<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6759023183465774680</id><updated>2024-10-04T18:59:17.180-07:00</updated><category term="defence"/><category term="facebook"/><category term="security"/><category term="antivirus"/><category term="hacking"/><category term="telefonia"/><category term="tools"/><category term="add-ons"/><category term="girls"/><category term="google"/><category term="iPhone"/><category term="internet"/><category term="phishing"/><category term="portafoglio"/><category term="test"/><category term="vulnerabilità"/><category term="wireless"/><title type='text'>PC Insecurity</title><subtitle type='html'>Notizie e informazioni sulla (in)sicurezza informatica.&#xa;&#xa;News and informations about computer and internet (in)security.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://pcinsecurity.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>27</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-4496625442420681507</id><published>2010-03-24T06:55:00.000-07:00</published><updated>2010-03-24T07:08:13.478-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="girls"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><title type='text'>Come Conoscere e Sedurre Ragazze Online</title><content type='html'>In un periodo in cui escono guide per fare qualsiasi cosa...ecco una miniguida per conoscere ragazze sulle chat, cosa fare per riuscire ad invitarle ad uscire, sedurle ecc..&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.megaupload.com/?d=73FPCV6S&quot;&gt;&lt;u&gt;Girls&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;Miniguida.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2010/03/come-conoscere-e-sedurre-ragazze-online.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/4496625442420681507'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/4496625442420681507'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2010/03/come-conoscere-e-sedurre-ragazze-online.html' title='Come Conoscere e Sedurre Ragazze Online'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-4584540904558720706</id><published>2010-02-16T04:30:00.000-08:00</published><updated>2010-02-16T04:36:25.334-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antivirus"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Antivirus Gratis In Italiano: Ecco I Migliori</title><content type='html'>Il mitico Salvatore Aranzulla ci elenca e descrive i migliori antivirus gratuiti in italiano e come installarli...&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://aranzulla.tecnologia.virgilio.it/antivirus-gratis-in-italiano-ecco-i-migliori-9244.html&quot;&gt;&lt;u&gt;Antivirus gratis&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;I migliori antivirus gratuiti.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2010/02/antivirus-gratis-in-italiano-ecco-i.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/4584540904558720706'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/4584540904558720706'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2010/02/antivirus-gratis-in-italiano-ecco-i.html' title='Antivirus Gratis In Italiano: Ecco I Migliori'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-671144855084245875</id><published>2010-01-12T23:23:00.000-08:00</published><updated>2010-01-13T00:14:59.130-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="tools"/><title type='text'>Facebook - Come evitare di essere taggati</title><content type='html'>Siete stanchi di scoprire che i vostri amici vi hanno taggato in foto in cui non vi si può guardare e che finiscono impietosamente sul vostro profilo.&lt;br /&gt;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Ecco qua la soluzione per disabilitare i Tag su Facebook:&lt;!-- adsense --&gt;&lt;br /&gt;&lt;span&gt;&lt;br /&gt;&lt;b&gt;1)&lt;/b&gt; Dal menu in alto selezionate la voce “&lt;b&gt;Impostazioni&lt;/b&gt;“, quindi &quot;&lt;b&gt;Impostazioni sulla privacy&lt;/b&gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;div&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;span&gt;&lt;b&gt;2)&lt;/b&gt; Nella pagina che si aprirà selezionate la prima voce, ovvero &lt;b&gt;Informazioni del profilo&lt;/b&gt;&lt;br /&gt;&lt;b&gt;3)&lt;/b&gt; Scorrete la pagina corrente fino alla voce “&lt;b&gt;Foto e video con me&lt;/b&gt;“ e dal menu a tendina di lato clickate su “&lt;b&gt;Personalizza&lt;/b&gt;“&lt;br /&gt;&lt;b&gt;4)&lt;/b&gt; Nella finestra che si aprirà troverete un ulteriore menu a tendina in cui selezionerete la voce “&lt;b&gt;Solo io&lt;/b&gt;“,&lt;br /&gt;&lt;b&gt;5)&lt;/b&gt; Infine un click su “&lt;b&gt;Salva Impostazioni&lt;/b&gt;“&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;span&gt;&lt;br /&gt;Ecco fatto.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;D&#39;ora in poi i vostri amici non vi potranno più taggare senza permesso.&lt;/div&gt;&lt;div&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2010/01/facebook-come-evitare-di-essere-taggati.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/671144855084245875'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/671144855084245875'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2010/01/facebook-come-evitare-di-essere-taggati.html' title='Facebook - Come evitare di essere taggati'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-2191265465101647157</id><published>2009-12-23T00:00:00.000-08:00</published><updated>2009-12-23T00:08:55.691-08:00</updated><title type='text'>Disabilitare i pop-up pubblicitari durante l&#39;aggiornamento di Avira AntiVir Personal</title><content type='html'>Vi siete stufati di quella finestra di pop-up che vi si piazza davanti mentre state lavorando, giocando, vedendo un film solo perchè l&#39;antivirus si sta aggiornando?&lt;br /&gt;Tutti gli utilizzatori di Avira AntiVir Personal sapranno di cosa sto parlando.&lt;br /&gt;&lt;br /&gt;Ecco le istruzioni per eliminare il problema:&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.megalab.it/5386/2/disabilitare-i-pop-up-pubblicitari-durante-l-aggiornamento-di-avira-antivir-personal&quot;&gt;&lt;u&gt;Istruzioni su Megalab.it&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;http://www.megalab.it/5386/2/disabilitare-i-pop-up-pubblicitari-durante-l-aggiornamento-di-avira-antivir-personal&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/12/disabilitare-i-pop-up-pubblicitari.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/2191265465101647157'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/2191265465101647157'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/12/disabilitare-i-pop-up-pubblicitari.html' title='Disabilitare i pop-up pubblicitari durante l&#39;aggiornamento di Avira AntiVir Personal'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-5009375439516431637</id><published>2009-12-02T23:02:00.000-08:00</published><updated>2009-12-02T23:30:01.647-08:00</updated><title type='text'>Niente più Torrent illegali su Mininova</title><content type='html'>Il sito non condividerà più torrent illegali per cercare materiale protetto da copyright. &lt;br /&gt;&lt;br /&gt;La reazione di Mininova alla sentenza è stata la seguente &lt;br /&gt;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://blog.mininova.org/articles/2009/11/26/mininova-limits-its-activities-to-content-distribution-service/&quot;&gt;&lt;u&gt;Niente più Film e Musica&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;Blog di Mininova&lt;br /&gt;http://blog.mininova.org/articles/2009/11/26/mininova-limits-its-activities-to-content-distribution-service/&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Il tribunale ha dato ragione alla Brein (Protezione dei diritti dell&#39;industria dell&#39;intrattenimento olandese), organizzazione che tutela il diritto d&#39;autore condannando il sito a rimuovere tutti i file protetti da copyright, pena una multa da 5 milioni di euro. &lt;br /&gt;&lt;br /&gt;Ora si apre una nuova lotta alla successione tra &#39;indicizzatorì di contenuti illegali. Tra i candidati ci sono ad esempio UKNova, ISOHunt ed EZTV, ma non bisogna dimenticare lo storico Pirate Bay, che a dispetto delle sentenze risulta tuttora funzionante anche in Italia.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/12/niente-piu-torrent-illegali-su-mininova.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/5009375439516431637'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/5009375439516431637'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/12/niente-piu-torrent-illegali-su-mininova.html' title='Niente più Torrent illegali su Mininova'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-452458206657384621</id><published>2009-10-13T23:45:00.000-07:00</published><updated>2009-10-14T00:04:02.920-07:00</updated><title type='text'>Come ottenere Norton Internet Security Gratis per 6 mesi</title><content type='html'>Un sito promozionale tedesco offre licenze gratuite per 6 mesi.&lt;br /&gt;&lt;br /&gt;Chi è in cerca di sicurezza nella navigazione internet ed è interessato ad un ottimo antivirus può collegarsi a questa pagina&lt;br /&gt;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;https://emea.norton.com/trialware/2009/avfbild/&quot;&gt;&lt;u&gt;Pagina Promozionale Norton&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;Sito promozionale in tedesco&lt;br /&gt;https://emea.norton.com/trialware/2009/avfbild/&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Una volta sulla pagina compilate i campi con un&#39;e-mail valida, una nazione a caso, spuntate le 2 due caselle e cliccate sul pulsante &lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;Produktschlussel anfordem&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Dopo circa 30 minuti vi arriverà una mail con il link di conferma.&lt;br /&gt;&lt;br /&gt;Cliccate il link e, questa volta velocemente, riceverete una mail con oggetto:&lt;br /&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;Norton Internet Security 2009 - Ihr persönlicher Produktschlüssel&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Essa conterrà la licenza gratuita per 6 mesi !!&lt;br /&gt;&lt;br /&gt;Facile no?&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/10/come-ottenere-norton-internet-security.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/452458206657384621'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/452458206657384621'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/10/come-ottenere-norton-internet-security.html' title='Come ottenere Norton Internet Security Gratis per 6 mesi'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-1805853215758684498</id><published>2009-09-08T05:34:00.000-07:00</published><updated>2009-09-08T05:55:39.825-07:00</updated><title type='text'>E&#39; morto Mike Bongiorno</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTjS3g-NeiMhuA_XRmLPYSkx_lSCu8tKEE4SVj_y4f2g5ZH1M5Knxvfs8bGTUM8rSoVWHgJjFymKxVI-SkU_5kOTyaP8twr7nq_m9c5pROoEjxybqWG3gpHB4VOmVWkRjHrVz5GtSdqzE/s1600-h/mike.