Cambridge Analytica e Facebook. I dati personali valgono oro ma le persone li regalano
Convincere qualcuno a votare per un partito non è molto diverso dal convincerlo a comprare il dentifricio di una marca ben precisa, basta solo sapere su cosa fare leva.
16 hours ago
TaskBlast: Project Management Software Tailored for Software Teams
Project Management Software built for Software Teams. As powerful as Jira, As simple as Trello.
GDPR: How it Affects WordPress Site Owners and Developers - WPMU DEV
If you haven’t been living under a rock for the last few months, there’s a very good chance you’ve heard of GDPR, or the General Data Protection Regulation.
GDPR  privacy 
2 days ago
Use a .dev domain? Not anymore. – Medium Engineering
For years, programmers used .dev domains for testing their code. Those days are over.
Internet  webdev  development  https  Google  certificate  DNS 
4 days ago
Chrome & Firefox now force .dev domains to HTTPS via preloaded HSTS
Chrome 63 (out since December 2017), will force all domains ending on .dev (and .foo) to be redirected to HTTPS via a preloaded HTTP Strict Transport Security (HSTS) header. Update 07/02/2018: Firefox now also forces .DEV domains to HTTPS.
webdev  Firefox  Chrome  https  certificate  development  Google 
4 days ago
How to set up a print server on a Raspberry Pi | Opensource.com
Network your printer with a Raspberry Pi and the CUPS print server.
RaspberryPi  print  server 
9 days ago
Peperoncini...La guida completa sulla coltivazione del peperoncino piccante.
Guide relative a tutte le fasi della coltivazione del peperoncino [copia archiviata: https://archive.is/3tvIv]
peperoncino  coltivazione 
11 days ago
Protecting Code Integrity with PGP — Part 4: Moving Your Master Key to Offline Storage
Here in part 4, we continue the series with a look at how and why to move your master key from your home directory to offline storage.
GnuPG  gpg  security  cryptography  keys 
14 days ago
New Team Forms to Facilitate GDPR Compliance in WordPress Core – WordPress Tavern
GDPR applies to all businesses, organizations, sectors, situations, and scenarios, regardless of a business’s size, head count, or financial turnover. A small app studio is every bit as beholden to these rules as a large corporation.
GDPR  europe 
15 days ago
Per quanto voi vi crediate assolti - Wittgenstein
No, la cosa da dire meno superficiale e facile è un’altra, direi, e riguarda tutto il 32% che vota M5S o tutto il 17% che vota Lega, mezza Italia che vota: ed è che dal sistema dell’informazione e degli esperti passa e attecchisce presso la maggioranza degli italiani la parte semplificata dei messaggi e non quella complessa delle analisi.
Politica  politics 
15 days ago
Uncode - Creative Multiuse WordPress Theme
Uncode is a pixel-perfect Theme designed with terrific attention to details, flexibility and performance. Each concept can be easily imported. Start with any of these layouts or create your own.
WordPress  webdesign  themes 
23 days ago
FreeDNS - Free DNS - Dynamic DNS - Static DNS subdomain and domain hosting
Why is it free? It's quite simple. We wanted a challenge... that's it.
ddns  DNS 
25 days ago
YBlog - Learn Vim Progressively
You want to teach yourself vim (the best text editor known to human kind) in the fastest way possible. This is my way of doing it. You start by learning the minimal to survive, then you integrate all the tricks slowly.
Vim  editor  tutorials 
4 weeks ago
VIM Adventures
Imparare Vim giocando
Vim  editor  Giochi 
4 weeks ago
Come si usa Vim - YouTube
Video tutorial sull'uso di Vim
Vim  editor  tutorials 
4 weeks ago
Where is Starman? Track Elon Musk's Tesla Roadster's Current Location.
On February 6th, 2018, at 2045 UTC, the first Falcon Heavy was launched into space. It contained a very special payload, a Tesla Roadster with Starman.
