animate (cssProp, speed2);
 $ J (‘# getFixed #boxUltimoArticolo .ls-box-image’). Animate (cssProp, speed2);
 
 cssProp = {height: ‘179px’};
 $ J (“. Ls-new-leaf-.ls boxUltimiArticoli-top-.ls boxUltimiArticoliLista”). Animate (cssProp, speed2,
 function ()
 {
 var height = $ j (‘# getFixed’). height ()
 cssProp = {height: + height + ‘px’};
 $ J (‘# afterUltimiArticoli’). Animate (cssProp, speed1);
 }
 );
 
 boxOpened = true;
 }
 if ((action == ‘close’) & amp; & amp; (boxOpened == true)) {
 var cssProp;
 
 $ J (‘. Arrow_up_big’). Css (“display”, “none”);
 $ J (‘. Arrow_down_big’). Css (“display”, “block”);
 
 cssProp = {top: ‘-130px’};
 // $ J (‘# getFixed #boxUltimoArticolo .imgUltimoArticolo’). Css (‘position’, ‘on’);
 // $ J (‘# getFixed #boxUltimoArticolo .imgUltimoArticolo’). Animate (cssProp, speed2);
 
 $ J (‘# getFixed #boxUltimoArticolo .ls-box-image’). Css (‘position’, ‘on’);
 $ J (‘# getFixed #boxUltimoArticolo .ls-box-image’). Animate (cssProp, speed2);
 
 
 cssProp = {top: ‘-100px’};
 // $ J (‘# getFixed #boxUltimoArticolo .ls-boxUltimoArticolo-info’). Css (‘position’, ‘on’);
 // $ J (‘# getFixed #boxUltimoArticolo .ls-boxUltimoArticolo-info’). Animate (cssProp, speed2);
 
 $ J (‘# getFixed #boxUltimoArticolo .ls-text-box’). Css (‘position’, ‘on’);
 $ J (‘# getFixed #boxUltimoArticolo .ls-text-box’). Animate (cssProp, speed2);
 
 cssProp = {height: ’59px’};
 $ J (“. Ls-new-leaf-.ls boxUltimiArticoli-top-.ls boxUltimiArticoliLista”). Animate (cssProp, speed2);
 
 cssProp = {height: ’60px’};
 $ J (“. Ls-new-leaf-.ls boxUltimiArticoli-top-.ls boxcontent-body”). Animate (cssProp, speed2,
 function ()
 {
 var height = $ j (‘# getFixed’). height ()
 cssProp = {height: + height + ‘px’};
 $ J (‘# afterUltimiArticoli’). Animate (cssProp, speed1);
 }
 );
 
 $ J (‘# afterUltimiArticoli’). Height ($ j (‘# getFixed’). Height ());
 
 boxOpened = false;
 }
 }
 
 
 // ———————————————— –
 //
 // Management related articles
 //
 // ———————————————— –
 
 var speed = 300;
 var topValueArt;
 var minValueArt;
 
 // ———————————————— –
 // Click Arrow pointing down
 //
 // ———————————————— –
 $ J (“# containerArtCorr #articoliCorrScrollDown”). Click (function () {
 
 topValueArt = parseInt ($ j (“# containerArtCorr .ls-boxcontent .ls-box-items-related .ls-boxcontent-body-.ls boxcontent-body-view”). css (“top”));
 minValueArt = 0 – $ j (“# containerArtCorr .ls-boxcontent-body-view”). height () + 584;
 
 cssProp var = {top: + minValueArt + ‘px’};
 
 if ($ j (“# containerArtCorr #articoliCorrScrollDown”). hasClass (‘. active’) == false)
 return;
 
 $ J (“# containerArtCorr .ls-boxcontent .ls-box-items-related .ls-boxcontent-body-.ls boxcontent-body-view”). Animate (cssProp, speed,
 function () {
 $ J (“# containerArtCorr #articoliCorrScrollDown”). Attr (‘src’, ‘/ common / img / arrow_down_disabled.png’);
 $ J (“# containerArtCorr #articoliCorrScrollDown”). RemoveClass (‘. Active’);
 
 $ J (“# containerArtCorr #articoliCorrScrollUp”). Attr (‘src’, ‘/ module / new-leaf / img / arrow_up.png’);
 $ J (“# containerArtCorr #articoliCorrScrollUp”). AddClass (‘. Active’);
 
 TopValue = parseInt ($ j (“# containerArtCorr .ls-boxcontent-body-view”). css (“top”));
 if (TopValue

LikeTweet