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 230px; height: 147px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTjS3g-NeiMhuA_XRmLPYSkx_lSCu8tKEE4SVj_y4f2g5ZH1M5Knxvfs8bGTUM8rSoVWHgJjFymKxVI-SkU_5kOTyaP8twr7nq_m9c5pROoEjxybqWG3gpHB4VOmVWkRjHrVz5GtSdqzE/s400/mike.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5379079454734685698&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Muore all&#39;età di 85 anni il mitico Mike Bongiorno, colui che ha portato in Italia il quiz televisivo.&lt;br /&gt;&lt;br /&gt;Ecco qui la notizia:&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.repubblica.it/2009/09/sezioni/persone/mike-bongiorno/mike-bongiorno/mike-bongiorno.html&quot;&gt;&lt;u&gt;Muore Mike Bongiorno&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;Addio al Re della TV&lt;br /&gt;http://www.repubblica.it/2009/09/sezioni/persone/mike-bongiorno/mike-bongiorno/mike-bongiorno.html?rss&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Non c&#39;entra con la sicurezza...ma visto che se ne va un pezzo di storia, lo salutiamo.&lt;br /&gt;Ciao Mike! Allegria!&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/09/e-morto-mike-bongiorno.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/1805853215758684498'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/1805853215758684498'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/09/e-morto-mike-bongiorno.html' title='E&#39; morto Mike Bongiorno'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTjS3g-NeiMhuA_XRmLPYSkx_lSCu8tKEE4SVj_y4f2g5ZH1M5Knxvfs8bGTUM8rSoVWHgJjFymKxVI-SkU_5kOTyaP8twr7nq_m9c5pROoEjxybqWG3gpHB4VOmVWkRjHrVz5GtSdqzE/s72-c/mike.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-3664471373997853697</id><published>2009-09-04T05:08:00.000-07:00</published><updated>2009-09-04T05:26:50.707-07:00</updated><title type='text'>Facebook: Come eliminare il profilo/account e cancellarsi definitivamente</title><content type='html'>Sembrerebbe una delle prime cose che un utente dovrebbe poter fare.&lt;br /&gt;Si scopre però che è possibile soltanto disattivare il proprio account.&lt;br /&gt;&lt;br /&gt;Come fare allora per rimuoversi completamente ???&lt;br /&gt;&lt;br /&gt;Vediamolo insieme.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Innanzitutto si apre il seguente indirizzo web:&lt;br /&gt;&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.facebook.com/help/contact.php?show_form=delete_account&quot;&gt;&lt;u&gt;Cancellazione account Facebook&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;Form per l&#39;eliminazione del profilo di Facebook.&lt;br /&gt;http://www.facebook.com/help/contact.php?show_form=delete_account&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Dopo aver confermato l&#39;operazione avrete 14 giorni per ripensarci.&lt;br /&gt;&lt;br /&gt;Se vi siete sbagliati basta loggarsi nuovamente prima dello scadere dei 14 giorni ed esso verrà riattivato.&lt;br /&gt;&lt;br /&gt;E&#39; comunque buona norma eliminare prima tutte le proprie foto, i video e quant&#39;altro.&lt;br /&gt;Non si sa mai...&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/09/facebook-come-eliminare-il.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/3664471373997853697'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/3664471373997853697'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/09/facebook-come-eliminare-il.html' title='Facebook: Come eliminare il profilo/account e cancellarsi definitivamente'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-2172357981623810181</id><published>2009-09-03T23:40:00.000-07:00</published><updated>2009-09-04T00:14:17.027-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antivirus"/><category scheme="http://www.blogger.com/atom/ns#" term="defence"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Cosa serve per difendersi da virus, malware, spyware.</title><content type='html'>Spesso ci si chiede come occuparsi della propria sicurezza personale sui pc di casa.&lt;br /&gt;Ma poi sorgono i dubbi :&lt;br /&gt;avrò pensato a tutto?&lt;br /&gt;ci sono altri strumenti per rimuovere malware?&lt;br /&gt;come si chiamano i migliori software antivirus?&lt;br /&gt;Dove li trovo?&lt;br /&gt;&lt;br /&gt;Bhe...qui trovate tutto!&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.megalab.it/2331/i-migliori-programmi-per-la-sicurezza-del-pc&quot;&gt;&lt;u&gt;Tutto per la sicurezza&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;Liste selezionate con tutto ciò che serve diviso per categoria.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Veramente un ottimo lavoro per cui facciamo i complimenti a crazi.cat !&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/09/cosa-serve-per-difendersi-da-virus.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/2172357981623810181'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/2172357981623810181'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/09/cosa-serve-per-difendersi-da-virus.html' title='Cosa serve per difendersi da virus, malware, spyware.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-626272880730166856</id><published>2009-08-03T23:26:00.000-07:00</published><updated>2009-08-04T00:43:35.357-07:00</updated><title type='text'>Windows 7: Crack ancora funzionanti</title><content type='html'>Come molti già sparanno un crack per Microsoft Windows 7 era già stato &lt;a href=&quot;http://www.megalab.it/4946/windows-7-gia-craccato-e-attivato-a-tre-mesi-dal-lancio&quot;&gt;rilasciato una settimana prima del lancio sul mercato.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Microsoft ha rilasiato subito un messaggio in cui millanta il proprio sistema antipirateria&lt;br /&gt;&lt;br /&gt;&quot;Windows 7 already includes&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;an improved ability to detect hacks, also known as activation exploits, and alert customers who are using a pirated copy.&quot;&lt;br /&gt;&lt;br /&gt;Ma tale sistema non è tutt&#39;ora ben funzionante...&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Provando ad esempio la  convalida online sul sito dedicato viene segnalato che il servizio funziona solo con Xp e Vista.&lt;br /&gt;&lt;br /&gt;Morale della favola...l&#39;attivatore funziona ancora&lt;!-- adsense --&gt;&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/08/windows-7-crack-ancora-funzionanti.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/626272880730166856'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/626272880730166856'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/08/windows-7-crack-ancora-funzionanti.html' title='Windows 7: Crack ancora funzionanti'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-2746346369752032116</id><published>2009-07-31T02:10:00.000-07:00</published><updated>2009-08-03T01:38:04.545-07:00</updated><title type='text'>Facebook: Visualizzare album e foto di tutti gli utenti senza essere amici ?</title><content type='html'>Avevo citato nel mio primo ariticolo &quot;&lt;a href=&quot;http://pcinsecurity.blogspot.com/2009/06/facebook-visualizzare-le-foto-senza.html&quot;&gt;Come visualizzarele foto senza essere amici&lt;/a&gt;&quot; una delle applicazioni che permettevano di vedere gli album pubblici di tutti gli utenti di facebook.&lt;br /&gt;&lt;br /&gt;Ne esistono altre definite &quot;più potenti&quot; ...&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Eccole&lt;/span&gt;:&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://apps.facebook.com/seegugio/&quot;&gt;&lt;u&gt;Seegugio&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;Visualizzatore di foto private su Facebook&lt;a href=&quot;http://apps.facebook.com/josh_owns/?_fb_q=1&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;u&gt;Photo Stalker&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;Ricerca foto utenti Facebook&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;in realtà tutta questa serie di programmini ha smesso di essere utile nel momento in cui lo staff di Facebook ha pensato di aggiornare le regole generali impostando quello che già consigliavo di fare agli utenti per difendersi , ossia rendere non visibili gli album pubblici.&lt;br /&gt;&lt;br /&gt;D&#39;altronde non è una cattiva idea se non vuole continuare a incorrere in &lt;a href=&quot;http://nbtimes.it/?p=3220&quot;&gt;queste beghe&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/facebook-visualizzare-album-e-foto-di.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/2746346369752032116'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/2746346369752032116'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/facebook-visualizzare-album-e-foto-di.html' title='Facebook: Visualizzare album e foto di tutti gli utenti senza essere amici ?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-8111450158818393832</id><published>2009-07-30T23:10:00.001-07:00</published><updated>2009-08-03T01:41:10.695-07:00</updated><title type='text'>Controllare un file sospetto con tanti antivirus contemporaneamente</title><content type='html'>Avete scaricato un file che non vi convince?&lt;br /&gt;Il vostro antivirus non rileva minacce ma voi non vi fidate?&lt;br /&gt;Vorreste controllarlo con diversi antivirus?&lt;br /&gt;&lt;br /&gt;Allora questo ottimo servizio online è quello che vi serve&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.virustotal.com/&quot;&gt;&lt;u&gt;Virus Total&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;Servizio di analisi files sospetti&lt;br /&gt;www.virustotal.com&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Il file che invierete verrà controllato con i motori dei seguenti antivirus.&lt;br /&gt;Che dite? Bastano?&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://global.ahnlab.com/&quot;&gt;AhnLab&lt;/a&gt; (V3)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.antiy.com/&quot;&gt;Antiy Labs&lt;/a&gt; (Antiy-AVL)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.esafe.com/esafe/default.asp&quot;&gt;Aladdin&lt;/a&gt; (eSafe)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.avast.com/&quot;&gt;ALWIL&lt;/a&gt; (Avast! Antivirus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.authentium.com/&quot;&gt;Authentium&lt;/a&gt; (Command Antivirus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.avg.com/&quot;&gt;AVG Technologies&lt;/a&gt; (AVG)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.avira.com/&quot;&gt;Avira&lt;/a&gt; (AntiVir)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.quickheal.co.in/&quot;&gt;Cat Computer Services&lt;/a&gt; (Quick Heal)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.clamav.net/&quot;&gt;ClamAV&lt;/a&gt; (ClamAV)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.comodo.com/&quot;&gt;Comodo&lt;/a&gt; (Comodo)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.ca.com/&quot;&gt;CA Inc.