SpaceX  FalconHeavy  Starman  Tesla  Roadster  earth  space 
4 weeks ago
Free WordPress Themes • Cryout Creations
Our WordPress themes are beautiful, responsive and seriously customizable.
They also have a wonderful personality and a great sense of humor. Get to know them!
WordPress  themes 
4 weeks ago
KDE Project Security Advisory
Plasma Desktop: Arbitrary command execution in the removable device notifier
KDE  Plasma  security  USB 
5 weeks ago
Uh-oh. How just inserting a USB drive can pwn a Linux box – HOTforSecurity
In short, if a USB memory stick is plugged into a vulnerable computer has a volume label containing the characters `` or $(), the text contained within the characters will be executed as shell commands.
KDE  Plasma  security  USB 
5 weeks ago
Il braccialetto e l'innovazione
Dirò solo ai giornali che non hanno alcun titolo ad inondarci con i loro fiumi di parole sulle fake news se loro stessi oggi mostrano di esserne i primi e più convinti produttori...
fake-news  readings 
6 weeks ago
How Much Swap Should You Use in Linux?
How much should be the swap size? Should the swap be double of the RAM size or should it be half of the RAM size? Do I need swap at all if my system has got several GBs of RAM?
sysadmin  ram 
7 weeks ago
Perché le razze non esistono scientificamente - Il Post
Ma spesso facciamo degli errori quando ne spieghiamo le ragioni scientifiche.
human  race  science 
9 weeks ago
How to Auto Update WordPress Salts
Even after the security keys and salts have been initially set, it's a good idea to update them every so often. Anything you can do to make your site more secure is generally a good idea.
WordPress  security  salt  update 
9 weeks ago
Your smartphone is making you stupid, antisocial and unhealthy. So why can’t you put it down? - The Globe and Mail
A decade ago, smart devices promised to change the way we think and interact, and they have – but not by making us smarter. Eric Andrew-Gee explores the growing body of scientific evidence that digital distraction is damaging our minds
smartphone  psychology  damage  readings 
9 weeks ago
ck :: zypper vs. apt and rpm vs. dpkg command comparison ::
The following table shows a comparison of the most important and most used commands for package/software management in SuSE and Debian systems.
Linux  Ubuntu  OpenSUSE  apt  zypper  comparison 
9 weeks ago
Spamnesty - Home
Spamnesty is a way to waste spammers' time. If you get a spam email, simply forward it to sp@mnesty.com, and Spamnesty will strip your email address, pretend it's a real person and reply to the email. Just remember to strip out any personal information from the body of the email, as it will be used so the reply looks more legitimate.

That way, the spammer will start talking to a bot, and hopefully waste some time there instead of spending it on a real victim. Meanwhile, Spamnesty will send you an email with a link to the conversation, so you can watch it unfold live!
spam  email  bot  mail 
10 weeks ago
How to Create a Multilingual Website with Divi and Polylang | Divi Theme Help & Tutorials
This time I’m going to write a quick guide on how you can create a multilingual website with Divi theme and Polylang. So you will need the Divi theme and the Polylang plugin. Polylang is free and you can download it from the WordPress plugin repository here.
Page archived here: https://archive.is/AhBcy
WordPress  Divi  translation  language 
11 weeks ago
Questo sito è stato creato da un piccolo gruppo di appassionati di penne stilografiche, come quaderno di appunti virtuale dove raccogliere le loro informazioni e poterle condividere.
penna  stilografica  wiki  calligraphy 
11 weeks ago
How can I extract embedded fonts from a PDF as valid font files? - Stack Overflow
You have several options. All these methods work on Linux as well as on Windows or Mac OS X. However, be aware that most PDFs do not include to full, complete fontface when they have a font embedded. Mostly they include just the subset of glyphs used in the document.
fonts  PDF 
11 weeks ago
Manuale WebOS di LG
TV  Televisione 
12 weeks ago
Open Source Guides | Learn how to launch and grow your project.
