Home

Results 101 - 110 of 72,642 for client's tips. Search took 4.339 seconds.  
Sort by date/Sort by relevance
Matches: > Joker Lotto Viking Lotto Keno DD V75 Specify tel. no. incl. area code: > Horoscope Today TV now Humour Offers Tip Sense Update launched Oct. 11 2000 Content to most mobile telephones The mobile telecommunications industry is moving towards 3G with huge cost burdens (licenses, network roll-out, customer acquisition etc.) Brand owners understand a need for closer customer relation/ retention/ loyalty/ services MNOs understand the opportunity to decrease customer acquisition cost substantially and simultaneously filling the network with traffic Extended regulations and ambitions for increased competition by local authorities Two kind of MVNOs will appear in future: True MVNOs with international operation Strongly branded Mobile Service Providers based on commonly used operational platforms The Facts Both MVNOs and enabling platforms are beneficial to MNOs, as this will reduce The acquisition cost for the MNO substantially The implementation cost for several new, not experienced players Need for various support functions, like customer care/ back office, billing, cash collection etc. and increase The network utilization (especially in respect to later 3G, high capacity networks) Revenue stream due to new or highly used applications and new services and attract Clients that are small and not capable to integrate systems by their own, but have an interesting customer base Clients with international background and operation who want to achieve leverage The win-win It makes Sense!
Language:English
Score: 1029843.4 - https://www.itu.int/osg/spu/ni...shop/presentations/stube_1.pdf
Data Source: un
These constantly changing architectures make it much more difficult to track down criminal activities and shut down their operations.“ Honeynet Project & Research Alliance 5September 2007 Source: Wired Magazine 6September 2007 The Botnet Ecosystem Virus Writers, Botherders, Clients Virus writer writes malware, infects computers to create botnet Botherder operates the botnet “command and control” (C&C) Clients hire botnets to distribute spam, launch Distributed Denial of Service (DDoS) attacks, to conduct identity theft Highly developed underground channels of communication “Secret” forums/chat rooms that shift location Access on a need to know basis, new entrants may need to be vouched for by existing participant 7September 2007 The Botnet Ecosystem cont‘d Botherders now offer “service level agreements” to clients Guaranteed replacement of botnet in case anti-virus researchers release fix for malware or botnet is taken down Organized crime involved in all stages of ecosystem Employ virus writers to create malware Carry out spam campaigns, espionage, ID theft, cyber-attacks Laundering of money stolen from victims 8September 2007 Evolution of Botnets C&C centers harder to trace Originally hosted on public IRC channels Now encrypted, access restricted C&C software C&C centers may be hosted on botnets Increased redundancy Makes takedown harder New “headless” single use botnets No centralized control or C&C required new generation of P2P botnets Instructions embedded into malware New malware and botnet created for a new task Cannot stop botnet by taking down its C&C 9September 2007 Evolution of Malware Self-propagating: infected hosts infect other hosts Infection vectors include email, P2P networks, open shared network folders, Skype, visiting infected website Newer malware spreads faster than older generations Spread resembles global pandemic (SARS, Bird Flu) Can similar threat models/mitigation mechanism theories be applied? (...) Send spam Most visible use of botnets Botnets can host entire spam campaign Including DNS servers, website hosting, spam sending Content can change location from PC to PC, country to country, in minutes “Take” from a spam run can be reused 419 scam artists now buying lists of compromised accounts from botherders, using these to spam But spam is just the tip of the iceberg 11September 2007 What else can you do with a Botnet?
Language:English
Score: 1027713.8 - https://www.itu.int/ITU-D/cyb/...ation-project-praia-nov-07.pdf
Data Source: un
These constantly changing architectures make it much more difficult to track down criminal activities and shut down their operations.“ Honeynet Project & Research Alliance 5September 2007 Source: Wired Magazine 6September 2007 The Botnet Ecosystem Virus Writers, Botherders, Clients Virus writer writes malware, infects computers to create botnet Botherder operates the botnet “command and control” (C&C) Clients hire botnets to distribute spam, launch Distributed Denial of Service (DDoS) attacks, to conduct identity theft Highly developed underground channels of communication “Secret” forums/chat rooms that shift location Access on a need to know basis, new entrants may need to be vouched for by existing participant 7September 2007 The Botnet Ecosystem cont‘d Botherders now offer “service level agreements” to clients Guaranteed replacement of botnet in case anti-virus researchers release fix for malware or botnet is taken down Organized crime involved in all stages of ecosystem Employ virus writers to create malware Carry out spam campaigns, espionage, ID theft, cyber-attacks Laundering of money stolen from victims 8September 2007 Evolution of Botnets C&C centers harder to trace Originally hosted on public IRC channels Now encrypted, access restricted C&C software C&C centers may be hosted on botnets Increased redundancy Makes takedown harder New “headless” single use botnets No centralized control or C&C required new generation of P2P botnets Instructions embedded into malware New malware and botnet created for a new task Cannot stop botnet by taking down its C&C 9September 2007 Evolution of Malware Self-propagating: infected hosts infect other hosts Infection vectors include email, P2P networks, open shared network folders, Skype, visiting infected website Newer malware spreads faster than older generations Spread resembles global pandemic (SARS, Bird Flu) Can similar threat models/mitigation mechanism theories be applied? (...) Send spam Most visible use of botnets Botnets can host entire spam campaign Including DNS servers, website hosting, spam sending Content can change location from PC to PC, country to country, in minutes “Take” from a spam run can be reused 419 scam artists now buying lists of compromised accounts from botherders, using these to spam But spam is just the tip of the iceberg 11September 2007 What else can you do with a Botnet?