&lt;/a&gt; (Vet)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.drweb.com/&quot;&gt;Doctor Web, Ltd.&lt;/a&gt; (DrWeb)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.emsisoft.com/&quot;&gt;Emsi Software GmbH&lt;/a&gt; (a-squared)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.eset.com/&quot;&gt;Eset Software&lt;/a&gt; (ESET NOD32)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.fortinet.com/&quot;&gt;Fortinet&lt;/a&gt; (Fortinet)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.f-prot.com/&quot;&gt;FRISK Software&lt;/a&gt; (F-Prot)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.f-secure.com/&quot;&gt;F-Secure&lt;/a&gt; (F-Secure)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.gdata.de/&quot;&gt;G DATA Software&lt;/a&gt; (GData)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.hacksoft.com.pe/&quot;&gt;Hacksoft&lt;/a&gt; (The Hacker)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.hauri.net/&quot;&gt;Hauri&lt;/a&gt; (ViRobot)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.ikarus.at/&quot;&gt;Ikarus Software&lt;/a&gt; (Ikarus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://gameguard.nprotect.com/&quot;&gt;INCA Internet&lt;/a&gt; (nProtect)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.k7computing.com/&quot;&gt;K7 Computing&lt;/a&gt; (K7AntiVirus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.kaspersky.com/&quot;&gt;Kaspersky Lab&lt;/a&gt; (AVP)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.mcafee.com/&quot;&gt;McAfee&lt;/a&gt; (VirusScan)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.microsoft.com/security/portal/&quot;&gt;Microsoft&lt;/a&gt; (Malware Protection)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.norman.com/&quot;&gt;Norman&lt;/a&gt; (Norman Antivirus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.pandasecurity.com/&quot;&gt;Panda Security&lt;/a&gt; (Panda Platinum)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.pctools.com/&quot;&gt;PC Tools&lt;/a&gt; (PCTools)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.prevx.com/&quot;&gt;Prevx&lt;/a&gt; (Prevx1)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.rising.com.cn/&quot;&gt;Rising Antivirus&lt;/a&gt; (Rising)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.securecomputing.com/&quot;&gt;Secure Computing&lt;/a&gt; (SecureWeb)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.bitdefender.com/&quot;&gt;BitDefender GmbH&lt;/a&gt; (BitDefender)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.sophos.com/&quot;&gt;Sophos&lt;/a&gt; (SAV)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.sunbelt-software.com/&quot;&gt;Sunbelt Software&lt;/a&gt; (Antivirus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.symantec.com/&quot;&gt;Symantec&lt;/a&gt; (Norton Antivirus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.anti-virus.by/&quot;&gt;VirusBlokAda&lt;/a&gt; (VBA32)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.trendmicro.com/&quot;&gt;Trend Micro&lt;/a&gt; (TrendMicro)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.virusbuster.hu/&quot;&gt;VirusBuster&lt;/a&gt; (VirusBuster)&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Come inviarlo(3 modi)&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;-&lt;/span&gt;&lt;/span&gt; Utilizzare il classico &lt;span style=&quot;font-weight: bold;&quot;&gt;upload sul sito&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-gmxy4A1TVCz96pcN_49OTvOlDVaRB6b-lMuDZ4dYMAec0oBzu5frQBq8_oUtzPid8Ok6EsAE6-8oyCnptQp_HWr6kinxYmaBR1Ulsi3uHrsOvvUqsoUOppq38OTVl8m-YRIaMQCZpG0/s1600-h/VT_invio.png&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 469px; height: 169px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-gmxy4A1TVCz96pcN_49OTvOlDVaRB6b-lMuDZ4dYMAec0oBzu5frQBq8_oUtzPid8Ok6EsAE6-8oyCnptQp_HWr6kinxYmaBR1Ulsi3uHrsOvvUqsoUOppq38OTVl8m-YRIaMQCZpG0/s400/VT_invio.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5364514337964170450&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;-&lt;/span&gt;&lt;/span&gt; Spedirlo &lt;span style=&quot;font-weight: bold;&quot;&gt;via email&lt;/span&gt; all&#39;indirizzo &lt;a href=&quot;mailto:scan@virustotal.com?subject=SCAN&quot;&gt;scan@virustotal.com&lt;/a&gt; (se inferiore a 20 MB) ricevendo l&#39;analisi in risposta.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;-&lt;/span&gt;&lt;/span&gt; Utilizzare &lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.virustotal.com/vtsetup.exe&quot;&gt;VirusTotal uploader&lt;/a&gt;: che va scaricato e installato.&lt;br /&gt; Dopodichè si potrà inviare ogni potenziale virus direttamente cliccando col tasto destro sul file   e scegliendo VirusTotal dal menu &quot;Invia a..&quot; (o Send to)&lt;br /&gt;&lt;img src=&quot;file:///C:/DOCUME%7E1/CAPELL%7E1/IMPOST%7E1/Temp/moz-screenshot.png&quot; alt=&quot;&quot; /&gt;&lt;br /&gt;&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;http://www.virustotal.com/images/it_virustotal-uploader.png&quot; alt=&quot;VirusTotal Uploader&quot; border=&quot;0&quot; height=&quot;213&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;365&quot; /&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Per non fare disinformazione ci tengo a dirvi che se una nuova minaccia è appena stata rilasciata dallo sviluppatore del virus e siete trai primi ad entrarvi in contatto difficilmente verrà rilevata anche dagli antivirus più efficaci (ma sono sicuro che avrete anche altre protezioni oltre al semplice antivirus...vero?).&lt;br /&gt;&lt;br /&gt;Comunque, avendolo spedito il tutto ai boss del settore, avrete fatto un bene alla comunità internet.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/controllare-un-file-sospetto-con-tanti.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/8111450158818393832'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/8111450158818393832'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/controllare-un-file-sospetto-con-tanti.html' title='Controllare un file sospetto con tanti antivirus contemporaneamente'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-gmxy4A1TVCz96pcN_49OTvOlDVaRB6b-lMuDZ4dYMAec0oBzu5frQBq8_oUtzPid8Ok6EsAE6-8oyCnptQp_HWr6kinxYmaBR1Ulsi3uHrsOvvUqsoUOppq38OTVl8m-YRIaMQCZpG0/s72-c/VT_invio.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-5204551481616810391</id><published>2009-07-29T03:02:00.000-07:00</published><updated>2009-07-30T06:34:14.253-07:00</updated><title type='text'>Come scaricare video da Youtube in un click</title><content type='html'>Esistono i più svariati software per scaricare video su Youtube e simili.&lt;br /&gt;&lt;br /&gt;Ma in caso di bisogno preferisco sempre i metodi diretti in stile pulsante.&lt;br /&gt;&lt;br /&gt;Trascinate il seguente link sulla vostra barra dei preferiti (o dei segnalibri).&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;javascript:if(document.location.href.match(/http:\/\/[a-zA-Z\.]*youtube\.com\/watch/)){document.location.href=&#39;http://www.youtube.com/get_video?fmt=&#39;+(isHDAvailable?&#39;22&#39;:&#39;18&#39;)+&#39;&amp;amp;video_id=&#39;+swfArgs[&#39;video_id&#39;]+&#39;&amp;amp;t=&#39;+swfArgs[&#39;t&#39;]}&quot;&gt;Get Youtube Video&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Ora vi basta cliccarlo ogni volta che vi trovate sulla pagina di un video interessante&lt;br /&gt;&lt;!-- adsense --&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuZPF_Ckxb_Xw7Of9NhmwoUAFrjZRy6xRl1TtOsbBRgqn8qm87QKSFGP9qdTq2BxqYGQycl7wSI7rfz1ZbbynsgXVmW6f3xUz_E6QzZsDAB6MOzFT7_TVXNdRoEdLypCnqWJsE27QbP28/s1600-h/BookmarkletYoutube.png&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 223px; height: 112px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuZPF_Ckxb_Xw7Of9NhmwoUAFrjZRy6xRl1TtOsbBRgqn8qm87QKSFGP9qdTq2BxqYGQycl7wSI7rfz1ZbbynsgXVmW6f3xUz_E6QzZsDAB6MOzFT7_TVXNdRoEdLypCnqWJsE27QbP28/s400/BookmarkletYoutube.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5363827258888638738&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;e vi verrà chiesto di salvarlo in formato &lt;span style=&quot;font-weight: bold;&quot;&gt;MP4&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Nominatelo come preferite e il gioco è fatto.&lt;br /&gt;&lt;br /&gt;Più veloce di così...</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/come-scaricare-video-da-youtube-in-un.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/5204551481616810391'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/5204551481616810391'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/come-scaricare-video-da-youtube-in-un.html' title='Come scaricare video da Youtube in un click'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuZPF_Ckxb_Xw7Of9NhmwoUAFrjZRy6xRl1TtOsbBRgqn8qm87QKSFGP9qdTq2BxqYGQycl7wSI7rfz1ZbbynsgXVmW6f3xUz_E6QzZsDAB6MOzFT7_TVXNdRoEdLypCnqWJsE27QbP28/s72-c/BookmarkletYoutube.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-2543559755783367274</id><published>2009-07-24T02:56:00.001-07:00</published><updated>2009-08-03T02:39:40.905-07:00</updated><title type='text'>Click2Try: Come provare il software Open Source senza installarlo</title><content type='html'>Sei ancora restio o pigro riguardo l&#39;installare una versione di Linux?&lt;br /&gt;&lt;br /&gt;Ecco come provare sistemi open source senza dover modificare nulla nel tuo pc?&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a style=&quot;font-family: verdana; font-weight: bold;&quot; href=&quot;http://www.click2try.com/&quot;&gt;&lt;u&gt;Provali Online!!!&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;Non serve installare nulla&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.click2try.com/&quot;&gt;Click2Try&lt;/a&gt;è un ottimo ottimo tool che permette di provare più di 50 applicazioni direttamente online.&lt;br /&gt;COME FUNZIONA:&lt;br /&gt;Crea delle sessioni accessibili su di una macchina virtuale remota.&lt;br /&gt;&lt;br /&gt;Ogni sessione dura un&#39;ora (non è possibile salvare ciò che si è cretao in una sessione per riutilizzarlo in una successiva)&lt;br /&gt;&lt;br /&gt;Funziona bene su Windows, Mac OS X e Linux e con i browsers più diffusi.&lt;br /&gt;&lt;br /&gt;PREREQUISITI:&lt;br /&gt;Java installato in locale.&lt;br /&gt;Un minimo di banda (ma è comunque abbastanza fluido)&lt;br /&gt;&lt;br /&gt;Si possono provare anche tre distribuzioni GNU/Linux : Ubuntu, CentOS e OpenSuse (solo con GNOME)&lt;br /&gt;&lt;br /&gt;Una buona soluzione per avvicinare all&#39;Open Source anche i più pigri.&lt;br /&gt;&lt;br /&gt;Cosa aspettate!!!&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.click2try.com/&quot;&gt;Click2Try &lt;/a&gt;!&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/click2try-come-provare-il-software-open.