Open source software is made by people just like you. Learn how to launch and grow your project.
opensource  community  contribution 
12 weeks ago
TV Ultra HD 4K LED 43 pollici: LG 43UJ630V | LG Italia
ULTRA HD 4K Schermo IPS, Active HDR, Design Slim, Sistema Audio Ultra Surround 2.0 Ch. 20W, Smart TV webOS 3.5
TV  Televisione 
12 weeks ago
Installing 09-texlive-fonts.conf to /etc/fonts/conf.d on Ubuntu 16.04 breaks fonts in Firefox - TeX - LaTeX Stack Exchange
I noticed that after I symlinked the 09-texlive-fonts.conf file from /etc/fonts/conf.d it interfered with fonts system wide, notably firefox. On https://reddit.com/r/aww all the fonts in the header were showing 'squares' and in other applications font glyphs were not even rendering.

Is there any way to install the TexLive fonts without interfering with the system?
LaTeX  Firefox  fonts  forum 
december 2017
The Big Debate, 2048 vs. 4096, Yubico’s Position | Yubico
While it is true that a longer key provides better security, we have shown that by doubling the length of the key from 2048 to 4096, the increase in bits of security is only 18, a mere 16%.
GnuPG  gpg  security  encryption  keys 
december 2017
GnuPG Frequently Asked Questions
At the time the decision was made, 2048-bit RSA was thought to provide reasonable security for the next decade or more while still being compatible with the overwhelming majority of the OpenPGP ecosystem.
GnuPG  gpg  security  encryption  keys  faq 
december 2017
Simple, cross platform tool for lossless trimming / cutting of video and audio files. Great for rough processing of large video files taken from a video camera, GoPro, drone, etc. It lets you quickly extract the good parts from your videos and discard GBs of data without losing quality. It doesn't do any decoding / encoding and is therefore extremely fast. Also allows for taking JPEG snapshots of the video at the selected time. This app uses the awesome ffmpeg for doing the grunt work. Also supports lossless cutting in the most common audio formats. ffmpeg is included in the app.
Software  video  video_editing 
december 2017
CryptoParty is a decentralized movement with events happening all over the world. The goal is to pass on knowledge about protecting yourself in the digital space. This can include encrypted communication, preventing being tracked while browsing the web, and general security advice regarding computers and smartphones.
security  privacy  GnuPG  gpg  PGP  cryptography 
november 2017
operational pgp - draft
This is a guide on how to email securely.
email  encryption  gpg  security  GnuPG 
october 2017
OpenPGP Best Practices - riseup.net
We have gathered here a lot of information about configuring GnuPG. There are detailed explanations for each configuration suggestion. Many of these changes require you to make changes to the GnuPG configuration file on your machine located at ~/.gnupg/gpg.conf. For your convenience, all the suggested changes to the gpg.conf file are gathered in one place near the bottom of this page. We strongly encourage you to not blindly copy the file, but read the document and understand what the settings do.

Also note that this guide was written for legacy versions of GnuPG (1.4) and may contain recommendations that are redundant with default settings in newer releases of GnuPG (2.1 and above). A review is in progress to make sure the guide is up to date. You can help by submitting changes yourself.
gpg  GnuPG  security  privacy  cryptography 
october 2017
drduh/YubiKey-Guide: Guide to using YubiKey as a SmartCard for GPG and SSH
This is a practical guide to using YubiKey as a SmartCard for storing GPG encryption and signing keys.
An authentication key can also be created for SSH and used with gpg-agent.
Keys stored on a smartcard like YubiKey seem more difficult to steal than ones stored on disk, and are convenient for everyday use.
gpg  GnuPG  SSH  YubiKey  security 
october 2017
Using GPG and SSH keys (GnuPG 2.1) with a Smartcard (Yubikey 4) - Suva.sh's blog
The primary intention of this post is to document the research and the steps I’ve taken for my current ‘GPG & SSH keys on a smartcard’ setup, so that I can look it up for future reference and possible improvements. There are plenty of good articles around the same subject, but most of them are partly dated either regarding GnuPG versions, subkey separation or an older Yubikey.
gpg  GnuPG  SSH  YubiKey  security 
october 2017
La sonda Cassini non esiste più - Il Post
Intorno alle 12:30 si è polverizzata nell'atmosfera di Saturno a 1,5 miliardi di chilometri da noi, dopo 20 anni di onoratissimo servizio.
science  space 
september 2017
Roombas will Spy on You
The company that sells the Roomba autonomous vacuum wants to sell the data about your home that it collects.