Language:English
Score: 1027713.8 - https://www.itu.int/ITU-D/cyb/...-botnet-mitigation-toolkit.pdf
Data Source: un
These constantly changing architectures make it much more difficult to track down criminal activities and shut down their operations.“ Honeynet Project & Research Alliance 3 5September 2007 Source: Wired Magazine 6September 2007 The Botnet Ecosystem Virus Writers, Botherders, Clients Virus writer writes malware, infects computers to create botnet Botherder operates the botnet “command and control” (C&C) Clients hire botnets to distribute spam, launch Distributed Denial of Service (DDoS) attacks, to conduct identity theft Highly developed underground channels of communication “Secret” forums/chat rooms that shift location Access on a need to know basis, new entrants may need to be vouched for by existing participant 4 7September 2007 The Botnet Ecosystem cont‘d Botherders now offer “service level agreements” to clients Guaranteed replacement of botnet in case anti-virus researchers release fix for malware or botnet is taken down Organized crime involved in all stages of ecosystem Employ virus writers to create malware Carry out spam campaigns, espionage, ID theft, cyber-attacks Laundering of money stolen from victims 8September 2007 Evolution of Botnets C&C centers harder to trace Originally hosted on public IRC channels Now encrypted, access restricted C&C software C&C centers may be hosted on botnets Increased redundancy Makes takedown harder New “headless” single use botnets No centralized control or C&C required new generation of P2P botnets Instructions embedded into malware New malware and botnet created for a new task Cannot stop botnet by taking down its C&C 5 9September 2007 Evolution of Malware Self-propagating: infected hosts infect other hosts Infection vectors include email, P2P networks, open shared network folders, Skype, visiting infected website Newer malware spreads faster than older generations Spread resembles global pandemic (SARS, Bird Flu) Can similar threat models/mitigation mechanism theories be applied? (...) Send spam Most visible use of botnets Botnets can host entire spam campaign Including DNS servers, website hosting, spam sending Content can change location from PC to PC, country to country, in minutes “Take” from a spam run can be reused 419 scam artists now buying lists of compromised accounts from botherders, using these to spam But spam is just the tip of the iceberg 6 11September 2007 What else can you do with a Botnet?
Language:English
Score: 1027713.8 - https://www.itu.int/ITU-D/cyb/...mitigation-toolkit-4-E-web.pdf
Data Source: un
IMPLEMENTATION OF THE INTERNATIONAL COVENANT ON ECONOMIC, SOCIAL AND CULTURAL RIGHTS : CONSIDERATION OF REPORTS SUBMITTED BY STATES PARTIES IN ACCORDANCE WITH ARTICLE 16 OF THE INTERNATIONAL COVENANT ON ECONOMIC, SOCIAL AND CULTURAL RIGHTS
The Labour Inspectorate can conduct an investigation on the basis of tips or reports of underpayment and pass on the results to the interested parties, including the trade unions, which can then initiate civil proceedings. (...) The Labour Inspectorate can conduct an investigation on the basis of tips or reports of underpayment and pass on the results to the interested parties, including the trade unions, which can then initiate civil proceedings. (...) In a few cases, this happens because the person’s behaviour is too disruptive to the other clients in the institution. Sometimes when people are released from prison they have no home to go to.
Language:English
Score: 1027212 - daccess-ods.un.org/acce...DS=E/C.12/NLD/Q/3/ADD.1&Lang=E
Data Source: ods
Raise awareness among consumers and clients  of the importance of early childhood development, including through their own social media and other channels.   (...) See the story Video essay For every child, love and care Diana's talk on #WorldChildrensDay Watch the story Article How to support your child during conflict How to support your child during conflict and crisis situations Read the story Article How you can support your child during bombing Tips for parents on physical safety and how to reduce stress.
