Cloud web conference Alessandro Stesi

Free Cloud Conference for Corona Virus Emergency (COVID-19)

Cloud Conference free for two months for Corona Virus emergency (COVID-19).

To cope with the Corona Virus emergency and to help companies with Smart Working tools, the Secure Online Desktop offers the Cloud Conference service free of charge for two months. Cloud Conference is our video conference service that does not require the use of software, no installation is necessary because everything is already available in the Cloud.

Service info:

Cloud Conference.

 

Instructions for free use of the service:

  ♦ Access the product page at the following link: https://cloud.secure-od.com/cart/saas—cloud-conference

  ♦ Click on the “Use a promotional code” box on the right

  ♦ Enter the promotional code: COVID-19

 

 

Cloud Conference free for two months for Corona Virus emergency (COVID-19)

 

Further information:

  ♦ Any company can access the promotion by using the ownCloud service for free for two months;

  ♦ The promotion in question does not include any renewal obligation and no disbursement;

  ♦ At the end of the promotion, the user can decide whether to renew the service or to discontinue it.

 

L’iniziativa è stata pubblicata anche sul portale istituzionale Solidarietà Digitale nella sezione Smart Working cercando per Cloud Conference.

The initiative was also published on the institutional portal Digital Solidarity in the Smart Working section looking for the Cloud Conference.

Cloud Conference free for two months for Corona Virus emergency

 

[btnsx id=”8329″]

 

For more information

[btnsx id=”2931″]

Useful links:

ownCloud free for COVID19

Help [email protected] project with COVID19

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading:

RSS Full Disclosure

  • Backdoor.Win32.NinjaSpy.c / Remote Command Execution May 7, 2021
    Posted by malvuln on May 07Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/6eece319bc108576bd1f4a8364616264_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.NinjaSpy.c Vulnerability: Remote Command Execution Description: The malware listens on TCP ports 2003, 2004 and drops a DLL named "cmd.dll" under Windows dir. Connecting to port 2003, you will get back […]
  • Packed.Win32.Black.d / Unauthenticated Open Proxy May 7, 2021
    Posted by malvuln on May 07Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/3a36d7ab34b3241aa2a9072700e0cb7c.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Packed.Win32.Black.d Vulnerability: Unauthenticated Open Proxy Description: The malware listens on TCP ports 1080 and 8080 and drops a hidden executable named "Hacker.com.cn.exe" under Windows dir" that runs with SYSTEM integrity....
  • Backdoor.Win32.Floder.gqe / Insecure Permissions May 7, 2021
    Posted by malvuln on May 07Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/0629e3b2ab8a973a3e37e4e97cb9cfea.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Floder.gqe Vulnerability: Insecure Permissions Description: The malware creates an hidden insecure dir named "RECYCLER" under c:\ drive and grants change (C) permissions to the authenticated user group. Standard users can...
  • Trojan.Win32.Siscos.bqe / Insecure Permissions May 7, 2021
    Posted by malvuln on May 07Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/b4a35ae6dcceea6390769829b4e1506f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Siscos.bqe Vulnerability: Insecure Permissions Description: The malware creates a insecure dir named "Windupdt" under c:\ drive and grants change (C) permissions to the authenticated user group. Standard users can rename the...
  • Trojan.Win32.Agent.xdtv / Insecure Permissions May 7, 2021
    Posted by malvuln on May 07Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ffa9b76f9549a2c46415c855a0911e8a.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Agent.xdtv Vulnerability: Insecure Permissions Description: The malware creates an insecure installation dir under "C:\Program Files (x86)" and grants full (F) permissions to the Everyone user group. Standard users can...
  • Four vulnerabilities found in MikroTik's RouterOS May 7, 2021
    Posted by Q C on May 07Advisory: four vulnerabilities found in MikroTik's RouterOS Details ======= Product: MikroTik's RouterOS Vendor URL: https://mikrotik.com/ Vendor Status: no fix yet CVE: CVE-2020-20214, CVE-2020-20222, CVE-2020-20236, CVE-2020-20237 Credit: Qian Chen(@cq674350529) of Qihoo 360 Nirvan Team Product Description ================== RouterOS is the operating system used on the MikroTik's devices, such as switch, […]
  • Re: Four vulnerabilities found in MikroTik's RouterOS May 7, 2021
    Posted by Q C on May 07[Update 2021/05/05] Two CVEs have been assigned to two of these vulnerabilities. CVE-2020-20254: Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). CVE-2020-20253: Mikrotik RouterOs before 6.47 (stable tree) […]
  • Re: Two vulnerabilities found in MikroTik's RouterOS May 7, 2021
    Posted by Q C on May 07[Update 2021/05/05] Two CVEs have been assigned to these vulnerabilities. CVE-2020-20267: Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/resolver process. An authenticated remote attacker can cause a Denial of Service due to invalid memory access. CVE-2020-20225: Mikrotik RouterOs before 6.47 (stable tree) […]
  • Re: Three vulnerabilities found in MikroTik's RouterOS May 7, 2021
    Posted by Q C on May 07[Update 2021/05/04] Three CVEs have been assigned to these vulnerabilities. CVE-2020-20266: Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/dot1x process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). CVE-2020-20264: Mikrotik RouterOs before 6.47 (stable tree) in the […]
  • Re: Three vulnerabilities found in MikroTik's RouterOS May 7, 2021
    Posted by Q C on May 07[update 2021/05/04] Three CVEs have been assigned to these vulnerabilities. CVE-2020-20215: Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/diskd process. An authenticated remote attacker can cause a Denial of Service due to invalid memory access. CVE-2020-20216: Mikrotik RouterOs 6.44.6 (long-term tree) suffers from […]

Customers

Newsletter