Roomba  IoT  security  privacy 
july 2017
La mafia del fuoco: pressioni alla politica e affari dei clan, ecco perché l’Italia sta bruciando - Repubblica.it
Dietro gli incendi non c’è un disegno eversivo o una regia unica. Ma una serie di ragioni che mettono lo Stato in ginocchio. Si evocano piani eversivi per nascondere la realtà dei territori abbandonati. È la bonifica criminale per eccellenza: con le fiamme si fa spazio a discariche e ad aree in cui si potrebbe stoccare di tutto. Il territorio è in balìa di se stesso senza alcuna seria possibilità di prevenzione, previsione, monitoraggio e intervento.
Saviano  incendi  criminalità  letture 
july 2017
Spectral is a Font That’s Interactive & Customisable
While fonts come in many forms, most, if not all of them, are usually static in design. However, fonts may soon become a lot more flexible as Google has introduced a new font type that is both customizable and interactive – called Spectral.
july 2017
Australia Considering New Law Weakening Encryption - Schneier on Security
Never mind that the law 1) would not achieve the desired results because all the smart "terrorists and drug traffickers and pedophile rings" will simply use a third-party encryption app, and 2) would make everyone else in Australia less secure. But that's all ground I've covered before.
security  encryption  Australia 
july 2017
Estrarre dati da dischi NTFS danneggiati – Andrea Lazzarotto
L’analisi dei file system è una parte molto importante dell’attività di digital forensics. Molte indagini riguardano dischi rigidi il cui contenuto deve essere analizzato. In alcuni casi, anche i file eliminati potrebbero dover essere recuperati. Ci sono diversi tipi di file system e NTFS è attualmente uno dei più popolari.
harddisk  data  recovery 
july 2017
Orologio per scacchi DGT2010 - L'orologio ufficiale della FIDE
L`orologio DGT è l`orologio ufficiale omologato dalla Federazione Scacchistica Internazionale, ed è utilizzato nei tornei ad alto livello di tutto il mondo, poiché è impostabile con le nuove cadenze di gioco ad incremento - oltre a consentire quelle tradizionali.
Scacchi  wishlist 
july 2017
Completo scacchi piombati + scacchiera da torneo con borsa
Completo da torneo scacchi doppio piombo+scacchiera+borsa, prezzo imbattibile!
Scacchi  wishlist 
july 2017
Analfabeti funzionali, il dramma italiano: chi sono e perché il nostro Paese è tra i peggiori - l'Espresso
Sono capaci di leggere e scrivere, ma hanno difficoltà a comprendere testi semplici e sono privi di molte competenze utili nella vita quotidiana. Nessuna nazione in Europa, a parte la Turchia, ne conta così tanti. Tutti i numeri per capire la dimensione di un fenomeno spesso sottovalutato.
analfabetismo_funzionale  letture 
july 2017
Secure Salted Password Hashing - How to do it Properly
If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.
password  hashing  cryptography  security 
july 2017
NarcoRoma, la nuova capitale della cocaina - Repubblica.it
La città trasformata nella centrale internazionale del traffico di droga. Gestito da gruppi criminali romani, in affari con i boss della ‘ndrangheta e della camorra. Un business straordinario che permette di raccogliere con un solo carico un miliardo e 300 milioni di euro: più del valore in Borsa di Roma e Juventus. Il procuratore Pignatone: la rotta che parte dalla Capitale ha come obiettivo l'intera Europa.