Language:English
Score: 1021577.9 - https://www.unicef.org/armenia...es-can-be-more-family-friendly
Data Source: un
LAWS AND REGULATIONS PROMULGATED TO GIVE EFFECT TO THE PROVISIONS OF THE INTERNATIONAL TREATIES ON NARCOTIC DRUGS AND PSYCHOTROPIC SUBSTANCES : ANGUILLA / COMMUNICATED BY THE GOVERNMENT OF ANGUILLA
E/NL.2008/1 Page 2 REVISED STATUTES OF ANGUILLA CHAPTER D50 DRUGS TRAFFICKING OFFENCES ACT Showing the Law as at 15 December 2004 TABLE OF CONTENTS SECTION 1 Interpretation 2 Meaning of “corresponding law” 3 Provisions as to profit 4 Confiscation of proceeds of drug trafficking 5 Assessing the proceeds of drug trafficking 6 Statements relating to drug trafficking 7 Amount to be recovered under confiscation order 8 Application of procedure for enforcing fines 9 Cases in which restraint orders and charging orders may be made 10 Restraint orders 11 Charging orders in respect of land, securities, etc. 12 Charging orders: supplementary provisions 13 Realisation of property 14 Application of proceeds of realisation and other sums 15 Exercise of powers of High Court or receiver 16 Variation of confiscation order 17 Bankruptcy of defendant, etc. 18 Winding up of company holding realisable property 19 Receivers and liquidators dealing with property subject to restraint order 20 Receivers: supplementary provisions 21 Compensation 22 Assisting another to retain the benefit of drug trafficking 23 Requirement to disclose knowledge or suspicion of drug money laundering 24 Tipping off 25 Enforcement of other external orders 26 Registration of external confiscation orders 27 Orders to make material available 28 Authority for search 29 Meaning of “items subject to legal privilege” 30 Meaning of “excluded material” 31 Meaning of “personal records” 32 Meaning of “journalistic material” 33 Account monitoring orders 34 Disclosure of information held by government departments 35 Offence of prejudicing investigation 36 Citation E/NL.2008/1 Page 3 DRUGS TRAFFICKING OFFENCES ACT Interpretation 1
Language:English
Score: 1020833.5 - daccess-ods.un.org/acce...get?open&DS=E/NL.2008/1&Lang=E
Data Source: ods
9TH PERIODIC REPORT SUBMITTED BY HONG KONG, CHINA UNDER ARTICLE 18 OF THE CONVENTION, DUE IN 2018 :CONVENTION ON THE ELIMINATION OF ALL FORMS OF DISCRIMINATION AGAINST WOMEN
Our ongoing efforts to combat TIP are set out in the ensuing paragraphs. (...) In addition to the newly established Steering Committee, there are established mechanisms for interdepartmental cooperation in combating TIP such as the Inter- departmental Joint Investigation Team (JIT), and an interdepartmental TIP Working Group established in 2010 to enhance enforcement strategy against TIP, monitor the overall situation of TIP and formulate the overall strategy for combating TIP in the HKSAR. 56. (...) The Government also actively participates in international conferences and workshops to identify the best practice to combat TIP and share TIP intelligence and experience.
