Sunday, June 30, 2013

Exichniastike online fraud against 38 internet users - Nooz.gr

38 Ï?? ImI?? Î ¹ Ï?? Ï?? Ï?? Ï?? ImI ¹ Ï?? Î ± Ï?? Î ¬ Ï?? Î · Ï?? Ï?? IM Î ² Î ¬ Ï?? Î ¿Ï?? Ï?? Ï?? Î · Ï?? Ï?? Ï?? Î ½ Ï?? Î ¿Ï?? Î’Î ¹ Î ± Î’Î ¹ Î º Ï?? Ï?? Î ¿Ï?? . Î?? Î ¹ Î ± Ï?? Î · Î ½ Ï?? Ï?? Ï?? Î ¸ ImI?? Î · Ï?? Ï?? Î ½ ImI »Î ® Ï?? Î ¸ Î · 30Ï?? Ï?? Î ¿Î ½ Î ¿Ï?? Î · Î ¼ ImI’I ± Ï?? Ï?? Ï?? Ï?? Î ¿Ï?? Î º Î ± Ï?? Î · Î ³ Î ¿Ï?? ImI ¯ Ï?? Î ± Î ¹ Î ³ Î ¹ Î ± Î ± Ï?? Î ¬ Ï?? Î · Î ¼ IM Ï?? Ï?? Î ¿Î »Î ¿Î ³ Î ¹ Ï?? Ï?? Î ®, Î º Î ± Ï?? â???? ImI ¾ Î ± Î º Î ¿Î »Î ¿Ï?? Î ¸ Î · Ï?? Î · Î º Î ± Î ¹ Î º Î ± Ï?? Â???? ImI?? Î ¬ Î ³ Î ³ ImI »Î ¼ Î ±, Î º Î ± Î ¸ Ï?? Ï?? Î º Î ± Î ¹ Î ³ Î ¹ Î ± Î ± Ï?? Ï?? Ï?? ImI ¹ Ï?? Î ± Î ± Ï?? Î ¬ Ï?? Î · Ï??

Î?? Ï?? Ï?? Î »Î» Î · Ï?? Î ¸ ImI ¯ Ï??, Î’Î ¹ Î ± Ï?? Î · Î ¼ Î ¯ Î ¶ Î ¿Î ½ Ï?? Î ± Ï??  «Ï?? Î ± Î º ÎÏ?? Î ± » Î’Î ¹ Î ± Î º Î ¿Ï?? Ï?? Î ½ Î ¼ ÎÏ?? Ï?? Ï?? Î ¿Ï?? Î’Î ¹ Î ± Î’Î ¹ Î º Ï?? Ï?? Î ¿Ï?? Î ¼ IM I’ImI “ImI ± Ï?? Ï?? Î ¹ Î º ÎÏ?? Ï?? Î ¹ Î ¼ ÎÏ??, Î ± Ï?? ÎÏ?? Ï?? Î ± Ï?? IM Ï?? Ï?? Î · Î ¼ Î ± Ï?? Î ¹ Î º Ï?? Ï?? Î ¿Ï?? Ï?? Ï?? Î ¿Ï?? Ï?? Ï?? ImI?? Î ² Î ± Î ¯ Î ½ ImI ¹ Ï?? Î ¹ Ï?? 30.000 ImI?? Ï?? Ï??.

Î?? Î ¹ Î’Î ¹ Î º Ï?? Ï?? ImI?? Î ±, Î · Î’Î ¹ ImI;; ImI ?? Î ½ Î · Ï?? Î · Ï?? Î · Ï?? Ï?? Ï?? Ï?? Î ¸ ImI?? Î · Ï?? Î ¾ ImI º Î ¯ Î ½ Î · Ï?? IM Ï?? Ï?? Ï?? ImI?? Î ± Î ± Ï?? Ï?? Î º Î ± Ï?? Î ± Î ³ Î ³ ImI »Î ¯ ImI;; Ï?? Î ¿Ï?? Ï?? Ï?? Î ¿Î ² Î »Î ® Î ¸ Î · Î º Î ± Î ½ Ï?? Ï?? Î · Î ½ Î ¥ Ï?? Î ¿Î’Î ¹ ImI?? Î ¸ Ï?? Î ½ Ï?? Î · Î?? Î ¯ Ï?? Î ¾ Î · Ï?? Î?? Î »ImI º Ï?? Ï?? Î ¿Î ½ Î ¹ Î º Î ¿Ï?? Î?? Î ³ Î º Î »Î ® Î ¼ Î ± Ï?? Î ¿Ï?? Î ± Ï?? Ï?? Î’Î ¹ Î ¬ Ï?? Î ¿Ï?? Î ¿Ï?? Ï?? Î | Î ¿Ï?? ImI ¯ Ï?? Î º Î ± Î ¹ Ï?? Ï?? Î ® Ï?? Ï?? ImI;; Ï?? Î ¿Ï?? Î’Î ¹ Î ± Î’Î ¹ Î º Ï?? Ï?? Î ¿Ï??, Ï?? Î ¿Ï?? ImI ¯ Ï?? Î ± Î ½ Ï?? Ï?? Î ± Î ³ Î ¼ Î ± Ï?? Î ¿Ï?? Î ¿Î ¹ Î ® Ï?? ImI ¹ Î ± Î ³ Î ¿Ï?? Î ¬  «� �?? Î ± Î º ÎÏ?? Ï?? Î ½  »Î’Î ¹ Î ± Î º Î ¿Ï?? Ï?? Î ½ Ï?? Î ¿Ï?? Î’Î ¹ Î ± Ï?? Î · Î ¼ Î ¯ Î ¶ Î ¿Î ½ Ï?? Î ± Î ½ Î º Ï?? Ï?? Î ¯ Ï?? Ï?? Î ¼ Î-Ï?? Ï?? Ï?? Î ¿Ï?? Facebook, Ï?? Ï?? Ï?? Î ¯ Ï?? Î ± Ï?? Ï?? Î ¬ Î ½ Î ± Ï?? Ï?? Î ± Î ³ Î ¼ Î ± Ï?? Î ¿Ï?? Î ¿Î ¹ Î · Î ¸ Î ¿Ï?? Î ½ Ï?? Î ¿Ï?? Î.

Î £ Ï?? Î ¿Ï?? Î »Î ± Î ¯ Ï?? Î ¹ Î ¿Ï?? Î · Ï?? Î ± Ï?? Ï?? Ï?? Î ½ Î ¿Î ¼ Î ¹ Î º Î ® Ï?? Î º Î ± Î ¹ Ï?? Î · Ï?? Î ¹ Î ± Î º Î ® Ï?? ÎÏ?? ImI?? Î ½ Î ± Ï??, Î’Î ¹ Î ¬ Ï?? Î º ImI ¹ Î ± Ï?? Î’Ï?? Î ¿(2) Î ¼ Î · Î ½ Ï?? Î ½, Ï?? Î ¿Ï?? Î ± Î º Î ¿Î »Î ¿Ï?? Î ¸ Î · Ï?? IM, Ï?? Î ± Ï?? Ï?? Î ¿Ï?? Î ¿Î ¹ Î ® Î ¸ Î · Î º IM Î ¿Ï?? Ï?? Î »Î» Î · Ï?? Î ¸ ImI ¯ Ï?? Ï?? Ï?? Î’Î ¹ Î ± Ï?? ImI ¹ Ï?? Î ¹ Ï?? Ï?? Î ® Ï?? ImI?? Î ¯ Î ¼ Î ± Ï?? Ï?? Î ½ Ï?? Ï?? Î ¿Ï?? Î ¯ Î »Ï?? IM Î ¹ Ï?? Ï?? Î ¿Ï?? ImI» Î ¯ Î ‘ ImI;; Î º Î ¿Î ¹ Î ½ Ï?? Î ½ Î ¹ Î º Î ® Ï?? Î’Î ¹ Î º Ï?? Ï?? Ï?? Ï?? Î · Ï?? Î º Î ± Î ¹ Î’Î ¹ Î ¿Ï?? Î ³ Î ± Î ½ Ï?? Ï?? Î ® Ï?? Ï?? Ï?? Î ½ Ï?? Ï?? Î ¿Ï?? Î ¹ Î ¸ ÎÎ ¼ ImI ½ Ï?? Î ½ Ï?? Î ± Î ¾ Î ¹ Î’Î ¹ Ï?? Ï?? Î ¹ Î º Ï?? Î ½ Ï?? Î ± Î º ÎÏ?? Ï ?? Î ½.

Î § Ï?? Î · Ï?? Î ¹ Î ¼ Î ¿Ï?? Î ¿Î ¹ Ï?? Î ½ Ï?? Î ± Ï?? Ï?? Ï?? Î ³ Î º ImI º Ï?? Î ¹ Î ¼ ÎÎ ½ Î ¿Ï?? Ï?? Ï?? Ï?? Î ¿Î’Ï?? Î ¬ Ï?? Î · Ï?? (Modus operandi), Î ¿Ï?? Ï?? Î »Î» Î · Ï?? Î ¸ ImI ¯ Ï?? Î º Î ± Ï?? Î ¬ Ï?? ImI;; IM Ï?? Ï?? Î ¿Ï?? Ï?? Î ¿Î ½ Î ¹ Î º Ï?? Î’Î ¹ Î ¬ Ï?? Ï?? Î · Î ¼ Î ± Î ± Ï?? Ï?? 10-09-2012 Î-Ï?? Ï?? Î º Î ± Î ¹ 19-06-2013 Î ½ Î ± Î ± Ï?? Î ¿Ï?? Ï?? Î ¬ Ï?? ImI ¹, Î ± Ï?? Ï?? Ï?? Î ¿Ï?? Î »Î ¬ Ï?? Î ¹ Ï?? Ï?? Î ¿Î ½ Ï?? Ï?? Î ¹ Î ¬ Î ½ Ï?? Î ± Î ¿Î º Ï?? Ï?? (38) Ï?? Î ¿Î »Î ¯ Ï?? ImI?? , Ï?? Ï?? Î ½ Î ¿Î» Î ¹ Î º Ï?? Ï?? Ï?? Î · Î ¼ Î ± Ï?? Î ¹ Î º Ï?? Ï?? Î ¿Ï?? Ï?? Ï?? Î ¿Ï?? Ï?? Ï?? ImI?? Î ² Î ± Î ¯ Î ½ ImI ¹ Ï?? Î ¹ Ï?? 30,000 ImI?? Ï?? Ï??.

Î Î ¹ Î ¿Î ± Î ½ Î ± Î »Ï?? Ï?? Î ¹ Î º Î ¬, Î ¿Ï?? Ï?? Ï?? Ï?? Î ¿Ï?? Î’Ï?? Î ¬ Ï?? Î · Ï?? Ï?? Î ¿Ï?? 30Ï?? Ï?? Î ¿Î ½ Î ¿Ï??, Ï?? Ï?? Î ½ Î ¯ Ï?? Ï?? Î ± Ï?? Î ± Î ¹ Ï?? Ï?? Î · Î’Î · Î ¼ Î ¹ Î ¿ Ï?? Ï?? Î ³ Î ¯ Î ± ImI ¹ Î º Î ¿Î ½ Î ¹ Î º Ï?? Î ½ Ï?? Ï?? Î ¿Ï?? Î ¯ Î »Î ¤ Î ¿Ï?? Ï?? Î ¹ Ï?? Ï?? Î ¹ Î º Ï?? Î ½ Î?? Ï?? Î ± Ï?? ImI ¯ Ï?? Î ½ Ï?? Ï?? Î · Î ½ Î ¹ Ï?? Ï?? Î ¿Ï?? ImI »Î ¯ Î’Î ± Î º Î ¿Î ¹ Î ½ Ï? ? Î ½ Î ¹ Î º Î ® Ï?? Î’Î ¹ Î º Ï?? Ï?? Ï?? Ï?? Î · Ï?? Facebook, Î ¼ Î-Ï?? Î ± Î ± Ï?? Ï?? Ï?? Î ± Î ¿Ï?? Î ¿Î ¯ Î ± Î’Î ¹ Î ± Ï?? Î ® Î ¼ Î ¹ Î ¶ IM Ï?? Î ± Î ¾ Î ¯ Î’Î ¹ Î ± Ï?? Ï?? Î ¿Ï?? Î’Î ¹ Î ¬ Ï?? Î ¿Ï?? Î ¿Ï?? Ï?? Ï?? Ï?? Î ¿Î ¿Ï?? Î ¹ Ï?? Î ¼ Î ¿Ï?? Ï ?? Ï?? Ï?? Î ¿ImI ¾ Ï?? Ï?? ImI?? Î ¹ Î º Ï?? (Î Î ± Ï?? Î ¯ Ï?? Î ¹, Î?? Î ¿Î ½ Î’Î ¯ Î ½ Î ¿, Î?? Ï?? Î ¿Ï?? Î ¼ Ï?? Î ¬ Î ¹ Î º. Î » Ï??.) Î º Î ± Î ¹ Ï?? Î ¸ Î · Î ½ Î ¬  «Ï?? Î ± Î º ÎÏ?? Î ± » Î’Î ¹ Î ± Î º Î ¿Ï?? Ï?? Î ½.