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/2543559755783367274'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/2543559755783367274'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/click2try-come-provare-il-software-open.html' title='Click2Try: Come provare il software Open Source senza installarlo'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-1276641031549192921</id><published>2009-07-23T03:25:00.000-07:00</published><updated>2009-09-04T05:46:24.538-07:00</updated><title type='text'>Scoperto un bug nel kernel di Linux</title><content type='html'>Cito direttamente l&#39;articolo di PI&lt;br /&gt;&lt;br /&gt;&quot;Avvalendosi di una tecnica &lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://blog.cr0.org/2009/06/bypassing-linux-null-pointer.html&quot; target=&quot;_blank&quot;&gt;già teorizzata&lt;/a&gt;&lt;/span&gt; da Julien Tinnes e Tavis Ormandy, e &lt;a href=&quot;http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1310528,00.html#&quot; target=&quot;_blank&quot;&gt;dimostrata&lt;/a&gt; lo scorso anno da Mark Dowd con un bug di Adobe Flash, Spengler ha scritto un exploit capace di approfittare delle deferenziazioni ai puntatori nulli per bypassare tutte le più comuni estensioni di sicurezza per Linux: &lt;a href=&quot;http://web.mit.edu/rhel-doc/4/RH-DOCS/rhel-rg-it-4/ch-selinux.html&quot; target=&quot;_blank&quot;&gt;SELinux&lt;/a&gt;, &lt;a href=&quot;http://www.novell.com/linux/security/apparmor/&quot; target=&quot;_blank&quot;&gt;AppArmor&lt;/a&gt; e &lt;a href=&quot;http://www.dia.unisa.it/%7Eads/corso-security/www/CORSO-0304/lsm/index.htm&quot; target=&quot;_blank&quot;&gt;Linux Security Module&lt;/a&gt;.&quot;&lt;br /&gt;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Leggi l&#39;articolo intero:&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;line-height: 1em;font-size:85%;&quot; &gt;&lt;span style=&quot;line-height: 1em;font-size:85%;&quot; &gt;&lt;a style=&quot;font-family: verdana; font-weight: bold;&quot; href=&quot;http://punto-informatico.it/2677050/PI/News/un-bug-nel-cuore-linux.aspx&quot;&gt;&lt;u&gt;Bug nel cuore di Linux&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;line-height: 1em;font-family:verdana;&quot; &gt;Punto Informatico&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;News&lt;/span&gt;&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/scoperto-un-bug-nel-cuore-di-linux.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/1276641031549192921'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/1276641031549192921'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/scoperto-un-bug-nel-cuore-di-linux.html' title='Scoperto un bug nel kernel di Linux'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-3224921013147673539</id><published>2009-07-20T00:11:00.000-07:00</published><updated>2009-08-03T03:08:38.258-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="vulnerabilità"/><title type='text'>Mozilla Firefox 3.5.1: Scoperta una nuova Vulnerabilità.</title><content type='html'>Alcuni analisti e siti, oltre a diversi utenti hanno confermato la presenza di &lt;a href=&quot;http://www.securityfocus.com/bid/35707&quot;&gt;un bug&lt;/a&gt; nella neo-rilasciata build di Firefox (3.5.&lt;span style=&quot;font-weight: bold;&quot;&gt;1&lt;/span&gt;),già di per se rilasciata per risolvere alcuni problemi di sicurezza.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJxspdTzFC-F_O6q_jbIpOrqofmXtiHtL8ExQX_hA7p_yWBQnyMmYp2hfX25C6sdKnOmeM7a5AjQmJX9BMJKIpPxXS-9P2MqtCBiSLI03eMF9cJlbxMm3hzZmL74T7MvLGJxLcSNleohQ/s1600-h/bugFirefox351.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 228px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJxspdTzFC-F_O6q_jbIpOrqofmXtiHtL8ExQX_hA7p_yWBQnyMmYp2hfX25C6sdKnOmeM7a5AjQmJX9BMJKIpPxXS-9P2MqtCBiSLI03eMF9cJlbxMm3hzZmL74T7MvLGJxLcSNleohQ/s400/bugFirefox351.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5360447673826551394&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Utilizzando un apposito &lt;a href=&quot;http://www.milw0rm.com/exploits/9158&quot;&gt;exploit&lt;/a&gt; un malintenzionato sarebbe in grado di compromettere il sistema o creare rallentamenti e blocchi(Attacco DoS).&lt;br /&gt;&lt;br /&gt;Internet Explore 8 sembra invece reagire meglio allo script malevolo dando un semplice messaggio &quot;memoria insufficiente per eseguire l&#39;operazione&quot;&lt;br /&gt;&lt;br /&gt;Al momento &lt;span style=&quot;font-weight: bold;&quot;&gt;non è ancora disponibile una patch&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Come difendersi:&lt;br /&gt;&lt;!-- adsense --&gt;&lt;a href=&quot;https://addons.mozilla.org/it/firefox/addon/722&quot;&gt;L&#39;add-on No-Script&lt;/a&gt; copre il bug, ma solamente navigando nei siti in cui l&#39;utente non ha permesso l&#39;esecuzione.&lt;br /&gt;Se venisse compromesso un sito nella &lt;a href=&quot;http://it.wikipedia.org/w/index.php?title=Whitelist&amp;amp;redirect=no&quot;&gt;whitelist &lt;/a&gt;si verrebbe esposti allo sript malevolo.&lt;br /&gt;&lt;br /&gt;Insomma...contiamo che i bravi sviluppatori di Mozilla rilascino a breve una correzione.&lt;br /&gt;&lt;br /&gt;Aggiornamento:&lt;br /&gt;&lt;br /&gt;La patch è stata annunciata per questo Mercoledì&lt;br /&gt;&lt;span class=&quot;body&quot;&gt;&lt;p&gt; Intanto chi non si sentisse sicuro può spegnere il JIT Java come segue&lt;br /&gt;&lt;/p&gt; &lt;ol&gt;&lt;li&gt;Scrivere &lt;code style=&quot;font-style: italic; font-weight: bold;&quot;&gt;about:config&lt;/code&gt; nella barra degli indirizzi di Firefox.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:monospace;&quot;&gt;Scrivere &lt;/span&gt;&lt;code style=&quot;font-weight: bold; font-style: italic;&quot;&gt;jit&lt;/code&gt; nella casella Filtro in cima all&#39;editor.&lt;/li&gt;&lt;li&gt;Doppio-click sulla linea &lt;code style=&quot;font-weight: bold; font-style: italic;&quot;&gt;javascript.options.jit.content&lt;/code&gt; per settare il valore su &lt;span style=&quot;font-weight: bold;&quot;&gt;False&lt;/span&gt;.&lt;/li&gt;&lt;/ol&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/mozilla-firefox-351-scoperta-una-nuova.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/3224921013147673539'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/3224921013147673539'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/mozilla-firefox-351-scoperta-una-nuova.html' title='Mozilla Firefox 3.5.1: Scoperta una nuova Vulnerabilità.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJxspdTzFC-F_O6q_jbIpOrqofmXtiHtL8ExQX_hA7p_yWBQnyMmYp2hfX25C6sdKnOmeM7a5AjQmJX9BMJKIpPxXS-9P2MqtCBiSLI03eMF9cJlbxMm3hzZmL74T7MvLGJxLcSNleohQ/s72-c/bugFirefox351.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-4970591074562722995</id><published>2009-07-15T23:05:00.000-07:00</published><updated>2009-08-03T03:11:37.043-07:00</updated><title type='text'>Come aumentare la velocità di navigazione e la sicurezza con OpenDNS</title><content type='html'>Ho scoperto questo strumento su consiglio di un collega un giorno in cui il server dns di Telecom era sovraccarico di connessioni e rendeva la navigazione di una lentezza inaffrontabile.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.opendns.com/&quot;&gt;OpenDNS&lt;/a&gt;, come avrete capito, è un&#39;ottima alternativa al DNS server che vi fornisce il vostro ISP(Alice,Infostrada,Vodafone ecc).&lt;br /&gt;Rispondendo in maniera ottimizzata alle chiamate&lt;span style=&quot;font-weight: bold;&quot;&gt; velocizza la navigazione&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Ma a renderlo uno strumento speciale sono le &lt;a href=&quot;http://www.opendns.com/features/overview/&quot;&gt;tante altre funzioni&lt;/a&gt; che rende disponibili&lt;br /&gt;&lt;br /&gt;Impostare il tutto è semplicissimo.&lt;br /&gt;&lt;br /&gt;Basta...&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:180%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt;&lt;span style=&quot;font-weight: bold;font-size:180%;&quot; &gt;1&lt;/span&gt;  andare sul sito&lt;/span&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.opendns.com/&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 260px; height: 109px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9djACLE_ypYWQg8AennW9n2yqMzsVX8-x68GPwapzfz800RH2K5fjScZW5idzrcqKzHv9J0LKexBMspI_zi6RNMI-ZL0CfXetHumCVP82WvhIxe0wqr8djnSIJba601QEIy9c0SbuLqo/s400/opendns-logo1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359311620673790162&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;span style=&quot;font-weight: bold;font-size:180%;&quot; &gt;2&lt;/span&gt; Cliccare il pulsante di start.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.opendns.com/start/&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 219px; height: 36px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheVHQAksRRvsxNWoXJeKBlYfeX5ZPqVhrSLO8J1OA7gUU7Gm7VU6xbkghc0iqoePBPeMh60kS7jxg4JLwji-iHN8HGAmYZrpBf6qJbDHy43_p5eXFJ7RjWPUYjVMwraJbucjs1Sty1af4/s400/start.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359320333213607938&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;span style=&quot;font-weight: bold;font-size:180%;&quot; &gt;3&lt;/span&gt; Scegliere il proprio supporto&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6X7Adi7iqqntuBgzF9qNXwBC9rhpGVSXTygM1_l0DZZeHtPCCg1gxapUA0KMnlmL1uPckUztECZ7ec5XGu-JebIV2Z4UpZ9QN_qn86BMsDi3fkmo-PAj89_Vfag4a-iMfwDKt9as-q94/s1600-h/supporto.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 95px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6X7Adi7iqqntuBgzF9qNXwBC9rhpGVSXTygM1_l0DZZeHtPCCg1gxapUA0KMnlmL1uPckUztECZ7ec5XGu-JebIV2Z4UpZ9QN_qn86BMsDi3fkmo-PAj89_Vfag4a-iMfwDKt9as-q94/s400/supporto.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359321137546998514&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;4&lt;/span&gt;&lt;/span&gt; A questo punto...&lt;br /&gt;&lt;br /&gt;...chi ha scelto Computer dovrà selezionare il sistema operativo...&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://www.opendns.com/start/computer/&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 184px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKpRUeeivMq2npicUFXIg2Hw1O-tjisowevR73OWV6cBXurs8kKWlCf7iuwDCTCosZaLrcY_MWyCI_6i6bvzJKPJ8R-hKsEPW-8QxzzRZV3jDgNiVdXi82iKS-dnwe-kykA9EXNT8Eo_Q/s400/computer.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359322606537428370&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span&gt;...chi ha scelto Router dovrà selezionare il modello...&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://www.opendns.com/start/router/&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 148px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOS-XRRbke-NzYfqSa4Nb_t4z7poN1mTfX1_qEzTn3YijCrt6lYwRt5EXikcM_2ch_OW3dMOZW2JllCQnoytSWRRj4wROVN5U-N5tLpJunv4AemZbPmUFLm7g7N_r-HlB9Oi7_Ghsl77M/s400/router.