Saviano  Roma  criminalità  narcotraffico  letture 
july 2017
Why we still recommend Signal over WhatsApp ...even though they both use end-to-end encryption
WhatsApp's collaboration with Open Whisper Systems recently brought end-to-end encryption to the lives of a billion people around the world. (Open Whisper Systems develops Signal, an open source mobile messaging and VoIP app.) When WhatsApp integrated the encryption protocol developed for Signal, many of us began using end-to-end encryption without even realizing it.

Undoubtedly, this is an exciting and important development that will help protect the privacy of users all over the world. In this post, however, we would like to explain why we recommend Signal over WhatsApp, even though they both use the same protocol for end-to-end encryption.
WhatsApp  Signal  messaging  privacy  security 
july 2017
Custom Fields vs. Custom Taxonomies, when to (not) use? - Meta Box
Another question that I usually see developers are confused is when to use custom fields and when to use custom taxonomies? Should I use a taxonomy instead of a custom field or vise versa? Assume that you have a custom post type “Book” and you want to store publisher name. Will you store it as a custom field or a taxonomy?
wordpress  custom-taxonomies  custom-fields  webdev 
july 2017
How to 301 Redirect a WordPress Site
I find working as a WordPress developer to be relatively low-stress. Giving people a beautiful web presence is both a huge service, and something that doesn’t lead to massive tragedy if you’re not perfect at it right away. It’s not like being a fireman or a fighter pilot, for example.

There are exceptions, though: a few times when I’ve been so stressed-out and guilt-ridden that I’ve felt like quitting my job. What’s more, they’re all the same kind of exception.
WordPress  redirect  from pocket
july 2017
Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online
If you’re like me, one of the first things you do in the morning is check your email. And, if you’re like me, you also wonder who else has read your email. That’s not a paranoid concern. If you use a web-based email service such as Gmail or Outlook 365, the answer is kind of obvious and frightening.
Mitnick  privacy  security  from pocket
july 2017
Tales Of Job Burnout: How To Fix The Aftermath Of An Overachiever Attitude
Lately, it feels like if you’re not working 80-hour weeks, you’re not working hard enough. The willingness to work long hours in the hopes of rapid career growth has a name, and it’s not spelled B-O-S-S. Chronic overachievers often rely on a “I can do it all” attitude to feel accomplished and secure in their jobs. But what this attitude doesn’t rely on is reality. When you try to do everything all the time, you’re mostly likely to only achieve one thing: burnout.
job  burnout  from pocket
july 2017
What the Repeal of Online Privacy Protections Means for You
Congress on Tuesday moved to dismantle online privacy rules created during the Obama era. The rules, which were scheduled to take effect this year, would have required internet providers to get permission before collecting and selling a customer’s online information, including browsing activities.
privacy  security  from pocket
july 2017
Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Protections
Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now.
FCC  data  ISP  privacy  from pocket
july 2017
Nearly One Million Systems Provide "Guest" SMB Access, Most Are Linux
There are 2,306,820 devices connected to the Internet at the moment that feature open ports for SMB services, the same protocol that was used to infect hundreds of thousands of computers with the WannaCry ransomworm a month ago.
Linux  Samba  security  SMB  WannaCry  from pocket
july 2017
WikiLeaks rivela Cherry Blossom, il malware della Cia per compromettere i router
Sono operativi che conducono missioni in tutto il mondo con licenza di uccidere, supportati anche da cyber armi create nei loro laboratori, ma tra killer e nerd, sembrano avere anche slanci romantici, tanto da chiamare uno dei loro programmi Cherry Blossom, ovvero fior di ciliegio. Cherry Blossom, in realtà, di poetico e gentile ha ben poco: è un micidiale programma segreto messo a punto dalla Cia nel 2004, ma che è andato avanti almeno fino al 2012 e non è escluso che sia ancora in corso, considerato quanto longevo e ambizioso.
malware  router  security  WikiLeaks  from pocket
july 2017
How Spammers, Superstars, and Tech Giants Gamed Music
Some of the ways artists are hacking the music-streaming service Spotify.