Î £ Ï?? Î · Ï?? Ï?? Î ½ ÎÏ?? ImI ¹ Î ± ImI ¹ Ï?? ÎÏ?? Ï?? Î ± Ï?? Ï?? IM Î ± Ï?? Ï?? Ï?? Î ¿Î »Î ¯ Ï?? ImI;; Ï?? Ï?? Î · Î ¼ Î ± Ï?? Î ¹ Î º Î ¬ Ï?? Î ¿Ï?? Î ¬ Ï?? Ï?? Ï?? Ï?? Î ¿Î º Î ± Ï?? Î ± Î ² Î ¿Î »Î ® Î ³ Î ¹ Î ± Ï?? Î · Î ½ Ï?? Ï?? Î ± Î ³ Î ¼ Î ± Ï?? Î ¿Ï?? Î ¿Î ¯ Î · Ï?? Î · Ï?? Ï?? Î ½ Ï?? Î ± Î ¾ Î ¹ Î’Î ¹ Ï?? Î ½, ÎÏ?? ImI ¹ Ï?? Î ±, Ï?? Î ¼ Ï?? Ï??, Î’Î ¹ ÎÎ º Î ¿ Ï?? Ï?? IM Î º Î ¬ Î ¸ IM ImI?? Î ¹ Î º Î ¿Î ¹ Î ½ Ï?? Î ½ Î ¯ Î ± Î ¼ IM Ï?? Î ¿Ï?? Ï?? Ï?? ImI »Î ¬ Ï?? ImI;; Î º Î ± Î ¹ Ï?? Î ± Ï?? Î ± Î ¾ Î ¯ Î’Î ¹ Î ± I’ImI ½ Ï?? Ï?? Î ± Î ³ Î ¼ Î ± Ï?? Î ¿Ï?? Î ¿Î ¹ Î ¿Ï?? Î ½ Ï?? Î ± Î ½ Ï?? Î ¿Ï?? Î.

Î?? Ï?? Ï?? Ï?? Î · Î ½ Ï?? Ï?? Î ¿Î ± Î ½ Î ¬ Î º Ï?? Î ¹ Ï?? Î · Ï?? Î ¿Ï?? Î’Î ¹ ImI ½ ImI?? Î ³ Î ® Î ¸ Î · Î º IM, Ï?? Ï?? Î ¿ÎÎ º Ï?? Ï?? IM Ï?? Ï?? Î ¹ Î ¿Ï?? Ï?? Î »Î» Î · Ï ?? Î ¸ ImI ¯ Ï?? Ï?? Î · Î ½ 27-06-2013 Î ± Î ½ Î ¬ Ï?? Ï?? Î · Ï?? IM Ï?? Ï?? Î ¿Ï?? Ï?? Î ¿Ï?? Î ¬ Ï? ; IM ImI ¹ Î º Î ¿Î ½ Î ¹ Î º Ï?? Ï?? Ï?? Î ¿Ï?? Î ¯ Î »Ï?? Ï?? Î ¿Facebook. Î?? Î ± Ï?? Ï?? Ï?? Î ¹ Î ½ Î ± Ï?? Ï?? Î ¿Ï??, Ï?? Ï?? Î ¿Ï?? Î ¸ ÎÏ?? (28-06-2013), Î º Î »Î ¹ Î ¼ Î ¬ Î º Î ¹ Î ¿Î ± Ï?? Ï?? Ï?? Î ½ Î ¿Î ¼ Î ¹ Î º Ï?? Î ½ Ï?? Î · Ï?? Î ¥ Ï?? Î ¿Î’Î ¹ ImI?? Î ¸ Ï?? Î ½ Ï?? Î · Ï?? Î?? Î ¯ Ï?? Î ¾ Î · Ï?? Î?? Î »ImI º Ï?? Ï?? Î ¿Î ½ Î ¹ Î º Î ¿Ï?? Î?? Î ³ Î º Î »Î ® Î ¼ Î ± Ï?? Î ¿Ï?? Ï?? Ï?? Î ± Î ³ Î ¼ Î ± Ï?? Î ¿Ï?? Î ¿Î ¯ Î · Ï?? IM Î ± Î ¹ Ï?? Î ½ Î ¹ Î’Î ¹ Î ± Ï?? Ï?? Î ¹ Î º Î ® ÎÏ?? ImI; ? Î ½ Î ± Ï?? Ï?? Î · Î ½ Î ¿Î ¹ Î º Î ¯ Î ± Ï?? Î ¿Ï?? Ï?? Ï?? Î · Î?? ImI?? Ï?? Î ± Î »Î ¿Î ½ Î ¯ Î º Î ·, Î º Î ± Ï?? Î ¬ Ï?? Î · Î ½ Î ¿Ï?? Î ¿Î ¯ Î ± Î ² Ï?? ÎÎ ¸ Î · Î º Î ± Î ½ Î º Î ± Î ¹ Î º Î ± Ï?? Î ± Ï?? Ï?? ÎÎ ¸ Î · Î º Î ± Î ½:

 · Î’Ï?? Î ¿(2) Î º Î ¹ Î ½ Î · Ï?? Î ¬ Ï?? Î · Î »ÎÏ?? Ï?? Î ½ Î ± Î ¼ IM Î ¹ Ï?? Î ¬ Ï?? Î ¹ Î ¸ Î ¼ ImI;; Î º Î ¬ Ï?? Ï?? ImI;; SIM, ImI º Ï?? Ï?? Î ½ Î ¿Ï?? Î ¿Î ¯ Ï?? Î ½ Ï?? Î ¿ÎÎ ½ Î ± (1) Ï?? Ï?? Î · Ï?? Î ¹ Î ¼ Î ¿Ï?? Î ¿Î ¹ Î ® Î ¸ Î · Î º IM Î ³ Î ¹ Î ± Ï?? Î · Î ½ Ï?? ÎÎ »ImI?? Î · Î ¼ Î ¹ Î ± Ï?? Î ± Ï?? Ï?? Ï?? Î ¹ Ï?? Î ± Ï?? Î ¬ Ï?? ImI;; Ï?? Î ¿Ï?? ImI ¾ Î ¹ Ï?? Î ½ Î ¹ Î ¬ Ï?? Ï?? Î · Î º Î ± Î ½.

 · Î’Ï?? Î ¿(2) ImI?? Ï?? Ï?? ImI?? Î ¹ Î º Î ¿ Î ¯ Ï?? Î º Î »Î · Ï?? Î ¿Î ¯ Î’Î ¯ Ï?? Î º Î ¿Î ¹

 · Î’Ï?? Î ¿(2) Î º Î ¹ Î ½ Î · Ï?? ÎÏ?? Ï?? Ï?? Ï?? Î º ImI?? Î-Ï?? Î ± Ï?? Î ® Ï?? (Tablet).

Î ¤ Î ± Î º Î ± Ï?? Î ± Ï?? Ï?? ImI ¸ ÎÎ ½ Ï?? Î ± Ï?? Î · Ï?? Î ¹ Î ± Î º Î ¬ Ï?? ImI ¹ Ï?? Ï?? Î ® Ï?? Î ¹ Î ± Î ± Ï?? ImI?? Ï?? Î ¬ Î »Î · Ï?? Î ± Î ½ Î ³ Î ¹ Î ± ImI?? Î ³ Î ± Ï?? Ï?? Î · Ï?? Î ¹ Î ± Î º Î ® ImI ¾ ÎÏ?? Î ± Ï?? Î · Ï?? Ï?? Î · Î ½ Î ¥ Ï?? Î ¿Î’Î ¹ ImI?? Î ¸ Ï?? Î ½ Ï?? Î · Î ?? Î ³ Î º Î »Î · Î ¼ Î ± Ï?? Î ¿Î» Î ¿Î ³ Î ¹ Î º Ï?? Î ½ Î?? Ï?? ImI?? Î ½ Ï?? Î ½ Î?? Î ¿Ï?? ImI ¯ Î ¿Ï?? Î?? Î »Î» Î ¬ Î’Î ¿Ï??.

Î?? Ï?? Ï?? Î »Î» Î · Ï?? Î ¸ ImI ¯ Ï?? Î ¿Î’Î · Î ³ Î ® Î ¸ Î · Î º IM Ï?? Ï?? Î ¿Î ½ Î º. Î?? Î ¹ Ï?? Î ± Î ³ Î ³ ImI »ÎÎ ± Î Ï?? Ï?? Ï?? Î ¿Î’Î ¹ Î º Ï?? Î ½ Î?? ImI?? Ï?? Î ± λ Î ¿Î ½ Î ¯ Î º Î · Ï ?? , ImI ½ Ï?? ImI;; ImI?? Î ½ Î ¬ Ï?? Î ± Î ¹ Î · Ï?? Ï?? Î ¼ Î ¼ ImI?? Î ¿Ï?? Î ® Ï?? Î ¿Ï?? Î º Î ± Î ¹ Ï?? IM Ï?? Î ¼ Î ¿Î ¹ ImI;; Ï?? Ï?? Î ¬ Î ¾ ImI ¹ Ï??, Î ³ Î ¹ Î ± Î ½ Î ± Ï?? Ï?? Î ¿Ï?? Î’Î ¹ Î ¿Ï?? Î ¹ Ï?? Ï?? ImI ¯ Ï?? Î ¿Î ¼ ÎÎ ³ ImI ¸ Î ¿Ï?? Ï?? Î · Ï?? Î ± Ï?? Î ¬ Ï?? Î · Ï??.