Language:English
Score: 1018908 - https://daccess-ods.un.org/acc...en&DS=CEDAW/C/CHN-HKG/9&Lang=E
Data Source: ods
9/26/2018 El Acuerdo de Escazú: un hito ambiental para AL y el Caribe - Diario El Heraldo https://www.elheraldo.hn/opinion/columnas/1218641-469/el-acuerdo-de-escaz%C3%BA-un-hito-ambiental-para-al-y-el-caribe 1/4 GRUPO OPSA: LAPRENSA + DIEZ + REVISTA ESTILO + HONDURAS TIPS + ESTRATEGIA Y NEGOCIOS + SUPERCLASIFICADOS + GOTV + EMPLEOS GO Opinión Nuestras sociedades demandan cada vez más y mejor acceso a información adecuada y confiable, así como más y mejores oportunidades para participar de manera significativa en las decisiones que les afectan. (...) sa=L&ai=Ct9hCAuKrW9y2CsOiBfiehIACpuLMsFOZq5jDpwe57vDIqgEQASCYoMloYJnxz4GEBcgBBqkC9F-SzlLSGT7gAgCoAwHIAwqqBKACT9DP92L9ivda5KlI3KnWsZ2cJe6pP2LBADetIHkdCTBB_I7zQJFxrqTJgSuQOXnOuomiXaooVJwfqtD7daNp_wQ9IGWLh1wg0yUFA5-BjdQHzmQTR4YSvG7EzcAtkxfnhoGGXaqpb6biD1lpuDtbw9hpqBmJUoUWcofNIPzY6TI2-lGIpx7pUfk2W07GyoH6vdyA8s1lPPHk0FkSyc6JqucP1L-j-rhzqPQiHygxevMMJ9mhcFBuxtcrYMDFvp0lZT9i5dyKjcHi1UG_abpNVZlrlvY79obPPdfoUYHcDeRqe7Poa0p-Th6lMgwlpdKMgJ2IWk2pNUgRfYXbtfr30cIZgFf8197ZZTugKzAwOdSOGdjmDnCO-A5qEQZC6NmC4AQBoAY3gAfyhOBzqAeOzhuoB9XJG6gHqAaoB9nLG6gHz8wbqAemvhuoB5jOG9gHAdIIBwiAYRABGAGxCfjqCsxmcYC5gAoD2BMDiBQC&num=1&sig=AOD64_1hfpvxpZIYX58lL68OQOW9F0thOg&client=ca-pub-2327105054854529&nx=CLICK_X&ny=CLICK_Y&nb=1&adurl=http://www.presences.cl/landing/ https://googleads.g.doubleclick.net/aclk?sa=L&ai=Ct9hCAuKrW9y2CsOiBfiehIACpuLMsFOZq5jDpwe57vDIqgEQASCYoMloYJnxz4GEBcgBBqkC9F-SzlLSGT7gAgCoAwHIAwqqBKACT9DP92L9ivda5KlI3KnWsZ2cJe6pP2LBADetIHkdCTBB_I7zQJFxrqTJgSuQOXnOuomiXaooVJwfqtD7daNp_wQ9IGWLh1wg0yUFA5-BjdQHzmQTR4YSvG7EzcAtkxfnhoGGXaqpb6biD1lpuDtbw9hpqBmJUoUWcofNIPzY6TI2-lGIpx7pUfk2W07GyoH6vdyA8s1lPPHk0FkSyc6JqucP1L-j-rhzqPQiHygxevMMJ9mhcFBuxtcrYMDFvp0lZT9i5dyKjcHi1UG_abpNVZlrlvY79obPPdfoUYHcDeRqe7Poa0p-Th6lMgwlpdKMgJ2IWk2pNUgRfYXbtfr30cIZgFf8197ZZTugKzAwOdSOGdjmDnCO-A5qEQZC6NmC4AQBoAY3gAfyhOBzqAeOzhuoB9XJG6gHqAaoB9nLG6gHz8wbqAemvhuoB5jOG9gHAdIIBwiAYRABGAGxCfjqCsxmcYC5gAoD2BMDiBQC&num=1&sig=AOD64_1hfpvxpZIYX58lL68OQOW9F0thOg&client=ca-pub-2327105054854529&nx=CLICK_X&ny=CLICK_Y&nb=8&adurl=http://www.presences.cl/landing/ https://googleads.g.doubleclick.net/aclk?
Language:English
Score: 1017010 - https://www.cepal.org/sites/de..._heraldo-honduras_26-09-18.pdf
Data Source: un
SIXTH PERIODIC REPORT SUBMITTED BY MALAYSIA UNDER ARTICLE 18 OF THE CONVENTION, DUE IN 2022 :CONVENTION ON THE ELIMINATION OF ALL FORMS OF DISCRIMINATION AGAINST WOMEN
The details on the courses and number of judges, prosecutors and lawyers by sex in 2021 are provided in Annex F and G. The number of clients for legal aid and the number of clients and scope of coverage of LAD and YBGK in response to the recommendation made in paragraph 14 (d) of the CO is provided in the Annex H. (...) All five committees work closely with various NGOs, Civil Society Organisations (CSOs), International Organisations (IOs) and foreign diplomatic missions in ensuring effective and successful implementation of policies, programmes, and activities planned to combat TIP in Malaysia. 37. Act 670 is Malaysia’s primary legislation against TIP crimes and an obligation as a state party of the Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, supplementing the United Nations Convention against Transnational Organized Crime. (...) There are various activities or programmes for relevant enforcement agencies planned in order to support this vision as a reflection of the Government’s commitment and continuation of previous plans in efforts to combat TIP until 2025. 41. As provided under section 51A of Act 670, the Government through MAPO has streamlined the approval process for the permission of TIP victims to move freely and work by requiring that the Risk Assessments for approval be completed by the 14th day of the IPO period and submitted to MAPO.
Language:English
Score: 1016274.8 - https://daccess-ods.un.org/acc...t?open&DS=CEDAW/C/MYS/6&Lang=E
Data Source: ods