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359322906068270530&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;...per ottenere una spiegazione dettagliata e ricca di immagini su come impostare gli IP di OpenDNS.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;5&lt;/span&gt;&lt;/span&gt; Passare alla creazione del proprio account tramite il pulsante&lt;/span&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh89if0BlYP1nju67VOg5_uU_-97mQGtjzrJSKSyRK2Rc3bNeHPuZ3Gd8OT8YxqiY9Dait7T_5ii9PsbLeVOsTnf89DTikkUvg9HBBFdxq6vZr_LkZI2OVJJw6EvujeJEnIJwMffYSJq38/s1600-h/step2.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 200px; height: 37px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh89if0BlYP1nju67VOg5_uU_-97mQGtjzrJSKSyRK2Rc3bNeHPuZ3Gd8OT8YxqiY9Dait7T_5ii9PsbLeVOsTnf89DTikkUvg9HBBFdxq6vZr_LkZI2OVJJw6EvujeJEnIJwMffYSJq38/s400/step2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359327310642971602&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsrBmebCaG7vwHepLvw53u1Idyyh5zieGmfMQ9ezNr6TUZaf6Eljw64FfLTsNnfIJtt597b_u6wAjgKSm8K0br960PCIhL9RlKHZ6j5vhwWmgV45Ye-bjsSYoyZRGCGvJMDHjBmCbbwpM/s1600-h/account.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 184px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsrBmebCaG7vwHepLvw53u1Idyyh5zieGmfMQ9ezNr6TUZaf6Eljw64FfLTsNnfIJtt597b_u6wAjgKSm8K0br960PCIhL9RlKHZ6j5vhwWmgV45Ye-bjsSYoyZRGCGvJMDHjBmCbbwpM/s400/account.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359338197908254002&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;span style=&quot;font-weight: bold;font-size:180%;&quot; &gt;6&lt;/span&gt; Finalmente potrete fare Login e trovarvi sulla dashboard&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiokWzKyhk18R_Vapc2EwHnhsNd7PwBAmKZO-B2Sv_9Ov4KOEY3kQIyVqdR7ZpMXxkANTKu-GZa1jB6fFogv4_qH4ZFCH_cpzcyM378K4Lix448HE4xKbpRlsXV-7pzQMRgFyf4_xApzKQ/s1600-h/dashboard.png&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 386px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiokWzKyhk18R_Vapc2EwHnhsNd7PwBAmKZO-B2Sv_9Ov4KOEY3kQIyVqdR7ZpMXxkANTKu-GZa1jB6fFogv4_qH4ZFCH_cpzcyM378K4Lix448HE4xKbpRlsXV-7pzQMRgFyf4_xApzKQ/s400/dashboard.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359338925600067586&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;Ora si apre un mondo di possibilità.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Potete creare i vostri shortcut per accedere ai siti preferiti tramite una parola da voi decisa&lt;br /&gt;Ad esempio potrete raggiungere  la vostra casella di posta digitando semplicemente &lt;span style=&quot;font-weight: bold;&quot;&gt;mail&lt;/span&gt; sulla barra degli indirizzi.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-YmssjENIMK1A4KsO8hOsoIfIp-qFNLWOnFyl7iZKAEex6x2qzzNhFb-7-ED2NTaO0l-i3ciHSX5t4bah6xtMqrZpbwEpRd01lUQ9syk6jRX3zbMb6Uzv6Sa-2CnR63tvr_DGO-90r6o/s1600-h/shortcut.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 145px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-YmssjENIMK1A4KsO8hOsoIfIp-qFNLWOnFyl7iZKAEex6x2qzzNhFb-7-ED2NTaO0l-i3ciHSX5t4bah6xtMqrZpbwEpRd01lUQ9syk6jRX3zbMb6Uzv6Sa-2CnR63tvr_DGO-90r6o/s400/shortcut.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359342453115207922&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Questa funzionalità è già presente in molti browser....il vero vantaggio sta nel fatto che i vostri shortcuts saranno immediatamente disponibili &lt;span style=&quot;font-weight: bold;&quot;&gt;per tutti i browsers di tutti i pc della vostra rete&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Potrete gestire la vostra &lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;sicurezza personale&lt;/span&gt; in fase di navigazione&lt;br /&gt;Filtrare i contenuti per &lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;proteggere i vostri figli&lt;/span&gt; dalle schifezze che si annidano nella rete.&lt;br /&gt;&lt;a href=&quot;http://blogs.howtogeek.com/mysticgeek/2008/08/07/protect-your-kids-online-with-any-os-using-open-dns/&quot;&gt;&lt;br /&gt;Ecco una guida specifica per farlo(in inglese)&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;E ancora gestire più reti, controllare le statistiche....&lt;br /&gt;&lt;br /&gt;Insomma uno strumento &lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;veramente valido&lt;/span&gt;&lt;/span&gt; e, inoltre,  &lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;completamente gratuito&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/come-aumentare-la-velocita-di.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/4970591074562722995'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/4970591074562722995'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/come-aumentare-la-velocita-di.html' title='Come aumentare la velocità di navigazione e la sicurezza con OpenDNS'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9djACLE_ypYWQg8AennW9n2yqMzsVX8-x68GPwapzfz800RH2K5fjScZW5idzrcqKzHv9J0LKexBMspI_zi6RNMI-ZL0CfXetHumCVP82WvhIxe0wqr8djnSIJba601QEIy9c0SbuLqo/s72-c/opendns-logo1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-8566128769299323670</id><published>2009-07-06T23:36:00.000-07:00</published><updated>2009-08-03T03:12:58.191-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="defence"/><title type='text'>Windows 7: Come assicurarsi di possedere una copia non contraffatta (e potenzialemnte infetta)</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ1bwehIGWugWVtXQ-lLQwA19fuYrRNWlYc98NTP_DAhizhAglLu9VGYxyB0Zb9I0F12cwon7G9hoHjeeSPwLiHmdWwvQ9SYvU0LneFzlb8jRwLbcInhYroDxBFDmHLTKlJolviGCklcY/s1600-h/windows-taskbar.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 195px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ1bwehIGWugWVtXQ-lLQwA19fuYrRNWlYc98NTP_DAhizhAglLu9VGYxyB0Zb9I0F12cwon7G9hoHjeeSPwLiHmdWwvQ9SYvU0LneFzlb8jRwLbcInhYroDxBFDmHLTKlJolviGCklcY/s400/windows-taskbar.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5355659890794091874&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Alla fine del mese verrà rilasciata la &lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;versione finale RTM di Windows 7&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Appassionati e curiosi saranno con la mano sul mouse pronti a scaricare l&#39;ultimo sistema operativo...&lt;br /&gt;&lt;br /&gt;...e malintenzionati saranno già pronti con versioni &quot;personalizzate&quot; da distribuire in contemporanea tramite siti farlocchi e file sharing.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(204, 0, 0);&quot;&gt;Come fare allora a controllare di possedere il file ISO originale ?&lt;/span&gt;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Ci ha pensato lo sviluppatore Long Zheng creando la seguente applicazione ad hoc:&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.istartedsomething.com/win7isoverifier/Windows7IsoVerifier.exe&quot;&gt;&lt;u&gt;Windows 7 ISO Verifier&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;Verifica la fonte originale dell&#39;ISO&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihbh-HV_mqgWVlF3rYYRoAAiRn385c9Y6OXZmxzPpf2zvp91kG0_CNtkC_KoWbjQAhyDMnMOGzxmJPh5GVkZd1nQ3Gr9_EKvHEEr6s6qv58-82MLusySoMTl_mnWdqz3pfJ4Z6Yr77dpE/s1600-h/win7isoverifier.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 185px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihbh-HV_mqgWVlF3rYYRoAAiRn385c9Y6OXZmxzPpf2zvp91kG0_CNtkC_KoWbjQAhyDMnMOGzxmJPh5GVkZd1nQ3Gr9_EKvHEEr6s6qv58-82MLusySoMTl_mnWdqz3pfJ4Z6Yr77dpE/s400/win7isoverifier.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5355660791493343426&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;E&#39; semplicissima da usare&lt;br /&gt;&lt;br /&gt;1 trascinare il file iso sull&#39;exe (oppure lanciare il programma ed aprire l&#39;iso)&lt;br /&gt;2 attendere che la verifica sia terminata.&lt;br /&gt;&lt;br /&gt;Nel caso si tratti di una versione non originale, CESTINATELA !&lt;br /&gt;&lt;br /&gt;Meglio perdere tempo nello scaricarne una nuova...che avere un sistema con &lt;span style=&quot;font-weight: bold; color: rgb(204, 0, 0);&quot;&gt;malware e backdoors integrate&lt;/span&gt;.&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/windows-7-come-assicurarsi-di-possedere.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/8566128769299323670'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/8566128769299323670'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/07/windows-7-come-assicurarsi-di-possedere.html' title='Windows 7: Come assicurarsi di possedere una copia non contraffatta (e potenzialemnte infetta)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ1bwehIGWugWVtXQ-lLQwA19fuYrRNWlYc98NTP_DAhizhAglLu9VGYxyB0Zb9I0F12cwon7G9hoHjeeSPwLiHmdWwvQ9SYvU0LneFzlb8jRwLbcInhYroDxBFDmHLTKlJolviGCklcY/s72-c/windows-taskbar.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-59450007786391582</id><published>2009-06-30T23:36:00.000-07:00</published><updated>2009-08-03T03:15:39.550-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="tools"/><title type='text'>Miglior tool per rimuovere spyware e malware: Spybot Search &amp; Destroy:</title><content type='html'>Molti lo conosceranno fin dalla nascita, altri avranno utilizzato il fratello maggiore Ad-Aware,&lt;br /&gt;altri ancora si sentiranno al sicuro dietro i tools integrati nei propri antivirus.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZDJSwogdFnmO_EQqYalbfgdRy4IyCysUGk5Y1BJ2aTKxNWuw6ebiueuLtU1JX_G34QkZDCaL-R_jRzQyK3gVVSzyA-HJiF4Z7iYJepunsr22p7TCpKX_3VEXSPMfG9Ai6DMheYjqEt2A/s1600-h/spybot.png&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 218px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZDJSwogdFnmO_EQqYalbfgdRy4IyCysUGk5Y1BJ2aTKxNWuw6ebiueuLtU1JX_G34QkZDCaL-R_jRzQyK3gVVSzyA-HJiF4Z7iYJepunsr22p7TCpKX_3VEXSPMfG9Ai6DMheYjqEt2A/s320/spybot.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5353429905826892962&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Resta il fatto che si tratta del tool &lt;span style=&quot;font-weight: bold;&quot;&gt;freeware &lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;più quotato&lt;/span&gt; su questo sito che si occupa di catalogare i malware removers.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.2-spyware.com/review-spybot-search-and-destroy.html&quot;&gt;&lt;U&gt;2Spyware.com&lt;/U&gt;&lt;/a&gt;&lt;br /&gt;best malware removers.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Oltre all&#39;ottima ricerca di malware, &lt;a href=&quot;http://www.safer-networking.org/en/home/index.html&quot;&gt;Spybot Search &amp;amp; Destroy&lt;/a&gt; offre una serie di interessanti funzionalità aggiuntive tra cui:&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;botnet scanning&lt;/span&gt;: impedisce che il proprio computer diventi uno &lt;span style=&quot;font-style: italic;&quot;&gt;zombie &lt;/span&gt;per attacchi coordinati.