Î?? IM Î ± Ï?? Î ¿Ï?? Î ¼ Î ® Ï?? Î · Î ½ Ï?? Ï? ? Î ³ Î º ImI º Ï?? Î ¹ Î ¼ ÎÎ ½ Î · Ï?? Ï?? Ï?? Î ¸ ImI?? Î ·, Î · Î ¥ Ï?? Î · Ï?? ImI?? Î ¯ Î ± Î?? Î ¹ Î º Î ¿Î ½ Î ¿Î ¼ Î ¹ Î º Î ® Ï?? Î?? Ï?? Ï?? Ï?? Î ½ Î ¿Î ¼ Î ¯ Î ± Ï?? Î º Î ± Î ¹ Î?? Î ¯ Ï?? Î ¾ Î · Ï?? Î?? Î »ImI º Ï?? Ï?? Î ¿Î ½ Î ¹ Î º Î ¿Ï?? Î?? Î ³ Î º Î »Î ® Î ¼ Î ± Ï?? Î ¿Ï?? Ï?? Ï?? Î ¼ Î ² Î ¿Ï?? Î »ImI;; ImI ¹ Ï?? Î ¿Ï?? Ï?? Ï?? Ï?? Î ® Ï?? Ï?? ImI;; Ï?? Î ¿Ï?? Î’Î ¹ Î ± Î’Î ¹ Î º Ï?? Ï?? Î ¿Ï??:

  • Î?? Î ± ImI ½ Î · Î ¼ ImI?? Ï?? Î ½ Î ¿Î ½ Ï?? Î ± Î ¹ Ï ?? Ï?? ImI?? Î ¹ Î º Î ¬ Î ¼ IM Ï?? Î · Î ½ Ï?? Î ± Ï?? Ï?? Ï?? Ï?? Î · Ï?? Î ± Î º Î ± Î ¹ Ï?? Î · Î ½ Î ± Î ¾ Î ¹ Î ¿Ï?? Î ¹ Ï?? Ï?? Î ¯ Î ± Ï?? Ï?? Î ½ Î · Î »ImI º Ï?? Ï?? Î ¿Î ½ Î ¹ Î º Ï?? Î ½ Î º Î ± Ï?? Î ± Ï?? Ï?? Î · Î ¼ Î ¬ Ï?? Ï?? Î ½ Î ³ Î ¹ Î ± Ï?? Î ± Î ¿Ï?? Î ¿Î ¯ Î ± Î ¸ Î ± Ï?? Ï?? ÎÏ?? ImI ¹ Î ½ Î ± Ï? ? Ï?? Î ¿Ï?? Î’Î ¹ Î ¿Ï?? Î ¯ Î ¶ Î ¿Î ½ Ï?? Î ± Î ¹ Î ¾ ImI º Î ¬ Î ¸ Î ± Ï?? Î ± Ï?? Î ± Ï?? Ï?? Î ¿Î ¹ Ï?? ImI ¯ Î ± Ï?? Î · Ï?? ImI?? Î ± Î ¹ Ï?? ImI ¯ Î ± Ï??, Î’Î · Î »Î ± Î’Î ® Ï?? Î ¿Ï?? Î ½ Î ¿Î ¼ Î ±, Î · Î’Î ¹ ImI?? Î ¸ Ï?? Î ½ Ï?? Î ·, Î ¿Î ± Ï?? Î ¹ Î ¸ Î ¼ Ï?? Ï?? Ï?? Î · Î »ImI?? Ï?? Î ½ Î ¿Ï?? Î º Î ± Î ¹ Ï?? Î ± Ï?? Ï?? Î ¿Î ¹ Ï?? ImI ¯ Î ± ImI?? Î ¹ Î º Î ¿Î ¹ Î ½ Ï?? Î ½ Î ¯ Î ± Ï??.
  • Î?? Î ± Î º Î ¬ Î ½ Î ¿Ï?? Î ½ Ï?? Î ¹ Ï?? Î ± Î ³ Î ¿Ï?? Î-Ï?? Ï?? Î ¿Ï?? Ï?? Ï?? IM Î ¹ Ï?? Ï?? Î ¿Ï?? ImI »Î ¯ I’ImI;; Ï?? Î ¿Ï?? Ï?? Î ± Ï?? ÎÏ?? Î ¿Ï?? Î ½  «Î ± Ï?? Ï?? Î ± λ ImI ¯ Ï?? Ï?? Ï?? Î ½ Î ± Î »Î» Î ± Î ³ ÎÏ??  », Î ² Î ¬ Ï?? ImI ¹ Î’Î ¹ ImI ¸ Î ½ Ï?? Î ½ Ï?? Î ¹ Ï?? Ï?? Î ¿Ï?? Î ¿ Î ¹ Î ® Ï?? ImI?? Î ½.
  • Î?? Î ± Î ± Ï?? Î ¿Ï?? ImI?? Î ³ Î ¿Ï?? Î ½ Ï?? Î ¹ Ï?? Î · Î »ImI º Ï?? Ï?? Î ¿Î ½ Î ¹ Î º Î-Ï?? Ï?? Ï?? Î ½ Î ± Î »Î» Î ± Î ³ Î-Ï?? Î ± Ï?? Ï?? Ï?? Ï?? Î ¿Î »Î ¿Î ³ Î ¹ Ï?? Ï?? Î-Ï?? Ï?? Ï?? Î ¯ Ï?? Ï?? Î ½ Î ® Î’Î · Î ¼ Ï?? Ï?? Î ¹ Î ± Ï?? Ï?? Î ¿Ï?? Î ² Î ¬ Ï?? Î ¹ Î ¼ Î ¿Ï?? Ï?? (Ï??. Ï??. Î ± Ï?? Ï?? Î?? Î ½ Ï?? ImI?? Î ½ ImI?? Î º Î ± Ï?? Î).
  • Î?? Î ± Ï?? Ï?? Î »Î ¬ Ï?? Ï?? Î ¿Ï?? Î ½ Ï?? Î ¿Ï?? Ï?? Î º Ï?? Î’Î ¹ Î º Î ¿Ï?? Ï?? Ï?? IM Î ± Ï?? Ï?? Î ± Î »Î-Ï?? Î ¼ Î-Ï?? Î ¿Ï??. Î?? Î ± Î ¼ Î · Î ½ Ï?? Ï?? Î · Ï?? Î ¹ Î ¼ Î ¿Ï?? Î ¿Î ¹ Î ¿Ï?? Î ½ Î ³ Î ¹ Î ± Î º Ï?? Î’Î ¹ Î º Ï?? Î ¿Î ½ Ï?? Î ¼ Î ± Ï?? Î ± Î ¿Î ¹ Î º ImI ¯ Ï?? Î ½, Î · Î ¼ ImI?? Î ¿Î ¼ Î · Î ½ Î ¯ ImI;; Î ³ ÎÎ ½ Î ½ Î · Ï?? Î · Ï??, ImI;; ImI;; ImI ¯ Ï?? Î ½, Î º. Î »Ï??., Ï?? Î ¿Ï?? ImI?? Î º Î ¿Î »Î ± Î ¼ Ï?? Î ¿Ï?? ImI ¯ Î ½ Î ± Ï?? Ï?? Î ¿Î ² λ ImI?? Î ¸ Î ¿Ï?? Î ½.
  • Î ¤ Î ± Ï?? Î ± Ï?? Î ± Î º Ï?? Î · Ï?? Î ¹ Ï?? Ï?? Î ¹ Î º Î ¬ Ï?? Î ¿Ï?? Ï?? Ï?? Î ¿Ï?? Ï?? Î ½ Ï?? Î ¿Ï?? Ï?? Ï?? ÎÏ?? ImI ¹ Î ½ Î ± ImI ¯ Î ½ Î ± Î ¹ Ï?? Î ± Ï?? Î ®. Î?? Î’Î ¹ Î ± Î ¯ Ï?? ImI?? Î · Ï?? Ï?? Î ¿Ï?? Î ¿Ï?? Î ® Î ½ Î ± Î’Î ¯ Î ½ ImI?? Î ± Î ¹ Ï?? Ï?? Î · Î ½ Ï?? Î ¹ Î ¼ Î ® Ï?? Î ¿Ï?? Ï?? Ï?? Î ¿Ï?? Ï?? Î ½ Ï?? Î ¿Ï??, Ï?? Î ¿Î ½ Ï?? Ï?? Ï?? Ï?? Î ¿Ï?? Î »Î · Ï?? Ï?? Î ¼ Î ® Ï??, Ï?? Î ¿Ï?? Ï?? Ï?? Î ½ Î ¿Ï?? Î ± Ï?? Î ¬ Î’Î ¿Ï?? Î · Ï?? Î º Î ± Î ¹ Ï?? Î · Î ½ Ï?? Î ¿Î »Î ¹ Ï?? Î ¹ Î º Î ® ImI?? Î ¹ Ï?? Ï?? Ï?? Î ¿Ï?? Ï?? Î ½-Î ± Î º Ï?? Ï? ? Ï?? Ï?? ImI?? Î ½.
  • Î?? Î ¹ Ï?? Ï?? Î ¿Î ¹ Ï?? Ï?? Î ® Ï?? Î · Ï?? Ï?? Î · Ï?? Ï?? Ï?? Î ½ Î ± Î »Î» Î ± Î ³ Î ® Ï?? Ï?? Ï?? ÎÏ?? ImI ¹ Î ½ Î ± ImI ¯ Î ½ Î ± Î ¹ Ï?? Ï?? Î ¿Ï?? Î ² Î ¬ Ï?? Î ¹ Î ¼ Î ¿Î ¹ Î º Î ± Î ¹ Î’Î ¹ Î ± Ï?? Î ± Î ½ ImI ¯ Ï??.
  • Î?? Î ¹ Î ± Î · Î »ImI º Ï?? Ï?? Î ¿Î ½ Î ¹ Î º ÎÏ?? Î ± Î ³ Î ¿Ï?? Î-Ï?? ImI ¯ Î ½ Î ± Î ¹ Ï?? Ï?? Î ¿Ï?? Î ¹ Î ¼ Ï?? Ï?? ImI;; ImI;; Î ¿Î ¹ Ï?? Ï?? Î ¿Ï?? Î »Î · Ï?? Ï?? Î ¼ ÎÎ ½ ImI;; Ï?? Î ¹ Ï?? Ï?? Ï?? Ï?? Î ¹ Î º Î-Ï?? Î º Î ¬ Ï?? Ï?? ImI??, Ï?? Î ¿Ï?? ImI »Î ± Ï?? Î ¹ Ï?? Ï?? Î ¿Ï?? Î ¿Î ¹ Î ¿Ï?? Î ½ Ï?? Î ¿Î ½ Î º Î ¯ Î ½ Î’Ï?? Î ½ Î ¿Î ¿Î ¹ Î º Î ¿Î ½ Î ¿Î ¼ Î ¹ Î º Î ® Ï ;; Î ¶ Î · Î ¼ Î ¯ Î ± Ï??.
  • IM
  • Î £ Ï?? ImI?? Î ¯ Ï?? Ï?? Ï?? Ï?? Î · Ï?? Î ¿Ï?? Î’Î ¹ Î ± Ï?? Î ¹ Ï?? Ï?? Ï?? Ï?? Î ¿Ï?? Î ½ Ï?? Ï?? Î ¹ ÎÏ?? Î ¿Ï?? Î ½ Ï?? ÎÏ?? ImI ¹ Î ¸ Ï?? Î ¼ Î ± Ï?? Î ± Î’Î ¹ Î ± Î’Î ¹ Î º Ï?? Ï?? Î ± Î º Î ® Ï?? Î ± Ï?? Î ¬ Ï?? Î · Ï??, Î ½ Î ± Î ± Ï?? ImI?? Î ¸ Ï?? Î ½ Î ¸ Î ¿Ï?? Î ½ Ï?? Ï?? Î · Î ½ Î ¥ Ï?? Î ¿Î’Î ¹ ImI?? Î ¸ Ï?? Î ½ Ï?? Î · Î?? Î ¯ Ï?? Î ¾ Î · Ï?? Î?? Î »ImI º Ï?? Ï?? Î ¿Î ½ Î ¹ Î º Î ¿Ï?? Î?? Î ³ Î º Î »Î ® Î ¼ Î ± Ï?? Î ¿Ï??, Î ¼ ÎÏ?? Ï?? Ï?? Î ¿Ï?? Ï?? Î · Î »ImI?? Ï?? Î ½ Î ¹ Î º Î ¿Ï?? Î ± Ï?? Î ¹ Î ¸ Î ¼ Î ¿Ï?? 210 6476464 Î ® Ï?? Î · Ï?? Î · Î »ImI º Ï?? Ï?? Î ¿Î ½ Î ¹ Î º Î ® Ï?? Î’Î ¹ ImI?? Î ¸ Ï?? Î ½ Ï?? Î · Ï?? ccu@cybercrimeunit.gov.gr.

