December 29th in history: the leak of Windows 7, e-government and hack GSM network

December 29, 2008, file-sharing networks appeared the image of the beta version of Windows 7. Leak of the new operating system is not the first time and there were rumors that this even kissed in the Microsoft. The company had intended to officially put the Wndows 7 beta on its website no later than January 13 (the release took place on 9 January). Users who managed to test the latest pirate of the seven noted that the beta version is very stable and fast, but there are some problems. Updated task looks very interesting, but sometimes it acts retarded and illogical. Taskbar labels inadequately reflected the running applications. The final version of Windows 7 appeared only on 22 October 2009.

Windows 7
Windows 7

December 29, 2009 Putin had established an electronic government. At that time Vladimir Putin was the Prime Minister of Russia and signed a relevant decree on the establishment of a unified national operator of e-government infrastructure. They became vertically integrated state automated information system (GUS) “the Office”. The creation and commissioning of system should be implemented during 2009-2012. SAS “Administration” is part of the Federal target program “Electronic government”. In the same year, the government actively developed media interaction with citizens. So, December 15 from test to live mode moved to the Internet portal of public services (gosuslugi.ru). In 2013 electronic government moved into the zone of responsibility of “mail of Russia” and FGUP NII “Voskhod”.

Логотип электронного правительства России
Logo e-government of Russia

On 29 December 2011, hackers broke into the GSM network. At the conference the Chaos Communication Congress in Berlin Carsten Zero and Onions Melette demonstrated how with the aid of easily accessible software decrypts and mobile phone, you can impersonate the user of another GSM cell phone. They made some calls, sent text messages and even checked the voice mail on behalf of the other party and identified his location. Their method worked because of the weakness of the GSM encryption, but also due to the fact that the key that was originally supposed to be updated each time a new challenge is often used for several different transactions. Identified then the vulnerability does not affect more modern cellular networks of the third and fourth generations.

Хакер
Hacker


Date:

by