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;hosts-file modification&lt;/span&gt;: Tiene monitorata la modifica di files di host del sistema impedendo ai malware di contattare la fonte.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;secure file shredder&lt;/span&gt;: cancella definitivamente i files indesiderati (rendendoli irrecuperabili)&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;dummy code feature: &lt;/span&gt;sostituisce gli spyware inseriti in alcuni software sostituendolo con codice inerte, permettendo quindi di continuare ad utilizzarli.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Portable&lt;/span&gt;: Dopo averlo installato è possibile copiare la cartella su di una chiave USB ed eseguire gli scan e la rimozione di malware su qualsiasi PC. Ovviamente non funzioneranno la realtime protection ed altre funzioni che richiedono l&#39;installazione. Ma mi sembra già un buon traguardo...&lt;br /&gt;&lt;br /&gt;Insomma, un ottimo software compatibile con qualsiasi versione di Windows dal 95 in avanti.&lt;br /&gt;&lt;br /&gt;Se vi interessa la gestione della sicurezza privata, non dimenticatevi di questo tool.&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/miglior-tool-per-rimuovere-spyware-e.html#comment-form' title='1 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/59450007786391582'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/59450007786391582'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/miglior-tool-per-rimuovere-spyware-e.html' title='Miglior tool per rimuovere spyware e malware: Spybot Search &amp; Destroy:'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZDJSwogdFnmO_EQqYalbfgdRy4IyCysUGk5Y1BJ2aTKxNWuw6ebiueuLtU1JX_G34QkZDCaL-R_jRzQyK3gVVSzyA-HJiF4Z7iYJepunsr22p7TCpKX_3VEXSPMfG9Ai6DMheYjqEt2A/s72-c/spybot.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-1573927196718516681</id><published>2009-06-25T12:02:00.001-07:00</published><updated>2009-08-03T03:16:53.849-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="defence"/><category scheme="http://www.blogger.com/atom/ns#" term="telefonia"/><title type='text'>Di chi è questo numero di telefono?</title><content type='html'>A quanti di voi è capitato di essere chiamati da strani numeri di telefono?&lt;br /&gt;Magari con voci sensuali e persuasive che proponevano prestiti e mutui, assicurazioni, vendita di prodotti, servizi di telefonia ecc.&lt;br /&gt;&lt;br /&gt;Immagino che alcuni abbiano ceduto alle tentazioni delle offerte commerciali...e, purtroppo , abbiano subito una truffa.&lt;br /&gt;&lt;br /&gt;Ebbene ecco qualche sito che offre un&#39;opportunità di scoprire PRIMA di chi sia quel numero e se dall&#39;altra parte del cavo ci siano ditte poco serie, o peggio scammers e truffatori vari.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://whocallsme.com/&quot;&gt;&lt;u&gt;  Who Calls Me&lt;/u&gt;&lt;/a&gt;&lt;br /&gt; Ricerca numeri di telefono&lt;br /&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://800notes.com/Default.aspx&quot;&gt;&lt;u&gt;  800 Notes&lt;/u&gt;&lt;/a&gt;&lt;br /&gt; Di chi è questo numero di telefono&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Il primo contiene già diversi numeri europei (e italiani).&lt;br /&gt;&lt;br /&gt;Ottimi servizi per la gestione della sicurezza privata. Essenziali quando anche l&#39;onnipotente google non riesce a fornirci abbastanza informazioni.&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/di-chi-e-questo-numero-di-telefono.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/1573927196718516681'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/1573927196718516681'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/di-chi-e-questo-numero-di-telefono.html' title='Di chi è questo numero di telefono?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-4097683896337470169</id><published>2009-06-23T05:31:00.000-07:00</published><updated>2009-08-03T03:26:23.825-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="defence"/><title type='text'>Classifica Antivirus</title><content type='html'>Ecco un test effettuato circa un mese fa sui &lt;span style=&quot;font-weight: bold;&quot;&gt;prodotti per la sicurezza informatica&lt;/span&gt;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Sono stati presi in&lt;span style=&quot;font-weight: bold;&quot;&gt; &lt;/span&gt;esame dall’&lt;strong&gt;MTC&lt;/strong&gt; e sottoposti a test relativi alla rilevazione di 1616 &lt;strong&gt;malware&lt;/strong&gt; (in versione binaria).&lt;br /&gt;Ecco i risultati nella seguente tabella, con nome del prodotto, posizione in classifica, percentuale di minacce rilevate  e numero di minacce non rilevate riferite ai 1616 suddetti malware.&lt;br /&gt;&lt;table border=&quot;1&quot; cellpadding=&quot;0&quot;&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;&lt;strong&gt;Posizione&lt;/strong&gt;&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;&lt;strong&gt;Prodotto&lt;/strong&gt;&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;&lt;strong&gt;Minacce Rilevate&lt;/strong&gt;&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;&lt;strong&gt;Minacce Mancate&lt;/strong&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;1&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Sophos&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;90%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;148&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;2&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;AntiVir&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;90%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;162&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;3&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Microsoft&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;89%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;174&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;4&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;AVG&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;89%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;177&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;5&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;TrendMicro&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;89%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;177&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;6&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Ikarus&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;88%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;189&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;7&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;BitDefender&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;87%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;200&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;8&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Norman&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;86%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;216&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;9&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;F-Prot&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;85%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;235&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;10&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;F-Secure&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;85%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;235&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;11&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Kaspersky&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;85%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;241&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;12&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Auentium&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;84%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;248&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;13&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Avast&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;83%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;260&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;14&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;GData&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;83%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;267&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;15&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;ClamAV&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;82%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;277&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;16&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Symantec&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;82%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;287&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;17&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;DrWeb&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;80%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;319&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;18&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;eTrust-Vet&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;80%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;322&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;19&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;AhnLab-V3&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;79%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;330&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;20&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Rising&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;79%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;331&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;21&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;CAT-QuickHeal&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;78%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;349&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;22&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;VBA32&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;78%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;354&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;23&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Fortinet&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;76%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;383&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;24&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;McAfee&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;75%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;395&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;25&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;VirusBuster&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;74%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;413&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;26&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Panda&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;73%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;427&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;27&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;eHacker&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;70%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;480&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;28&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Ewido&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;55%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;721&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;29&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Prevx1&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;12%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;1413&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;30&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;Webwasher-Gateway&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;12%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;1420&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td width=&quot;66&quot;&gt;31&lt;/td&gt; &lt;td width=&quot;149&quot;&gt;NOD32v2&lt;/td&gt; &lt;td width=&quot;131&quot;&gt;9%&lt;/td&gt; &lt;td width=&quot;129&quot;&gt;1464&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt;  &lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;Il mitico &lt;span style=&quot;font-weight: bold;&quot;&gt;Antivir&lt;/span&gt;, che è &lt;span style=&quot;font-weight: bold;&quot;&gt;gratuito,&lt;/span&gt; si trova al &lt;span style=&quot;font-weight: bold;&quot;&gt;secondo posto&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Il tanto osannato &lt;span style=&quot;font-weight: bold;&quot;&gt;NOD32 in coda&lt;/span&gt;....&lt;br /&gt;&lt;br /&gt;I dati elencati provengono dal seguente sito&lt;strong&gt;:&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; target=&quot;_blank&quot; href=&quot;http://mtc.sri.com/about_mtc/&quot;&gt;&lt;u&gt;Malware Threat Center&lt;/u&gt;&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;Contiene dati provenienti da Cyber-TA Honeynet Project&lt;br /&gt;www.cyber-ta.org/Honeynet&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A voi la scelta&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/classifica-antivirus.html#comment-form' title='4 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/4097683896337470169'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/4097683896337470169'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/classifica-antivirus.html' title='Classifica Antivirus'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-605703134717499469</id><published>2009-06-22T06:36:00.000-07:00</published><updated>2009-08-03T03:26:57.590-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>Google: ricerche infettate</title><content type='html'>&lt;span class=&quot;bb_i&quot;&gt;Nei giorni scorsi il nostro affezionato motore di ricerca  Google è stato vittima di numerosi attacchi.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class=&quot;maintxt&quot;&gt;L&#39;ignaro utente, dopo aver inserito i dati della propria ricerca viene reindirizzato su link  manipolati che puntanto ai più svariati malware camuffati sotto forma di codec video,antivirus, cleaners ecc...&lt;br /&gt;&lt;br /&gt;Secondo le stime sembra l&#39;attacco sia partito dall&#39;India...sempre che non si tratti di un BOT(server infettato sotto il controllo dell&#39;attaccante) e che quindi il pirata non risulti rintracciabile.&lt;br /&gt;&lt;br /&gt;Come difendersi?&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Utenti comuni&lt;/span&gt;:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt; Mantenere  aggiornato il proprio antivirus e il sistema operativo.&lt;/li&gt;&lt;li&gt;Utilizzare un antivirus che controlli anche il web.&lt;/li&gt;&lt;li&gt;Disattivare JavaScript nel browser(o utilizzare l&#39;Add-On&lt;span style=&quot;font-weight: bold;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;No-Script&lt;/span&gt; per Firefox)&lt;/li&gt;&lt;li&gt;Non  navigare con i diritti di amministratore.&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Utente medio&lt;/span&gt;:&lt;br /&gt;&lt;br /&gt;Potrebbe utilizzare softwares che creano un ambiente applicativo protetto Come ad esempio &lt;a href=&quot;http://www.sandboxie.com/&quot;&gt;Sandboxie&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Samnettone patentato ;)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Creare una macchina virtuale il cui VirtualHD si resetta al termine di ogni navigazione.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/google-ricerche-infettate.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/605703134717499469'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/605703134717499469'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/google-ricerche-infettate.html' title='Google: ricerche infettate'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-1797065976527118720</id><published>2009-06-22T02:50:00.000-07:00</published><updated>2009-08-03T03:29:17.540-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="iPhone"/><category scheme="http://www.blogger.com/atom/ns#" term="portafoglio"/><category scheme="http://www.blogger.com/atom/ns#" term="telefonia"/><title type='text'>Nuovo iPhone 3G S con Tim e Vodafone: QUANTO MI COSTI !</title><content type='html'>Direte ma questo blog non tratta di sicurezza,hacking ecc..?&lt;br /&gt;Si,&lt;br /&gt;Ma qui si parla di &lt;span style=&quot;font-weight: bold;&quot;&gt;sicurezza del portafogli&lt;/span&gt; contro il ladrocinio legalizzato.&lt;br /&gt;&lt;br /&gt;Aspettavate un bell&#39;iPhone 3G S a prezzi ragionevoli?&lt;br /&gt;Magari con &lt;span class=&quot;fullpost&quot;&gt;una connessione prepagata wireless&lt;/span&gt; interessante?&lt;br /&gt;Ecco i &lt;span style=&quot;font-weight: bold;&quot;&gt;soliti noti&lt;/span&gt; operatori di telefonia mobile &lt;span style=&quot;font-style: italic;&quot;&gt;far sfumare&lt;/span&gt; ogni speranza.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;TIM:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Negli Stati Uniti l&#39;operatore AT&amp;amp; T ha preferito abbassare il prezzo del vecchio 3G per proporre a quella cifra il nuovo 3G S.&lt;br /&gt;Il &lt;span style=&quot;font-style: italic;&quot;&gt;nostro caro operatore&lt;/span&gt; , invece, ha deciso di mantenere invariato il prezzo del vecchio 3G e &lt;span style=&quot;font-weight: bold;&quot;&gt;sparare tariffe da capogiro per il nuovo iPhone 3G S&lt;/span&gt;  &lt;p&gt;Sul &lt;a href=&quot;http://www.tim.it/consumer/c365/i70113/t89768/livello3libera.do?zanpid=1251962358910401538&quot;&gt;sito della TIM&lt;/a&gt; sono presenti i prezzi delle due scelte possibili (ricaricabile/abbonamento).&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Piano tariffario &lt;/span&gt;&lt;strong&gt;ricaricabile&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;iPhone 3G S da 16GB--&gt; &lt;strong&gt;619 Euro&lt;/strong&gt;  &lt;/li&gt;&lt;li&gt;iPhone 3G S da 32GB--&gt; &lt;strong&gt;719 Euro&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&lt;/strong&gt;vecchio iPhone 3G da &lt;strong&gt;8GB&lt;/strong&gt; --&gt; rimane a &lt;span style=&quot;font-weight: bold;&quot;&gt;499 Euro&lt;/span&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Inoltre propone l&#39;offerta &lt;a class=&quot;external&quot; href=&quot;http://www.tim.it/consumer/c357/i56249/o69804/tariffa.do&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;Maxxi iPhone 10&lt;/strong&gt;&lt;/a&gt;, che permette un traffico web di&lt;strong&gt; 50MB&lt;/strong&gt; &lt;strong&gt;giornalieri a&lt;/strong&gt;  &lt;strong&gt;10 Euro al mese&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;. Se finite questi 50 potrete avere altri 30 Mb &lt;span style=&quot;font-weight: bold;&quot;&gt;da consumarsi nella stessa giornata&lt;/span&gt; (ma che c...!),  con la carta servizi &lt;a class=&quot;external&quot; href=&quot;http://www.tim.it/consumer/o72024/tariffa.do&quot; target=&quot;_blank&quot;&gt;iPhone  Daily&lt;/a&gt; al costo di 1 Euro...esauriti anche questi, &lt;strong&gt;si comincerà a pagare 0,60 Euro al kilobyte&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Abbonamento&lt;/span&gt;, 2 possibilità: &lt;/p&gt; &lt;ul&gt;&lt;li&gt;iPhone 3G S da 16GB: &lt;span style=&quot;font-weight: bold;&quot;&gt;69 Euro&lt;/span&gt;...&lt;span style=&quot;font-weight: bold;&quot;&gt;MA&lt;/span&gt; è obbligatorio sottoscrivere il piano &lt;strong&gt;&lt;a class=&quot;external&quot; href=&quot;http://www.tim.it/consumer/c364/i29683/o69808/tariffa.do&quot; target=&quot;_blank&quot;&gt;Tutto compreso 2.0 per iPhone &lt;/a&gt;&lt;/strong&gt;versione  &lt;strong&gt;Unlimited&lt;/strong&gt;, che prevede un &lt;strong&gt;traffico  dati&lt;/strong&gt;&lt;strong&gt; illimitato&lt;/strong&gt; e 5.000 minuti di chiamate a  &lt;strong&gt;180 Euro al mese&lt;/strong&gt;(in un anno hai fatto fuori &lt;span style=&quot;font-weight: bold;&quot;&gt;2 stipendi&lt;/span&gt; ! però hai pagato l&#39;iPhone nuovo solo 69 Euro...bazza)&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;iPhone 3G S da 16GB: &lt;span style=&quot;font-weight: bold;&quot;&gt;prezzo variabile&lt;/span&gt; che scende man mano che si sceglie un abbonamento più  costoso. &lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;VODAFONE:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Piano tariffario ricaricabile&lt;/span&gt;&lt;br /&gt;identici a TIM&lt;br /&gt;&lt;br /&gt;Insieme viene l&#39;offerta &lt;a href=&quot;http://www.areaprivati.vodafone.it/190/trilogy/jsp/programView.do?contentKey=37334&amp;amp;pageTypeId=9607&amp;amp;channelId=-8665&amp;amp;programId=10066&amp;amp;ty_skip_md=true&amp;amp;ty_key=fdt_pri_iPromoIPhone_Vodafone_Pack_per_iPhone&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&lt;a class=&quot;external&quot; target=&quot;_blank&quot;&gt;Mobile Internet&lt;/a&gt; &lt;/strong&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;versione ricaricabile&lt;/span&gt; : &lt;strong&gt;500MB di traffico dati a&lt;/strong&gt; &lt;strong&gt;3 Euro &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;a &lt;/span&gt;&lt;span style=&quot;font-style: italic; color: rgb(255, 0, 0);&quot;&gt; settimana&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&lt;span style=&quot;font-style: italic; color: rgb(255, 0, 0);&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;versione abbonamento : &lt;/span&gt;&lt;strong&gt;2 GB di traffico dati a &lt;/strong&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;10&lt;/span&gt;&lt;strong&gt; Euro &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;al&lt;/span&gt; &lt;span style=&quot;font-style: italic; color: rgb(255, 0, 0);&quot;&gt;mese &lt;/span&gt;&lt;/strong&gt;.