Saturday, June 29, 2013

The electronic syntagografisi should have done a ... - Express

Ç çëåêôñïíéêÞ óõíôáãïãñÜöéóç èá Ýðñåðå íá åß ÷ å ãßíåé åäþ êáé ÷ ñüíéá, ôüíéóå ï Á. Ãåùñãéáäçò

ÐçãÞ : ÁÐÅ 26/06/13-18: 31


Ç ìåãáëýôåñç áðïôõ ÷ ßá ôùí ôåëåõôáßùí åôþí åßíáé üôé ÷ ñåéáóôÞêáìå ôçí ôñüéêá, ãéá íá êÜíïõìå ðñÜãìáôá áðïëýôùò áõôïíüçôá ðïõ Ýðñåðå íá Ý ÷ ïõìå êÜíåé ðïëý ðéï ðñéí, üðùò ç çëåêôñïíéêÞ óõíôáãïãñÜöçóç, áíÝöåñå, ìåôáîý Üëëùí, ï íÝïò õðïõñãüò Õãåßáò ‘Áäùíéò ÃåùñãéÜäçò, óå óýíôïìï ÷ áéñåôéóìü ôïõ óôçí çìåñßäá «Ç Õãåßá óôçí øçöéáêÞ åðï ÷ Þ . ÇëåêôñïíéêÞ óõíôáãïãñÜöçóç: ÐñïêëÞóåéò êáé ÐñïïðôéêÝò »« Ëïéðüí, ôçí êÜíáìå, ðñï ÷ ùñÜ. Ìå ôá íÝá èåñáðåõôéêÜ ðñùôüêïëëá êáé ìå üëåò ôéò óõíôáãïãñáöéêÝò ìåèüäïõò ðï õ èá ÷ ñçóéìïðïéÞóïõìå êáé ðïõ ìðáßíïõí óå åöáñìïãÞ, èá ìðïñïýìå íá Ý ÷ ïõìå ìå áóöÜëåéá ìéá ðéï óùóôÞ äéá ÷ åßñéóç áõôïý ôïõ äçìïóßïõ ðëïýôïõ, ðñïóðÜèåéá óôçí ïðïßá ðñÝðåé üëïé íá óõíäñÜìïõìå, ãéáôß åßíáé ôï êïéíü ìáò óõìöÝñïí, ü ÷ é ãéáôß ìáò ôï åðéâÜëëåé êÜðïéïò », óõìðëÞñùóå ï ê. ÃåùñãéÜäçò.

From 28/6 to 12/7 online submission of computer ... - PROFIT Online

The page you are looking for might have been removed, had its name changed, or is temporarily unavailable.

Please try the following:

  • Make sure that the Web site address displayed in the address bar of your browser is spelled and formatted correctly.
  • If you reached this page by clicking a link, contact the Web site administrator to alert them that the link is incorrectly formatted.
  • Click the Back button to try another link.


Technical Information (for support personnel)

  • Go to Microsoft Product Support Services and perform a title search for the words HTTP and 404 .
  • Open IIS Help , which is accessible in IIS Manager (inetmgr), and search for topics titled Web Site Setup , Common Administrative Tasks , and About Custom Error Messages .

Protect yourself from online monitoring - NovaSPOR FM 94.6

Salo recently caused the scandal PRISM to monitor citizens through the internet and specific social networking websites.

The fact that any government agency can have access to our personal data has shaken the users of the Internet. There are three simple ways to reduce as much as possible this threat.

Let encrypt everything!

The concept of encryption has existed for many years. Indeed, the written word is seen by many as a kind of coding that is understood by a wide audience. On the other side cryptography to electronic files, has to do with the protection of the data contained on a hard drive in a Cloud network or any other electronic storage medium.

To encode our files is perhaps the simplest way to protect our personal data. Both Windows and Mac OS, are embedded systems, known as Bitlocker and FileVault respectively.

Let safely surf

prerequisite is enable the firewall on our computer and install a antivirus. Besides these moves but you should keep in mind what information is shared with different websites. For example, few know that Google stores the records of our search. Of course, anyone who can not be separated from the best search engine in the world, you just throw a look at Tor (The Onion Router).

The Tor Project encrypts many times our original message (ie the word or Search suggestions) before sending our information through a random series transmitters, until they reach the destination server. The same thing happens with the search results that arrive in our computer.

Simple logic

Do we stay connected to the accounts when just surfing the Internet. Also good is to activate the privacy settings available to the browser. Also, we can minimize the information shared on the Internet, especially on social networks. It makes sense for everyone to want to share with your friends on Facebook some nice moments, but there are few cases where users were robbed, just because they post something on their wall.

to use security settings provides us with Facebook, to protect our account. In the settings menu, you activate all options by the safe navigation up alerts to connect to our account.

Finally, very important to frequently delete the history of your browser and have the mind in various emails that do not know the sender. Generally be smart before you share any important information and surf carefree.

Source: newsbeast.gr

Friday, June 28, 2013

Protect yourself from online monitoring - Newsbeast.gr

Salo recently caused the scandal PRISM to monitor citizens through the internet and specific social networking websites.

The fact that any government agency can have access to our personal data has shaken Internet users . There are three simple ways to reduce as much as possible this threat.

Let encrypt everything!

The concept of encryption has existed for many years . Indeed, the written word is seen by many as a kind of coding that is understood by a wide audience. On the other side cryptography to electronic files, has to do with the protection of the data contained on a hard drive in a Cloud network or any other electronic storage medium.

To encode our files is perhaps the simplest way to protect our personal data. Both Windows and Mac OS, are embedded systems, known as Bitlocker and FileVault respectively.

Let safely surf

prerequisite is enable the firewall on our computer and install a antivirus. Besides these moves but you should keep in mind what information is shared with different websites. For example, few know that Google stores the records of our search. Of course, anyone who can not be separated from the best search engine in the world, you just throw a look at Tor (The Onion Router).

The Tor Project encrypts many times our original message (ie the word or Search suggestions) before sending our information through a random series transmitters, until they reach the destination server. The same thing happens with the search results that arrive in our computer.

Simple logic

Do we stay connected to the accounts when just surfing the Internet. Also good is to activate the privacy settings available to the browser. Also, we can minimize the information shared on the Internet, especially on social networks. It makes sense for everyone to want to share with your friends on Facebook some nice moments, but there are few cases where users were robbed, just because they post something on their wall.

to use security settings provides us with Facebook, to protect our account. In the settings menu, you activate all options by the safe navigation up alerts to connect to our account.

Finally, very important to frequently delete the history of your browser and have the mind in various emails that do not know the sender. Generally be smart before you share any important information and surf carefree.

From today online schools preference - AFP

Redirect Notice

The previous page is sending you to

http://www.enet.gr/?i=issue.el.home

.

If you do not want to visit that page, you can return to the previous page.

Eurodisney: Fine of 150,000 euros to ... electronic kataskpopia ... - Daily

Redirect Notice

The previous page is sending you to

http://www.imerisia.gr/article.asp?catid=26511

.

If you do not want to visit that page, you can return to the previous page.

From 28 June to 12 July, the electronic submission of ... - Daily - Veria

From Friday, June 28th, and as Friday, July 12, will be able to electronically submit candidates of General Lyceum and EPAL their computerized bulletin (NA) via email at

exams.minedu.gov.gr.

As announced by the Ministry of Education, the early days of the process, ie by Monday, July 1, candidates will not be able to finalize the entry form, but only to edit and make caching, that once familiar with implementation by the next day, Tuesday, July 2, before they can finalize. Also, the scores of specific courses will be announced early next week. Recall that this deadline is exclusive and after the lapse of no candidate will be able to finalize its computer bulletin.

As announced by the Ministry of Education, with a personal security code (password) and the 8-digit code exam, candidates can visit the web address exams.minedu.gov.gr. There you can find the number, the bases of older years, FAQs, Form TA’s instructions and of course the online TA.

By entering the electronic PTW see filled out their details, the special case in which they may belong, and then the segments, sorted by field (for candidates of General Lyceum and EPAL-B) or sector (for candidates OPF-A ‘). After you make a first choice with some preferences should initially choose temporary storage. This process of caching can make as many times as they want until you feel ready. In their final visit will go again all the first steps if you want to change some preferences again and reach the final step of finalizing.

After finalizing to be done within the time limit (as 12.7.2013), the TA now acquires protocol number (top right of page) and it is good that the finalized TA to print and / or save it to their computer. In all the above procedures, the electronic application with a user friendly environment, then gives instructions on the steps of the candidate.

Given the fact that many candidates will need support to complete the safety or may need to use computers in secondary schools for the submission of the bulletin, their two weeks of July the schools will operate as follows:

– One day each week the High Schools will work with staff on call, as they have already done their planning.

– All General High Schools and will be supplemented by additional OPF Tuesday 07/02/2013, Friday 07/05/2013, Tuesday 09/07/2013 and Friday 12.7.2013 in the presence of the Director or Deputy Director and authorized training for handling of electronic application of computer bulletin.

These four days have delayed those candidates may contact their high school or affiliation to any particular case or to obtain a password (if you did not have time or if he lost).

Thursday, June 27, 2013

From tomorrow, Friday the electronic submission of EDP - Patras Times

From the Ministry of Education informed that from Friday 28/06/2013 to Friday 07/12/2013, candidates GEL and EPAL can visit the web address http://exams.minedu.gov. gr and submit the entry form (MC)

the early days, ie by Monday 01/07/2013, the candidates will not be able to finalize the MC, but just edit it and make temporary storage, that once familiar with the application from Tuesday 02/07/2013 to can and finalize MD

Scores of specific courses will be announced early next week.

reminded that the deadline is exclusive and after the lapse of no candidate will be able to finalize the NA

Stages for NA

With personal security code (password) and the 8-digit code exam, candidates can visit the web address http://exams.minedu.gov.gr. There you can find the number, the bases of older years, FAQs, Form SD with the instructions of the electronic and physical NA

By entering the electronic MC, see filled out their details, the special case in which any part and then the sections, sorted by field (for candidates GEL and EPAL-B) or sector (for candidates OPF-A). After you make a first choice with some preferences should initially choose temporary storage. This process caching can make as many times as they want until you feel ready. In their final visit, will go again all the first steps if you want to change some preferences again and will make the final step of finalization.

After finalizing to be done within the time limit (as 12/7/13), the MC now acquires protocol number (top right of page) and it is good that the finalized MD to print and / or save it on their computer. In all the above procedures, the electronic application with a user friendly environment, then gives instructions on the steps of the candidate.

days when the high schools

Because some candidates will need support to complete the safety or may need to use computers in high schools for the submission of the bulletin, their two weeks of July the High Schools will operate as follows:

– One day each week the High Schools will work with staff on call, as they have already done their planning.

– All GEL and will be supplemented by additional OPF Tuesday 02/07/2013, Friday 05/07/2013, Tuesday 09/07/2013 and Friday 07/12/2013 in the presence of the Director or Deputy Director and authorized training for the handling of electronic application of computer bulletin.

These four days have delayed those candidates may contact their high school or affiliation to any particular case or to obtain a password (if you did not have time or if he lost).

By 12 July the electronic submission of IT for university ... - Iefimerida

From Friday 28/06/2013 to Friday 12/07/2013, candidates of General Lyceum (GEL) and Vocational Lyceum (EPAL) can visit the web address http://exams.minedu.gov . gr and submit the entry form.

As announced by the Ministry of Education, the early days, ie until Monday 01/07/2013, the candidates will not be able to finalize the MC, but only to edit and make caching so, since, become familiar with the application by Tuesday 02.07.2013 they can finalize. Reminded that the deadline is exclusive and after the lapse of no candidate will be able to finalize the NA

Scores of specific courses will be announced early next week.

The stages for the Bulletin Processing (SD) are as follows:

With personal security code (password) and the 8-digit code exam, candidates can visit the web address http://exams.minedu.gov.gr.

There they can find their number, the bases of older years, FAQs, Form SD with the instructions of the electronic and physical NA

By entering the electronic MC, see filled out their details, the special case in which any part and then the sections, sorted by field (for candidates GEL and EPAL-B) or sector (for candidates OPF-A ‘).