Spotify  hacking  music 
july 2017
Git Flow: come funziona aka Back to the future - Bitbull
I sistemi di controllo di versione consentono di tenere traccia delle modifiche fatte nel tempo e di collaborare più efficacemente all’interno di team composti da molte persone in particolare se, come in Bitbull, lavorano da remoto.
Non ci addentreremo nella spiegazione di che cos’è un sistema di controllo di versione, ma bensì vedremo come gestire al meglio il flusso di sviluppo con Git, il software di controllo versione distribuito.
Git  git-flow  development 
june 2017
git-flow cheatsheet
Branching efficiente usando git-flow realizzato da Vincent Driessen
Git  git-flow  development 
june 2017
7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely
A 7-year-old critical remote code execution vulnerability has been discovered in Samba networking software that could allow a remote attacker to take control of an affected Linux and Unix machines.
security  Samba 
may 2017
WannaCry Ransomware: Everything You Need To Know Immediately
The only positive thing about this attack is that — you are here — as after reading this easy-to-understandable awareness article, you would be so cautious that you can save yourself from WannaCry, as well as other similar cyber attacks in the future.
security  malware  ransomware 
may 2017
Journey to the centre of the Earth | Visual.ly
How far would you have to travel to reach the Earth's core? And what would you see along the way? Discover what lies beneath...
may 2017
Installing Neon on top of Kubuntu without reinstall • KDE Community Forums
So I have decided to install Neon on top of my Kubuntu-16.04 (+ backports PPA + libreoffice PPA).
KDE  KDE-Neon  Kubuntu 
may 2017
How to upgrade kubuntu 16.04 -> KDE neon
How to upgrade kubuntu 16.04 -> KDE neon
KDE  KDE-Neon  Kubuntu 
may 2017
Cronaca di un attacco di ransomware: in chat con i criminali
Quello che segue è un racconto di un grave attacco informatico a un'azienda che ho seguito personalmente come giornalista, arrivando a dialogare con gli aggressori, ma è soprattutto un promemoria del fatto che storie come questa possono capitare a chiunque e dovunque e hanno conseguenze pesanti per chi non fa prevenzione.
malware  ransomware 
april 2017
« earlier      
@font-face admin aldolat.it android apache apple apps archive art astronomy audio authentication backup bazaar best blackberry blog blogging books browser bug buttons cache calendar canonical certificate cheatsheet chess chiesa cloud cms code color colore comments content converter copyright cryptography css css3 cultura custom custom-fields custom-post-type database design desktop development dictionary dns documentation dropbox dropdown ebook ecommerce editor education email encryption english enti evolution faq fcm federazioni feed feedburner files filesharing filesystem firefox flash fonts forensics forum fotografia framework free free_music freelance freeware functions gallery generator git gmail gnome gnu/ubuntu gnupg google gpg grafica grafica_dtp graphics grid grub gtd guide hacks hardware help hooks hosting hotlinking howto htaccess html html5 icons ie ie6 image images inkscape inspiration internet iso italiano javascript jobs joomla jquery kde language latex launchpad lavoro layout learning letture libri linguistica linux logos loop mac mail malware management maps media mediawiki menu meteo mobile modding moving mozilla multimedia music mysql nas nautilus navigation netiquette networking news news_informatica nopost notes oop openfont openoffice opensource optimization options osx86 password patterns pdf performance persone pgp photo photography photoshop php play plugin podcast politica post privacy productivity quotidiani recovery redirect reference repository reset resources responsive router rss samsung scacchi science screenshot search security seo server servizi sharing shopping shortcodes skype slider slideshow social software space spam ssh ssl standards statistics storage streaming subversion svago svn sync sysadmin tema_k2 templates test text textures themes thumbnail time tips tools tracking translation tricks truecrypt tutorials tv twitter type typography ubuntu unread url utilities utility video virtualbox w3c web web2.0 webapp webdesign webdev wiki windows wishlist wordpress wp_query

Copy this bookmark: