Antonio Ieranò

bad day :(

Ok some days are worse than others. I mean, it is not only that I felt sick tonight, and believe me kidney pain is really painful, and I will not speak about the other symptoms that required frequent visit at the restroom .   Is that sometimes I find really hard to cope with some people, well I hope at least he enjoyed the ride and felt superior (any sarcasm here is understandable).   sayonara Related articles bad day 🙁 (thepuchiherald.wordpress.com) Related posts: FW SPAM: My dear friend It’s Monday My right forearm’s tumor update Please take this survey ise…

Introduction To Network Security – Part 2

Introduction To Network Security – Part 2: By Sahir Hidayatullah – Firewall.cx Security Advisor Tools An Attacker Uses Now that we’ve concluded a brief introduction to the types of threats faced by both home users and the enterprise, it is time to have a look at some of the tools that attackers use. Keep in mind that a lot of these tools have legitimate purposes and are very useful to administrators as well. For example I can use a network sniffer to diagnose a low level network problem or I can use it to collect your password. It just depends…

Introduction To Network Security – Part 1

Introduction To Network Security – Part 1: Introduction By Sahir Hidayatullah – Firewall.cx Security Advisor As more and more people and businesses have begun to use computer networks and the Internet, the need for a secure computing environment has never been greater. Right now, information security professionals are in great demand and the importance of the field is growing every day. All the industry leaders have been placing their bets on security in the last few years. All IT venodors agree today that secure computing is no longer an optional component, it is something that should be integrated into every…

La sicurezza informatica 22 anni fa | KYKit

La sicurezza informatica 22 anni fa | KYKit: Questo video prodotto da AT&T 22 anni fa mostra i rischi connessi alla mancanza di sicurezza nei sistemi informativi. Mutatis mutandis, i temi sono …kyk.it/la-sicurezza-informatica-22-anni-fa-30901 Related posts: Security Costs and Security Budgets Digging it up on Security Costs and Security Budgets – part1 Forensic Software Tools A.I. Talking Points : Security Week Review Security and Risks Updated Powered by YARPP.

Il pecorino non è “Doggy Style”

riporto un aricolo di Paolo Attivissimo su un simpatico errore di traduzione: Il MIUR confonde “pecorino” e “pecorina” [UPD 21:00] by Paolo Attivissimo E chi glielo dice, al MIUR, che “Doggy Style” non è la traduzione di “pecorino”? L’articolo è stato aggiornato dopo la pubblicazione iniziale. Presto, correte sul sito del MIUR a questo link e salvate una copia della pagina. Non ve ne pentirete, così come non se ne sono pentiti i tantissimi che mi hanno segnalato questo capolavoro assoluto di faciloneria traduttiva. Ecco la mia cattura: Il titolo “Dalla pecora al pecorino” è stato tradotto in “From sheep to Doggy Style”. Solo che “doggy style”, in inglese, non…

Stracquadanio: “Sfigati quelli che guadagnano 500 euro al mese”

Continuano le polemiche sulla questione dei giovani e il lavoro.   Il deputato PDL  Giorgio Stracquadanio ha definito “sfigati, per varie ragioni” chi guadagna 500 euro al mese. Intervenuto alla puntata di “Punto e a capo” su Class Tv, ha affermato che “per fortuna sono poche centinaia di migliaia” le persone in Italia che guadagnano meno di 500 euro al mese perché altrimenti “avremmo i morti di fame per le strade”. Stracquadanio ha inoltre dichiarato che lui non ha mai guadagnato così poco perché, sin da quando era all’Università, ha sempre lavorato sodo. Anche se fossero solo “poche centinaia di…

6 regole per capire se il vostro gatto sta progettando di uccidervi
How to Become an Ethical Hacker

Image via WikipediaHow to Become an Ethical Hacker: Not all hackers do evil work. Here’s what you need to know to use your hacking skills to do good. By Eric Geier, PCWorld Do viruses, DDoS attacks, or buffer overflows tickle your fancy? If so, you might consider becoming a legal hacker, aka an ethical … Related articles Ethical Hackers (ritcyberselfdefense.wordpress.com) Ethical hacker tells how to beat censorship (kractivist.wordpress.com) DDoS the Weapon of Choice for Hackers Driven by Politics, Not Profits (technewsworld.com) Does Facebook really embody “The Hacker Way”? Famous hackers discuss (venturebeat.com) The Guru of ethical hacking speaks (ibnlive.in.com) And…

Twitter e la censura: tre motivi per non gioire
Welcome Back

Image by Getty Images via @daylife Here I am, finally after the long Xmas vacation () I know you all missed me, and with you all I mean my several disturbed personalities, because at the end everyone write for itself and all the strange people living inside its head … So a new year has started and this is not a year like the others one,it is the last one for humanity, according to Mayan prophecy. So now we are not sure if the end will come in form of earthquakes, giant volcanoes erupting the mother earth rage against us,…

Posts navigation