After

make a first choice with some preferences initially have to choose “Temporary Storage».

this process of caching can make it as many times as they want until you feel ready.

In their final visit, will go again all the first steps, if they will change again some preferences, and will arrive at the final step of the “Finalize».

After finalizing to be done within the time limit (until 07/13/12), the MC now acquires protocol number (top right of page) and it is good that the finalized MD to print and / or save it on their computer.

In all the above procedures, the electronic application with a user friendly environment, then gives instructions on the steps of the candidate.

The Ministry of Education notes in particular that because some candidates will need support for the completion of their slip, or you need to use computers in secondary schools for the submission of the bulletin, their two weeks of July the schools will operate as follows:

– One day each week the High Schools will work with staff on call, as they have already done their planning.

– All GEL and will be supplemented by additional OPF Tuesday 02/07/2013, Friday 05/07/2013, Tuesday 09/07/2013 and Friday 07/12/2013 in the presence of the Director or the Deputy Director and authorized training for handling the electronic application of computer bulletin.

These four days have delayed those candidates may contact their high school or affiliation to any particular case or to gain personal security code (If you missed or if he lost).

From 28/6 electronic submission IT - TVXS

Photo: Panagiotis conservatory / FosPhotos


On Friday, June 28 through Friday, July 12, candidates GEL and EPAL can visit the web address http://exams.minedu.gov.gr and submit the entry form, announced today the Ministry of Education .

the early days, ie by Monday, July 1, candidates will not be able to finalize the TA, but only to edit it and make temporary storage, that once familiar with the application by Tuesday, July 2 to can and finalize the TA.

Scores of specific courses will be announced early next week.

reminded that the deadline is exclusive and after the lapse of no candidate can finalize the SD

Stages for NA

With personal security code (password) and the 8-digit code based testing Candidates can visit the web address http://exams.minedu.gov.gr. There you can find the number, the bases of older years, FAQs, Form TA’s instructions and of course the online TA.

By entering the electronic PTW see pre-checked their data, the special case in which any part and then the sections, sorted by field (for candidates GEL and EPAL-B) or sector (for candidates OPF-A). After you make a first choice with some preferences sho uld initially choose temporary storage. This process caching can make as many times as they want until you feel ready. In their final visit, will go again all the first steps if you want to change some preferences again and will make the final step of finalization.

After finalizing to be done within the time limit ( as 13/7/12), the MC now acquires protocol number (top right of page) and it is good that the finalized MD to print and / or save it on their computer. In all the above procedures, the electronic application with a user friendly environment, then gives instructions on the steps of the candidate.

Days when the high schools

As some candidates will need support to complete the safety or may need to use computers for high schools to submit the card, their two weeks of July the High Schools will operate as follows:

  • One day each week the High Schools will work with staff on call, as they have already done their planning.
  • All GEL and will be supplemented by additional OPF Tuesday 02/07/2013, Friday 05/07/2013, Tuesday 07/09/2013 and Friday 12/07/2013 in the presence of the Director or Assistant Director and authorized training for handling the electronic application of computer bulletin.

These four days have delayed those candidates may contact their high school or affiliation to any particular case or to obtain a password (if you did not have time or if he lost).

From tomorrow the electronic submission of IT - Zougla

First registration: January 27 ??????? 2013, 20:19

From tomorrow, Friday begins the presentation of computerized listing of candidates for admission to tertiary education.

bases 2013 to be announced late August, not only determined by the performance of candidates in relation the previous year.

play an important role, too, the choices of candidates in entry form as the criteria is no longer the same for all candidates (eg city).

addition, another factor is the number of students per class, which this year specifically to reshaping the academic map and design “ATHENA” will affect the determination of base significantly.

Completion of computer will be made for the third consecutive time this year online.
supplementing the candidates will have to enter the specific application that is available online at http://exams.minedu.gov.gr

Mind the computer:

1) Candidates should take your personal security code (password) of the high school from which they graduated.

2) From high school will get the General extent of access to which the degrees of national university after adjusting the oral mark in written.

3) Then should finalize its computer and submit it electronically. After finalizing can not make any changes.

4) If a candidate belongs to a special category should have ready the necessary documents dated no later than the date of the computer. The documentary will testify at school success. If it is incomplete or false, candidates will be deleted and punished with exclusion from nationwide for two years.

5) When the graduates enter the website of the ministry, must follow the detailed steps for completing of computer. They can make those combinations they want and modify them, but do finalization.

6) When candidates do finalization of computer, you should not forget to keep a copy.

The process ends on 12 July.

Editor: Myrto Tsavalou

Modified: Wednesday, 27 ??????? 2013, 20:19

CAMPAIGNS: From Friday the electronic submission of ... - Tribune Online

From tomorrow, Friday, June 28, and as Friday, July 12, will be able to electronically submit candidates of General Lyceum and EPAL their computerized bulletin (NA) via email at exams.minedu.gov.gr.

As announced by the Ministry of Education, the early days of the process, ie by Monday, July 1, candidates will not be able to finalize the entry form, but only to edit and make caching, that once familiar with implementation by the next day, Tuesday, July 2, before they can finalize.

Also, the scores of specific courses will be announced early next week.

reminded that this deadline is exclusive and after the lapse of no candidate will be able to finalize its computer bulletin.

Stages submission sheet

As announced by the Ministry of Education, with a personal security code (password) and the 8-digit code exam, candidates can visit the web address exams.minedu.gov.gr. There you can find the number, the bases of older years, FAQs, Form TA’s instructions and of course the online TA.

By entering the electronic PTW see filled out their details, the special case in which they may belong, and then the segments, sorted by field (for candidates of General Lyceum and EPAL-B) or sector (for candidates OPF-A ‘). After you make a first choice with some preferences should initially choose temporary storage. This process of caching can make as many times as they want until you feel ready. In their final visit will go again all the first steps if you want to change some preferences again and reach the final step of finalizing.

After finalizing to be done within the time limit (as 12.7.2013), the TA now acquires protocol number (top right of page) and it is good that the finalized TA to print and / or save it to their computer. In all the above procedures, the electronic application with a user-friendly environment, then gives instructions on the steps of the candidate.

days when the high schools

Given the fact that many candidates will need support to complete the safety or may need to use computers in secondary schools for the submission of the bulletin, their two weeks of July the schools will operate as follows:

– One day each week the High Schools will work with staff on call, as they have already done their planning.

– All General High Schools and will be supplemented by additional OPF Tuesday 07/02/2013, Friday 07/05/2013, Tuesday 09/07/2013 and Friday 12.7.2013 in the presence of the Director or Deputy Director and authorized training for handling of electronic application of computer bulletin.

These four days have delayed those candidates may contact their high school or affiliation to any particular case or to obtain a password (if you did not have time or if he lost).

Computers recognize human emotions ... - SigmaLive

A computer can “understand” the anxiety, the natural state of man, and there is even a camera that “refuses” to photograph, if not photographed smile!

Who would have thought that a computer is able to recognize human emotions? But now a computer can “understand” the stress from sweating skin, mood by the way he types it, the physical condition man by the way he is moving into a space, and there is even camera that “refuses” to photograph, if not photographed smile!

Emotional computing is the field of computer science or terms of our emotional world or business resulting from or deliberately influences. The affective computing is the subject of the research team “Vigor”, with partners the University of Central Greece, the Technical University and the Department of Medicine at the Aristotle University. The project aims to develop human-centered computing, who can understand the human condition, using audiovisual and biological signals and interact with them, mainly using synthetic audiovisual information. These data were presented today at the meeting of neuroscientific data analysis, organized by the project team “Vigor” the Department of Medicine, Aristotle University in collaboration with the Greek Society of Biomedical Engineering.

Wednesday, June 26, 2013

Address by the Minister of Health, Mr. Adonis Georgiadis, a workshop ... - Newsnow

PRESS RELEASE

Subject: Opening Address by the Minister of Health at a workshop on e-prescribing.

The Minister of Health, Mr. Adonis Georgiadis, opened today in the work of the Conference ” Health in the digital age. Electronic prescribing: Challenges and Prospects ».

In a brief address, among others, said that” For me the biggest failure in recent years is that we needed the troika, to do things perfectly obvious to be have done much earlier, such as electronic prescribing.

Well, we made it, moves on. With the new treatment protocols and all Prescribing method you use and put in place, we can have a more secure proper management of this public wealth, effort in which we must all assist, because it is in our common interest, not because we are forced by somebody ».

– Posted using BlogPress from my iPad
medispin

US-hacking: exceeds 600% attacks on ... - Express

Ïé ÷ ñÞóôåò ôùí smartphones äåí ðñïöõëÜóóïíôáé áðü ôçí çëåêôñïíéêÞ ðåéñáôåßá, êáèþò ïé åðéèÝóåéò ôïõ åßäïõò áõôïý Ý ÷ ïõí ðïëëáðëáóéáóôåß óôá åîåëéãìÝíá êéíçôÜ ôçëÝöùíá öÝôïò, ìå óôü ÷ ï áðü ôçí ïéêïíïìéêÞ áðÜôç Ýùò ôçí âéïìç ÷ áíéêÞ êáôáóêïðåßá, åðéóçìáßíåé ìåëÝôç ðïõ äüèçêå óÞìåñá óôç äçìïóéüôçôá. Áðü ôïí ÌÜñôéï ôïõ 2012 Ýùò ôïí ÌÜñôéï ôïõ 2013 ï áñéèìüò ôùí êáêüâïõëùí ðñïãñáììÜôùí ðïõ åãêáèßóôáíôáé óôá Ýîõðíá êéíçôÜ ô çëÝöùíá ôá ïðïßá Ý ÷ ïõí ðñüóâáóç óôï Éíôåñíåô, ÷ ùñßò áõôÜ íá ãßíïíôáé áíôéëçðôÜ áðü ôïõò ÷ ñÞóôåò ôïõò áõîÞèçêå êáôÜ 614%, õðïëüãéóå ç åôáéñßá ðáñï ÷ Þò äéêôõáêþí õðçñåóéþí Juniper Networks, ðïõ åäñåýåé óôç Óßëéêïí ÂÜëåú ôçò Êáëéöüñíéáò êáé äéåîÞãáãå ôçí Ýñåõíá.

Ç åôáéñßá äåß ÷ íåé óôç ìåëÝôç ôçò üôé ôï ëåéôïõñãéêü óýóôçìá Android, ðïõ áíÞêåé óôçí Google, åðëÞãç ðåñéóóüôåñï áðü ôéò åðéèÝóåéò ôïõ åßäïõò: õðÝóôç ôï 92% ôùí åðéèÝóåùí.
Ôï ãåãïíüò áõôü åîçãåßôáé êõñßùò áðü ôçí ðáãêüóìéá åðéêñÜôçóç ôïõ Android??-ðïõ âáóßæåôáé óôï Linux-?? óôïí ôïìÝá ôùí “Ýîõðíùí” êéíçôþí, áöïý êáôÝ ÷ åé ó ÷ åäüí ôá ôñßá ôÝôáñôá ôùí ìåñéäßùí ôçò áãïñÜò. Ùóôüóï ï Êáñßì Ôïýìðá ôçò Juniper Networks åêôéìÜ üôé áõôü åßíáé åðßóçò ìéá Ýíäåéîç ðùò ôï “Android äåí äéáèÝôåé Ýíá åîßóïõ éó ÷ õñü óýóôçìá áóöáëåßáò” ðáñüôé üðùò óçìåéþíåé “üëá � �á ëåéôïõñãéêÜ óõóôÞìáôá Ý ÷ ïõí ôá ôñùôÜ ôïõò óçìåßá”.

Ï ðñþôïò ôýðïò ôùí åðéèÝóåùí áöïñÜ åìðïñéêÜ ìçíýìáôá ðïõ áðïóôÝëëïíôáé ãéá íá ðñïôåßíïõí êáêüâïõëá ìéá áíýðáñêôç õðçñåóßá, ìå êáôÜ ìÝóï üñï ìéá ðïëý ìéêñÞ ðëçñùìÞ, áðü 10 Ýùò 50 ëåðôÜ, ãéá ðáñÜäåéãìá. ÃåíéêÜ, ïé ÷ ñÞóôåò óðáíßùò áíôéëáìâÜíïíôáé ôçí åðßèåóç, ðïõ åðéâáñýíåé ìåñéêÜ ëåðôÜ ðáñáðÜíù ôïí ëïãáñéáóìü ôïõò.
Ôá ðñüóùðá ðïõ åðéäßäïíôáé óôéò åðéèÝóåéò áõôÝò “ìðïñïýí íá ìçí áöÞíïõí êáíÝíá ß ÷ íïò”, åîçãåß ï Ôïýìðá, åéóðñÜôôïíôáò ôá ÷ ñÞìáôá ìÝóá óå ìåñéêÝò çìÝñåò êáé ìåôÜ êëåßíïíôáò ôïõò áñéèìïýò ðïõ ÷ ñçóéìïðïéÞèçêáí ãéá ôç í áðÜôç. Óõ ÷ íÜ ç êïìðßíá áõôÞ ðáñïõóéÜæåôáé ìå ôç ìïñöÞ óýíôïìïõ ãñáðôïý ìçíýìáôïò Þ ìçíýìáôïò çëåêôñïíéêïý ôá ÷ õäñïìåßïõ ðïõ ðñïôåßíåé ??ôçí åíåñãïðïßçóç åíüò ðñïãñÜììáôïò Þ ìéáò åöáñìïãÞò.
Ç ìåëÝôç áðïêáëýðôåé üôé ïé ðåñéóóüôåñåò åðéèÝóåéò äéáðñÜôôïíôáé áðü ôç Ñùóßá Þ ôçí Êßíá.

Ç Juniper ðáñáôçñåß åðßóçò ôçí ìåãÜëç áýîçóç ôùí ðéï “åîåëéãìÝíùí” åðéèÝóåùí, ìå óôü ÷ ï ôçí êëïðÞ äåäïìÝíùí åðé ÷ åéñÞóåùí Þ êõâåñíÞóåùí.
“Ïé ðåéñáôÝò ìðïñïýí íá ÷ ñçóéìïðïéïýí ôï óýóôçìá ùò Ýíáí ìç ÷ áíéóìü áíáãíþñéóçò ðñéí ðñï ÷ ùñÞóïõí ðéï ðÝñá óôï äßêôõï ìéáò åðé ÷ åßñçóçò “, åîçãåß ï Ôïýìðá, óçìåéþíïíôáò üôé ðïëëïß õðÜëëçëïé Ý ÷ ïõí ðñüóâáóç óôï åôáéñéêü ôïõò äßêôõï êáé ôïõò åôáéñéêïýò óÝñâåñ ìÝóù ôïõ ôçëåöþíïõ ôïõò.

Ç Juniper Networks ôïíßæåé üôé ðáñáôÞñçóå ðùò “ðïëëÝò åðéèÝóåéò (óå smartphones) ìðïñïýí íá ÷ ñçóéìïðïéçèïýí ãéá ôçí êëïðÞ åõáßóèçôùí ðëçñïöïñéþí åðé ÷ åéñÞóåùí Þ ãéá ôçí Ýíáñîç ìéáò åõñýôåñçò åéóâïëÞò” óôá óõóôÞìáôÜ ôïõò. Ìéá åãêëçìáôéêÞ ôÜóç ðïõ áíáìÝíåôáé íá áõîçèåß êáôÜ ôñüðï “ôá ÷ ýôáôï êáé óõíå ÷ Þ ôá åðüìåíá ÷ ñüíéá”, ðñïåéäïðïéåß ç ìåëÝôç.


Bro. Georgiadis: Electronic prescribing should have ... - / Portal.kathimerini.gr

The biggest failure in recent years is that we needed the troika, to do things absolutely obvious that we should have done long ago, such as electronic prescriptions, he said, among other things, the new Health Minister ‘Adonis Georgiadis, a short his address at the conference “The Health digital. Electronic prescribing: Challenges and Prospects »

«Well, we made it, moves on. With the new treatment protocols and all Prescribing method you use and put in place, we can have a more secure proper management of this public wealth, effort in which we must all assist, because it is in our common interest, not because we are forced by someone, “added Mr. Georgiades.

Source: AMPE

Thessaloniki: computers recognize human ... - SKAI

INCIDENT

Frantzi Amvrosiou Kasomouli to Falirou between cross-roads Kallirrois and cross-roads Siggrou Andr. Ave no parking, one right lane blocked

INCIDENT

Siggrou Andr. Ave Posidonos Ave to Lisikratous between cross-roads Frantzi Amvrosiou and cross-roads Botsari Tousa no parking, one right lane blocked

Traffic jam

KATECHAKI WITH SOUTHEAST DIRECTION FROM THE KIFISIAS TO THE MESOGION ( no change )

Traffic jam

POSEIDONOS heading west from the SYNGROU TO THE MARINE PARK ( no change )

Traffic jam

ALEXANDRAS heading east from IPPOKRATOUS TO THE LOUKAREOS ( no change )

Traffic jam

ALEXANDRAS heading east from the LOUKAREOS UNTIL PANORMOU ( no change )

Traffic jam

ALEXANDRAS heading east from PANORMOU TO THE QUEEN SOFIA ( no change )

Electronic piracy via smartphones - / portal.kathimerini.gr


The targets of attacks ranging from financial fraud to industrial espionage, says a study released today.

From March 2012 to March 2013 the number of malicious programs that installed on smart phones that have Internet access, increased by 614%. These programs are not perceived by their users. Research conducted by the company providing network services Juniper Networks, headquartered in Silicon Valley, California.

Company study shows that the operating system Android, owned by Google, was more affected by the attacks of the kind, as was 92% of attacks.

This is mainly explained by the global dominance of Android??-based Linux-?? in the field of “smart” mobile, after holding almost three quarters of market share. However Karim Touba of Juniper Networks believes that this is also an indication that the «Android does not have an equally strong security system.” Notes that “all operating systems have vulnerabilities their points».

The first type of attacks on commercial messages sent to maliciously suggest a non-existent service, with on average a very small payment, for example from 10 to 50 minutes. Generally, users rarely realize the attack, which is paid by a few minutes their account.

Persons engaging in such attacks “may not leave any trace,” explains Tuba, collecting the money within a few days after closing numbers used in the scam. Often the “attack” was presented in the form of a short text message or email that recommends activating a program or application.

The study reveals that most attacks committed by Russia or China.

The Juniper also notes the large increase of more “sophisticated” attacks, aimed at stealing data companies or governments.

“The pirates can use the system as a mechanism for identification before proceeding further on an enterprise network,” explains Touba. further notes that many employees have access to their corporate network and the corporate server via their phone.

The Juniper Networks emphasizes that observed “that many attacks (in smartphones) can be used to steal sensitive company information or to start a larger intrusion” into their systems. The attacks are a criminal trend that is expected to grow by way of “rapid and sustained in the coming years,” the study warns.

Tuesday, June 25, 2013

Electronic intersection tax returns for all - RethemnosNews

Many will be called to answer for “suspicious” elements
In automatic cross-referencing submitted with tax returns this year will go electronic systems of the Ministry of Finance-this means that many taxpayers might be asked in tax in order to provide explanations for the “suspicious” elements.

According to Mega, only taxpayers electronically submit their statement, the system will automatically cross check:

– The income declared
– Taxes withheld
– The data description of the properties and their vehicles are evidence
– the costs declared in order to achieve tax rebate
– data from credit cards, loans and deposits.

If the risk analysis system recognize suspicious items, the taxpayer will be asked to go through the IRS for … the further.

the microscope will spend even anyone with withholding tax, even if you have zero or even debit slips.

Until last year, the statutory audit covered only those who had back over 1,500 euros.

newsbeast.gr

Monday, June 24, 2013

65 years ago ran the first electronically stored ... - Euro2day

H åðßóçìç ïíïìáóßá ôïõ ìç ÷ áíÞìáôïò ðïõ êáôáóêåýóáí êáé ÷ ñçóéìïðïßçóáí ïé Freddie Williams, Tom Kilburn êáé Geoff Tootill Þôáí Manchester Small Scale Experimental Machine (áí êáé ïé ßäéïé óõíÞèéæáí íá ôï áðïêáëïýí Baby), åß ÷ å ìÞêïò 5 ìÝôñá êáé æõãßæå 1 ôüíï!

H åðßóçìç ïíïìáóßá ôïõ ìç ÷ áíÞìáôïò ðïõ êáôáóêåýóáí êáé ÷ ñçóéìïðïßçóáí ïé Freddie Williams, Tom Kilburn êáé Geoff Tootill Þôáí Manchester Small Scale Experimental Machine (áí êáé ïé ßäéïé óõíÞèéæáí íá ôï áðïêáëïýí Baby), åß ÷ å ìÞêïò 5 ìÝôñá êáé æõãßæå 1 ôüíï!

Óêïðüò ôçò êáôáóêåõÞò ôïõ Þôáí íá áðïôåëÝóåé äïêéìáóôéêÞ ðëáôöüìá ãéá ôï óùëÞíá Williams, Ýíá ìÝóï áðïèÞêåõóçò äõáäéêþí øçößùí (bits) êÜíïíôáò ÷ ñÞóç êáèïäéêïý óùëÞíá. Ôï åðßôåõãìá ôïõò Þôáí åîáéñåôéêÜ óçìáíôéêü êáèþò ìÝ ÷ ñé ôüôå äåí õðÞñ ÷ å êÜðïéïò ïéêïíïìéêüò ôñüðïò áðïèÞêåõóçò ðëçñïöïñéþí óå çëåêôñïíéêÞ ìïñöÞ.

Ìå Üëëá ëüãéá, ï óùëÞíáò Williams-Kilburn áðïôÝëåóå ôçí ðñþôç ìïñöÞ RAM Ýóôù êáé áí ç ìíÞìç ôïõ Baby ìðïñïýóå íá áðïèçêåýóåé ìüëéò 1024 bits (128 bytes). Äõóôõ ÷ þò ôï ìç ÷ Üíçìá äåí õðÜñ ÷ åé ðéá êáé ôï ìüíï õðÜñ ÷ åé åßíáé áíôßãñáöï ôïõ óôï Museum of Science and Industry óôçí ðüëç ôïõ Manchester.

ÐçãÞ: techgear.gr

Electronic intersection tax returns for all ... - Iefimerida

will automatically cross over year data submitted with the tax returns of the electronic systems of the Ministry of Finance. Until last year, the statutory audit covered only those who had back over 1,500 euros.

This means that many taxpayers might be summoned to the tax authorities in order to provide explanations for the “suspicious” elements.

Once taxpayers electronically submit their statement, the system will automatically cross check:

* The income declared
* Taxes withheld
* Data description of the properties and their vehicles are evidence
* expenses claimed in order to achieve tax rebate
* The data from credit cards, loans and deposits.

If the risk analysis system recognize suspicious items, the taxpayer will be asked to go through the IRS about … what further.

the microscope will spend even anyone with withholding tax, even if you have zero or even debit slips.

Read more

Electronic intersection tax returns for all - New Zealand Herald

In automatic intersection of data submitted to the tax returns will proceed from this year the electronic systems of the Ministry of Finance-this means that many taxpayers might be summoned to the tax authorities in order to provide explanations for ‘suspicious’ elements.

According to Mega, only taxpayers electronically submit their statement, the system will automatically cross check:

Incomes declared
taxes withheld
The Profile of real estate and their vehicles are evidence
expenses claimed in order to achieve tax deduction
data from credit cards, loans and deposits.
If the system risk analysis identify suspicious items, the taxpayer will be asked to go through the IRS for … what further.

the microscope will spend even anyone with withholding tax, even though they have zero or even debit slips.

Until last year, the statutory audit covered only those who were returning over 1,500 euros.

Electronic intersection tax returns for all - e-forologia

£ O O O ± O;; O;; O;; XOX ± O;;; XXIX O ± O;; O;; O ± O;; O;; O;; O;; O · The;; O;; ½ O O;; O;; XOXIO;; XX-C;; ½ O O;; XOO;; The;; O;; XOX ² O ¬ O “O” XOX ½ A;; ± O XOX The melting;; XIO;; The;; XOO;; XOX ‘XOX ³ XIXIX-O;; XX · O ‘The;; O;; XXIO;; XEX ± O;; O;; XOO;; O;; O;; XOO;; ½ O O ± O;; O;; The;; O-O;; XOO;; The;; O ± O · O ‘XXIO;; O;; XOX XIXIX ½ ¬ A;; O;; O;; O;; O; XOX ± O;; O ± O;; XOO;; The;; O;; XOO;; O;; X ³ XX-XOO;; O;; XIXIXOX ½ XOXOXIXIO;; O ½.
B O;; O;; O;; O;; The;; O; XOX ± O-O ½ XXI The;; O;; melting O;; XOX ‘O’ XOX-O;; XOO;; XOX ‘XOX ³ XOO;; XOXX ½ XOXI O-O;; O;; The;; XIX ‘O; XEXOO;; ½ O O;; O;; XIO;; DM;; XOO;; O-DM;; The;; O;; XOXIXXIXOX-O ½ XOO;; O ½ O ± DM;; O;; XOO;; XXYX O ½ · ³ O O; O;; XXIO;; O ³ ± The XIX;; O ± B “The;; O;; XOO;; O;; O ± B ‘O;; O;; XOXIO;; XX-X ±.

O £ O;; XOO ;; O;; ½ O O O ± XOX;; XO Mega, XOO;; O ‘XIO;; XOXI The;; XOO;; XOX ‘XOX ³ XOO;; XOXX ½ XOXI The;; O;; XOX ² O ¬ O »XOO;; O ½ O · O’ XXIO;; O;; XOX ½ XIXIX ¬ A;; O; O O; O ‘The;; O;; O; The;; XOO;; O;;, The;; XO O;; O;; O;; O;; O; XOX XEX ± ± ± The XXIX;; O;; O ± O;; O;; The;; XXI O ½ O ± O;; O;; O;; XOX ± O;; V ±:

  • O € O ± XXIO;; XOXX; XOX ± The;; O ± O;; XOO;; XX; O ‘The;; O;; O ± O ½
  • O € XOO;; O;; The;; O;; O;; XOO;; O;; The;; XOO;; DM;; XOO;; ½ O O;; O ± O;; ± O Worthy;; O ± O;;; XEXX O-
  • O € O ± O;; O;; XOXIO;; XX-O ± O;; DM;; ³ The XIX;; O ± O;; O; O;; The;; O;; O ½ O ± XIXIX ½ O; O;; O;; O ½ XIX ± melting O;; O;; O ½ XOO;; O; XOX ¬ A;; O;; O ½ O;; XOO;; O; ; The;; XOO;; O ± O;; XOO;; XX “XOO;; ½ O O;; XXIXOX; O;; XIX ±
  • O € XIO;; The XX ±;; O ¬ O ½ DM;; The;; XOO;; XX; O ‘The;; O;; O ± O ½ XOX O;; XIXOO;; O;; O ½ O ± O;; DM;; O;; O;; XOO;; O ½ XXIO;; O;; O;; O;; O · O;; O;; O;; XOO??
  • O € O XXXXOXOXX ½ ± O ± O ± O;; O;; The;; XIO;; The;; XIO;; O;; O;; O;; XIXIX-O;; ¬ The XIX;; O;; DM;;, The;; XX ± O ¬ O ½ XXIX ± ± XIX The melting;; XIO;; XIX ± O;; ± O XEX-O;; XXIO;; The;; XOO;; This??.
O;; O;; O;; O;; XOX ½ A;; XO O;; O;; O;; O;; O; XOX ± O ± O ½ O ¬ O »O;; O;; O · O;; XIXIX ½ DM;; ½ O XOO;; O ± O ½ O ± O ³ O ½ O;; O;; O-O;; XXI The;; O;; XOO;; O;; O ± O;; O;; XOXIO;; XX-X ±, XO O ;; XOO;; XOX ‘XOX ³ XOO;; XOXX ½ XOO;; XEX XIX ± ± O ‘XX-C;; melting O ± O ½ O ± O;; DM;; O ¬ O;; XXI O ± O;; O;; The;; · O O ½ DM;; XOO;;-O O O ³ ± ± … XIX The;; O ± O;; DM;; ± O XIO;; DM;; This??.

O;; O;; O;; The;; XO XOXIXIO;; XOO;; Worthy;; O;; XIXO XEX ± O;; DM;; O ¬ O;; XOO;; XOX ¬ O ½ O ‘XIO;; O;; O ± O; ; O ‘XOXI The;; O;; XOXI DM;; XOO;; O ½ O;; O ± O;; V ± Worthy;; O ± O;; XOO;; XOXX ½ XO O;; O;; O; ; XO, X ± Worthy;; XOX ± XIX melting ± O ± O ½ DM;; XOO;; ½ O XOX XXX · ½ ¬ XIXIX O; O ± Worthy;; XOX; XIX ± The melting;; O;; DM;; O;; O;; XIXIX XXIXIX ¬ ± ± The XEX;; XIO;; O;; XIXIX ¬.

O;; DM;; O;; The melting;; DM;; O;; O;; melting XO O;; O;; XOO;; O;; DM;; O;; XIXIO; ; The;; O to O ‘The XX ³;; XOO;; O ± O;; XOO;; XOO;; O;; XOO O;; ½ O XO O;; O;; XOO;; O;; XX-The;; O ± O ½ DM;; XIO;; O;; O;; XOO;; O; The;; O ¬ O ½ O;; O ± O;; O;; 1,500 DM;; A;; This??.

24/06/2013
O O O · ³ O?: Www.in.gr

Electronic intersection of all tax returns - Tribune Online

In automatic intersection of data submitted to the tax returns will proceed from this year the electronic systems of the Ministry of Finance-this means that many taxpayers might be summoned to the tax authorities in order to provide explanations for the “suspicious” elements.

According to Mega, only taxpayers electronically submit their statement, the system will automatically cross check:

  • Incomes declared
  • taxes withheld
  • data description of the properties and their vehicles are evidence
  • expenses claimed in order to achieve tax deduction
  • data from credit cards, loans and deposits.
If the risk analysis system recognize suspicious items, the taxpayer will be asked to go through the IRS for … what further.

the microscope will spend even anyone with withholding tax, even though they have zero or even debit slips.

Until last year, the statutory audit covered only those who had back over 1,500 euros .

Sunday, June 23, 2013

Email junction for tax returns - Nooz.gr

Î £ IM Î ± Ï?? Ï?? Ï?? Î ¼ Î ± Ï?? Î · Î’Î ¹ Î ± Ï?? Ï?? Î ± Ï?? Ï?? Ï?? Ï?? Î · Ï?? Ï?? Î ½ Ï?? Î ¿Ï?? Î ¿Î »Î ¿Î ³ Î ¹ Î º Ï?? Î ½ Î º Î ± Î ¹ Ï?? ImI?? Î ¹ Î ¿Ï?? Ï?? Î ¹ Î ± Î º Ï?? Î ½ Ï?? Ï?? Î ¿Î ¹ Ï?? ImI ¯ Ï?? Î ½ Ï?? Ï?? Î ½ Ï?? Î ¿Ï?? Î ¿Î »Î ¿Î ³ Î ¿ Ï?? Î ¼ ImI ½ Ï?? Î ½ Î ± Î ½ Î ± Î ¼ ÎÎ ½ ImI?? Î ± Î ¹ Î ½ Î ± Ï?? Ï?? Î ¿Ï?? Ï?? Ï?? Î ® Ï?? Î ¿Ï?? Î ½ Î ± Ï ?? Ï?? Ï?? Î-Ï?? Î ¿Ï?? Ï?? Î »ImI;; Î ¿Î ¹ ImI?? Î ¿Ï?? Î ¯ ImI;; Ï?? Î · Ï?? Ï?? Ï?? Ï?? Î ± Ï?? Î ¼ Î-Ï?? Ï?? Ï?? Ï?? Î ½ Ï?? Ï?? � �?? Ï?? Î · Î ¼ Î ¬ Ï?? Ï?? Î ½ Ï?? Î ¿Ï?? Ï?? Ï?? Î ¿Ï?? Ï?? Î ³ ImI ¯ Î ¿Ï?? Î?? Î ¹ Î º Î ¿Î ½ Î ¿Î ¼ Î ¹ Î º Ï?? Î ½.

Î?? Ï?? Ï?? Î ¹ I’ImI ½ ImI ¯ Î ½ Î ± Î ¹ Î »Î ¯ Î ³ Î ¿Î ¹ Î ¿Î ¹ Ï?? Î ¿Ï? ? Î ¿Î »Î ¿Î ³ Î ¿Ï?? Î ¼ ImI ½ Î ¿Î ¹ Ï?? Î ¿Ï?? ImI ½ Î’ÎÏ?? ImI?? Î ± Î ¹ Î ½ Î ± Î º Î »Î · Î ¸ Î ¿Ï?? Î ½ Î ³ Î ¹ Î ± â?? | ImI ¾ Î · Î ³ Î ® Ï?? ImI ¹ Ï?? ImI ¬ Î ½ Ï?? Ï?? Î ¿Î º Ï?? Ï?? Î ¿Ï?? Î ½ Ï?? Î ± Ï?? Î ± Ï?? Ï?? Ï?? Î ¯ ImI;; Î º Î ± Î ¹  «Ï?? Ï?? Î ¿Ï?? Ï?? Î ± » Ï?? Ï?? Î ¿Î ¹ Ï?? ImI ¯ Î ±.

Î £ Ï? ? Î ¼ Ï?? Ï?? Î ½ Î ± Î ¼ IM Ï?? Î ¿I’ImI »Ï?? Î ¯ Î ¿ImI ¹ Î’Î ® Ï?? ImI?? Î ½ Ï?? Î ¿Ï?? Mega, Î ¼ Ï?? Î »Î ¹ Ï?? Î ¿Î ¹ Ï?? Î ¿Ï?? Î ¿Î »Î ¿Î ³ Î ¿Ï?? Î ¼ ImI ½ Î ¿Î ¹ Ï?? Ï?? Î ¿Î ² Î ¬ λ Î »Î ¿Ï?? Î ½ Ï?? Î · Î’Î ® Î »Ï?? Ï?? Î · Ï?? Î ¿Ï?? Ï?? Î · Î »ImI º Ï?? Ï?? Î ¿Î ½ Î ¹ Î º Î ¬, Ï?? Ï?? Ï?? IM Ï?? Î ¿Ï?? Ï?? Î ¿Ï?? Ï?? Î ³ ImI ¯ Î ¿Î ¸ Î ± Î ¼ Ï?? Î ¿Ï?? ImI ¯ Î ½ Î ± ImI »ÎÎ ³ Î ¾ ImI ¹ Î ± Ï?? Ï?? Ï?? Î ¼ Î ± Ï?? Î ±:

  • Î ImI ¤ Î ± ¹ Ï?? Î ¿Î’Î ® Î ¼ Î ± Ï?? Î ± Ï?? Î ¿Ï?? Î’Î ® Î »Ï?? Ï?? Î ± Î ½
  • Î ¤ Î ¿Ï?? Ï?? Ï?? Ï?? Ï?? Î ¿Ï?? Ï?? Ï?? Î ¿Ï?? ÎÏ?? Î ¿Ï?? Î ½ Ï?? Î ± Ï?? Î ± Î º Ï?? Î ± Ï?? Î · Î ¸ ImI ¯
  • Î ¤ Î ± Ï?? Ï?? Î ¿Î ¹ Ï?? ImI ¯ Î ± Ï?? ImI?? Î ¹ Î ³ Ï?? Î ± Ï?? Î ® Ï?? Ï?? Ï?? Î ½ Î ± Î º Î ¹ Î ½ Î ® Ï?? Ï?? Î ½ Î º Î ± Î ¹ Ï?? Ï?? Î ½ Î ¿Ï?? Î · Î ¼ Î ¬ Ï?? Ï?? Î ½ Ï?? Î ¿Ï ?? Ï?? Ï?? Î ¿Ï?? Î ± Ï?? Î ¿Ï?? ImI »Î ¿Ï?? Î ½ Ï?? ImI º Î ¼ Î ® Ï?? Î ¹ Î ±
  • Î ¤ Î ¹ Ï?? Î’Î ± Ï?? Î ¬ Î ½ ImI;; Ï?? Î ¿Ï?? Î’Î ® Î »Ï?? Ï?? Î ± Î ½ Î ¼ IM Ï?? Î º Î ¿Ï?? Ï?? Î ½ Î ± Ï?? ImI?? Ï?? Ï?? Î ¿Ï?? Î ½ ÎÎ º Ï?? Ï?? Ï?? Ï?? Î · Ï?? Ï?? Ï?? Î ¿Ï??
  • Î ¤ Î ± I’ImI’I ¿Î ¼ ÎÎ ½ Î ± Î ± Ï?? Ï?? Ï?? Î ¹ Ï?? Ï?? Î ¹ Ï?? Ï?? Ï?? Ï?? Î ¹ Î º Î-Ï?? Î º Î ¬ Ï?? Ï?? ImI??, Ï?? Î ± Î’Î ¬ Î ½ ImI ¹ Î ± Î º Î ± Î ¹ Ï?? Î ¹ Ï?? Î º Î ± Ï?? Î ± Î ¸ Î-Ï?? ImI ¹ Ï?? Ï?? Î ¿Ï?? Ï??.
Î?? Î ¬ Î ½ Ï?? Î ¿Î »ImI ³ Ï?? Î ¼ ImI ½ Î ¿Ï?? Ï?? Ï?? Ï?? Î · Î ¼ Î ± Î ± Î ½ Î ¬ λ Ï?? Ï?? Î · Ï? ; Î º Î ¹ Î ½ Î’Ï?? Î ½ Î ¿Ï?? Î ± Î ½ Î ± Î ³ Î ½ Ï?? Ï?? Î ¯ Ï?? ImI ¹ Ï?? Ï?? Î ¿Ï?? Ï?? Î ± Ï?? Ï?? Î ¿Î ¹ Ï?? ImI ¯ Î ±, Î ¿ Ï?? Î ¿Ï?? Î ¿Î »Î ¿Î ³ Î ¿Ï?? Î ¼ ImI ½ Î ¿Ï?? Î ¸ Î ± Î º Î »Î · Î ¸ ImI ¯ Ï?? Ï?? Î · Î ½ ImI?? Î ¿Ï?? Î ¯ Î ±.

Î?? Î ¬ λ Î ¹ Ï?? Ï?? Î ±, Ï?? Ï?? Î ¿Î ¹ ÎÏ?? Î ¿Ï?? Î ½ Ï?? Î ± Ï?? Î ± Î º Ï?? Î ¬ Ï?? Î · Ï?? Î · Ï?? Ï ?? Ï?? Î ¿Ï?? Î ¸ Î ± ImI ‘ImI ³ Ï?? Î ¸ Î ¿Ï?? Î ½ Î’Î ¹ ImI ¾ Î ¿Î’Î ¹ Î º Î ¬, Î ± Î º Ï?? Î ¼ Î ± Î º Î ± Î ¹ Î ± Î ½ Î’Î ® Î »Ï?? Ï? ? Î ± Î ½ Î ¼ Î · I’ImI ½ Î ¹ Î º Î ¬ Î ® Ï?? Ï?? ImI?? Ï?? Ï?? Î ¹ Î º Î ¬ ImI º Î º Î ± Î ¸ Î ± Ï?? Î ¹ Ï?? Ï?? Î ¹ Î º Î ¬.

Î ÎÏ?? Ï?? Ï?? Î ¹ Î ¿ÎÎ »ImI ³ Ï?? Î ¿Ï?? Î ® Ï?? Î ± Î ½ Ï?? Ï?? Î ¿Ï?? Ï?? ImI?? Ï?? Î ¹ Î º Ï?? Ï?? Î ¼ Ï?? Î ½ Î ¿Î ³ Î ¹ Î ± Ï?? Ï?? Î ¿Ï?? Ï?? ImI ¯ Ï?? Î ± Î ½ ImI?? Î ¹ Ï?? Ï?? Ï?? Î ¿Ï?? Î ® Ï?? Ï?? Ï?? Î ¿Ï?? Ï?? Î ¬ Î ½ Ï?? Î ± Ï?? Ï?? 1,500 ImI?? Ï?? Ï??.

Grecotel Globe One Digital and expand their cooperation in ... - Emea.gr

The Grecotel , the largest hotel chain in Greece and the group N. Daskalantonaki , have assigned to Globe One Digital services Performance SEO & PPC Advertising .

The Law Group Daskalantonaki includes 30 luxurious units , among which is a Leading Hotel of the World, the classic 5 star hotels with high quality services and facilities and all-inclusive units, particularly popular with families.

The Globe One Digital active for more than ten years in the area of ??the Digital Marketing, is a certified partner of Google in Greece and manages many leading Brands in the online ad offering PPC, Social Media, SEO, CRO, & Mobile services.

In terms of Search Marketing, the Globe One Digital Services manages SEO, Google Advertising & YouTube Advertising. In Onsite & Offsite Search Engine Optimization, ensures top organic positions on the most important and strategic keywords, while creating AdWords & YouTube Campaigns for chain hotels. In the area of ??Search Performance, the Globe One Digital has developed and managed multiple successful campaigns with spectacular results and with the support of modern art technologies.

future, the strategic partnership between the two companies is expected to expand to other areas in order to even more specialized services and expertise to serve the end customer Grecotel.

Friday, June 21, 2013

IKA: Electronic submission of application setup debts - Voria

Redirect Notice

The previous page is sending you to

http://voria.gr/index.php?module=news

.

If you do not want to visit that page, you can return to the previous page.

Thursday, June 20, 2013

Electronics today the settlement of overdue debts to IKA - Newsbeast.gr

Through internet you can today to submit to IKA application for obtaining the settlement of overdue debts, employers certified to the online services of the Foundation for submitting online Analytic Periodic Report (IBR) .

Upon registration, the application receives a unique reference number to be equated with a protocol number. The next day is electronically transfer the application to OPS-IKA and the responsible Branch IKA employer (MLS / AMOE) which takes automatic system number.

The application will then be processed according to the provisions in the relevant circular.

With the completion of the audit and registration screen “Managing Inbox” and in the “state inward ‘price’ verified ‘will be updated directly by the employer through the website (http :/ / www.ika.gr) for the completion of the audit process and will be invited to come to the branch to receive the test results and the continuation of the process as defined in the Circular.

In Communication by the administration of IKA invites borrowers to seize the opportunity to submit an online application by 30/06/2013 in order to ensure the maximum number of 48 monthly installments for the regulation of overdue debts.

Begins electronic monitoring of truck ... - BEST News

In the company I LINK New Technologies commissioned over 73,800 euros to create an integrated information system for monitoring movements tankers via transmitter GPS.

This system will be installed at the General Secretariat of Information Systems as a tool to control the traffic of fuel from the competent authorities (Financial Crime). The technical specifications of the system given by the Ministry of Development.

In a contest except ILINK participating companies EMPHASIS TELEMATICS and ZENIKA.

By placing electronic positioning system is able to trace the location of each tanker through real-time signal to be transmitted from the transmitter to the system control center GSIS.

According to ministerial decree of 2012 all tankers trucks for private use (F.I.CH.) and public utilities (F.D.CH.) carrying petroleum products should be required to bear the This electronic system. The system will be installed in both tankers and their trailers and semi-trailers as well as removable tanks in vehicles. The installation and proper operation of the electronic positioning system (GPS) in vehicles is the sole responsibility of the owner and the company that installs it.

The closing date of application and use of data from the installation and operation of the GPS is set on July 31 2013.

Posted: 20/06/2013 09:37

Printed: 20/06/2013 23:45

From: www.thebest.gr/news/index/viewStory/204885

thebest.gr © 2013

Clarifications IKA electronic submission of application setup ... - Taxheaven.gr

We recommend that you upgrade your browser in order to use the most of the services offered by the node Taxheaven. The upgrade process will not take more than five minutes and will enable you to navigate without problems on all pages of the site. To appear and act decently the sites in Internet Explorer 7 and smaller, the authors are forced to make more files that you download to your computer each time you visit a page.

upgrade now

Electronic monitoring of tank fuel from ... - Economy

In the company I LINK New Technologies commissioned over 73,800 euros to create an integrated information system for monitoring movements tankers via transmitter GPS.

This system will be installed at the General Secretariat of Information Systems as a tool to control the traffic of fuel from the competent authorities of Financial Crime. The technical specifications of the system given by the Ministry of Development.

In a contest except ILINK participating companies EMPHASIS TELEMATICS and ZENIKA.

By placing electronic positioning system is able to trace the location of each tanker through real-time signal to be transmitted from the transmitter to the system control center GSIS.

According to ministerial decree of 2012 all tankers trucks for private use F.I.CH. and public use F.D.CH. carrying petroleum products should be required to carry this electronic system. The system will be installed in both tankers and their trailers and semi-trailers as well as removable tanks in vehicles. The installation and proper operation of the electronic system GPS positioning in vehicles is the sole responsibility of the owner and the company that installs it.

The closing date of application and use of data from the installation and operation of the GPS is set on July 31 2013.

And with the "dot" the electronic monitoring of interest ... - BEST News

The obligation of banks and providers of investment services to send annually electronically to the General Secretariat for Information Systems of the Ministry of Finance states the interest acquired by the customers and the amount of tax withheld, provides decision Deputy Minister of Finance, Mr. G. Mavragani published Tuesday in the Official Gazette.

The decision will be activated immediately, as the day after tomorrow until Friday, June 21 parties are required to send the data of 2012 in GSIS.

Although the decision Mavragani invoked to send these items for facilitation of intersections conducted by the Finance Ministry to combat tax evasion and achieve tax compliance, but is primarily associated with the base update GSIS data with the data of interest of taxpayers to allow pre-filling the form E1 for those who have interest cumulatively exceed EUR 250 (note that the interest in the tax return ‘break’ in net amounts listed codes 659 660 and taxed amounts entered codes 433,434).

According to the decision, the banks, including branches of foreign credit institutions and services providing investment services, are required to forward to the GSIS situations in electronic file containing the information to beneficiaries of joint holders ( name, surname and AFM), the amount of credit and debit interest on deposits and repos acquired during the previous year, and the amount of tax withheld.

interest for deposits denominated in euro as rate for conversion to the euro will take the value of credited interest in foreign exchange or spot price of the card exchange rates of the European Central Bank of last business day of the reporting year.

The data transfer will be made directly to the GSIS secure file transfer system. The file specification, the method of transmission and the transmission schedule file will be posted promptly on the website of the General Secretariat for Information Systems.

Data on interest will be sent to the GSIS once a year and no later than February 28 of the following year the reference year (until February 28, 2014 the next mission). Especially for first-Decision stipulates that the mission of the data files will be up to 21 the June 2013.

As highlighted banks and investment companies will retain the information that is sent to GSIS in the form in which the dispatch for at least 15 working days. The Ministry of Finance will maintain this information for six years.

Failure to comply with the above obligations will be imposed by the Minister of Finance administrative fine of 5,000 euros to 100,000 euros, depending on the seriousness of the offense and possible relapse.