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Abbonamento:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Come per Tim i prezzi dell&#39; iPhone 3G S cambiano a seconda del tipo di abbonamento scelto.&lt;br /&gt;&lt;br /&gt;Piano &lt;strong&gt;Più Facile iPhone&lt;/strong&gt; in versione &lt;span style=&quot;font-style: italic;&quot;&gt;Medium&lt;/span&gt;, &lt;span style=&quot;font-style: italic;&quot;&gt;Large&lt;/span&gt;, &lt;span style=&quot;font-style: italic;&quot;&gt;Extrlarge&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Medium&lt;br /&gt;     &lt;/span&gt;&lt;br /&gt; Telefonate : &lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;500 minuti di  conversazione a 50 Euro al mese&lt;/strong&gt;&lt;br /&gt; Dati: tariffa Mobile Interet(vedi sopra) versione &lt;span style=&quot;font-style: italic;&quot;&gt;ricaricabile &lt;/span&gt;o &lt;span style=&quot;font-style: italic;&quot;&gt;abbonamento&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;iPhone 3G 8GB : &lt;strong&gt;199 Euro&lt;/strong&gt;  &lt;/li&gt;&lt;li&gt;iPhone 3G S da 16GB &lt;span style=&quot;font-weight: bold;&quot;&gt;: &lt;/span&gt;&lt;strong&gt;269 Euro&lt;/strong&gt;  &lt;/li&gt;&lt;li&gt;iPhone 3G S da 32GB &lt;span style=&quot;font-weight: bold;&quot;&gt;: &lt;/span&gt;&lt;strong&gt;329 Euro&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Large&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;        &lt;/span&gt;&lt;br /&gt;&lt;br /&gt; Telefonate : &lt;span style=&quot;font-weight: bold;&quot;&gt;1200 &lt;/span&gt;&lt;strong&gt;minuti di  conversazione a 100 Euro al mese&lt;/strong&gt;&lt;br /&gt; Dati: tariffa Mobile Interet &lt;span style=&quot;font-weight: bold;&quot;&gt;solo&lt;/span&gt; &lt;span style=&quot;font-style: italic;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;abbonamento &lt;/span&gt;(a caso...)&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;iPhone 3G 8GB &lt;span style=&quot;font-weight: bold;&quot;&gt;: &lt;/span&gt;&lt;strong&gt;99 Euro&lt;/strong&gt;  &lt;/li&gt;&lt;li&gt;iPhone 3G S da 16GB &lt;span style=&quot;font-weight: bold;&quot;&gt;: &lt;/span&gt;&lt;strong&gt;169 Euro&lt;/strong&gt;  &lt;/li&gt;&lt;li&gt;iPhone 3G S da 32GB &lt;span style=&quot;font-weight: bold;&quot;&gt;: &lt;/span&gt;&lt;strong&gt;229 Euro&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Extralarge&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;    Telefonate : &lt;span style=&quot;font-weight: bold;&quot;&gt;1200 &lt;/span&gt;&lt;strong&gt;minuti di  conversazione a 100 Euro al mese&lt;/strong&gt;&lt;br /&gt; Dati: tariffa Mobile Interet &lt;span style=&quot;font-weight: bold;&quot;&gt;solo&lt;/span&gt; &lt;span style=&quot;font-style: italic;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;abbonamento &lt;/span&gt;(bha...)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;iPhone 3G 8GB : &lt;span style=&quot;font-weight: bold;&quot;&gt;gratis&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;iPhone 3G S da 16GB &lt;span style=&quot;font-weight: bold;&quot;&gt;: &lt;/span&gt;&lt;strong&gt;69 Euro&lt;/strong&gt;  &lt;/li&gt;&lt;li&gt;iPhone 3G S da 32GB &lt;span style=&quot;font-weight: bold;&quot;&gt;: &lt;/span&gt;&lt;strong&gt;129 Euro&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;SITO UFFICIALE APPLE&lt;/span&gt; :&lt;br /&gt;&lt;br /&gt;E qui mi viene da ridere...&lt;br /&gt;&lt;br /&gt;Ecco i prezzo per i telefoni &lt;span style=&quot;font-weight: bold;&quot;&gt;SBLOCCATI &lt;/span&gt;:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;iPhone 3G 8GB : &lt;span style=&quot;font-weight: bold;&quot;&gt;499 &lt;/span&gt;&lt;strong&gt;Euro&lt;/strong&gt;  &lt;/li&gt;&lt;li&gt;iPhone 3G S da 16GB &lt;span style=&quot;font-weight: bold;&quot;&gt;: &lt;/span&gt;&lt;strong&gt;599 Euro&lt;/strong&gt;  &lt;/li&gt;&lt;li&gt;iPhone 3G S da 32GB &lt;span style=&quot;font-weight: bold;&quot;&gt;: &lt;/span&gt;&lt;strong&gt;699 Euro&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;?!?!?!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Costano di meno&lt;/span&gt; rispetto a quelli legati ai piani tariffari !!!&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Attendiamo con ansia l&#39;esordio di &lt;span style=&quot;font-weight: bold;&quot;&gt;Tre nei prossimi giorni...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/nuovo-iphone-3g-s-con-tim-e-vodafone.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/1797065976527118720'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/1797065976527118720'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/nuovo-iphone-3g-s-con-tim-e-vodafone.html' title='Nuovo iPhone 3G S con Tim e Vodafone: QUANTO MI COSTI !'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-2722807354004523319</id><published>2009-06-22T01:58:00.000-07:00</published><updated>2009-06-24T05:01:21.126-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="phishing"/><title type='text'>Facebook Phishing: altri problemi di sicurezza per il social network</title><content type='html'>Dopo l&#39;applicazione Findme segnalata giorni fa nell&#39;articolo &lt;a href=&quot;http://pcinsecurity.blogspot.com/2009/06/facebook-visualizzare-le-foto-senza.html&quot;&gt;&quot;Facebook: Visualizzare le foto senza essere amici&lt;/a&gt;&quot; e un attacco di phishing con spamming, ecco un nuovo alert per gli iscritti al social network.&lt;br /&gt;&lt;br /&gt;Utilizzando le persone già cadute nella trappola, i malintenzionati &lt;span style=&quot;font-style: italic;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;inviano mail&lt;/span&gt; &lt;/span&gt;o &lt;span style=&quot;font-style: italic;&quot;&gt;postano nelle bacheche&lt;/span&gt; un link spacciato come &quot;interessante&quot; o &quot;da non perdere&quot;.&lt;br /&gt;&lt;br /&gt;Seguendo quel link ci si trova in una pagina di login identica a quella di Facebook.&lt;br /&gt;&lt;br /&gt;I due siti in questione sono:&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;fbstarter.com &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;fbaction.net&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;... ma non è escluso che ne nascano tanti altri!!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Ovviamente chi effettua il login sulle pagine in questione &lt;span style=&quot;font-weight: bold;&quot;&gt;invierà la propria password ai malintenzionati&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Come difendersi?&lt;br /&gt;Con l&#39;attenzione all&#39;indirizzo.&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Ogni volta che viene richiesto un login controllate di trovarvi nella pagina giusta. Es: se siete su Facebook la pagina di login deve trovarsi nello stesso dominio (facebook.com).&lt;/li&gt;&lt;li&gt;Attenzione comunque alle padine che imitano il dominio togliendo o modificando lettere al nome oridinale. Es: Facebook.com potrebbe diventare Facebok.com,Face-Book.com,Facebooh.com ecc...&lt;/li&gt;&lt;/ul&gt;Occhi aperti quindi ! la prima arma è la gestione della sicurezza privata.</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/facebook-phishing-altri-problemi-di.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/2722807354004523319'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/2722807354004523319'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/facebook-phishing-altri-problemi-di.html' title='Facebook Phishing: altri problemi di sicurezza per il social network'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6759023183465774680.post-1055460211270583466</id><published>2009-06-18T04:51:00.000-07:00</published><updated>2009-08-03T03:23:22.981-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="add-ons"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="test"/><title type='text'>Exploit Me: un Firefox Add-on per la vigilanza privata</title><content type='html'>Ci siamo già accorti che i servizi di site hosting &lt;em&gt;&lt;/em&gt;non sono necessariamente immuni alle ultime vulnerabilità (...anzi).&lt;br /&gt;&lt;br /&gt;Occorre perciò che noi utenti ci adoperiamo per effettuare &lt;span style=&quot;font-weight: bold;&quot;&gt;testi di sicurezza personali&lt;/span&gt; sui nostri siti.&lt;br /&gt;&lt;br /&gt;Ecco Exploit-Me, una interessante swite di Add-ons per Mozilla Firefox rilasciata &lt;span style=&quot;font-weight: bold;&quot;&gt;gratuitamente &lt;/span&gt;(licenza GPL) dall&#39;azienda Security Compass&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Dalla pagina si possono raggiungere &lt;span style=&quot;font-weight: bold;&quot;&gt;i seguenti add-ons&lt;/span&gt; che la compongono.&lt;br /&gt;&lt;!-- adsense --&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;https://addons.mozilla.org/en-US/firefox/addon/7598&quot;&gt;&lt;span&gt;&lt;u&gt;XSS-Me&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;Effettua i test di vulnerabilità alle principali tipi di attacchi XSS (cross-site scripting) in maniera semplice ed immediata.&lt;br /&gt;https://addons.mozilla.org/en-US/firefox/addon/7598&lt;br /&gt;&lt;br /&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;https://addons.mozilla.org/en-US/firefox/addon/7597&quot;&gt;&lt;span&gt;&lt;u&gt;SQL-InjectMe&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;Effettua test di vulnerabilità alle principali stringhe utilizzate per attacchi SQL-Injection&lt;br /&gt;https://addons.mozilla.org/en-US/firefox/addon/7597&lt;br /&gt;&lt;br /&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;https://addons.mozilla.org/en-US/firefox/addon/7595&quot;&gt;&lt;span&gt;&lt;u&gt;Access Me&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;Testa le pagine web alla ricerca di vulnerabilità alle più diffuse tecniche di attacco in fase di autenticazione.&lt;br /&gt;https://addons.mozilla.org/en-US/firefox/addon/7595&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Ottimi per effettuare numerose analisi rapide.&lt;br /&gt;Per chi cerca tools più approfonditi può dare un occhio ai &lt;a href=&quot;http://www.owasp.org/index.php/Category:OWASP_Project&quot;&gt;progetti OWASP&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Ovviamente lo scopo principale di questi tools è, come ho già detto, la vigilanza privata delle vulnerabilità sui siti personali e in generale da chi cerca modi per &lt;span style=&quot;font-style: italic;&quot;&gt;correggere difetti nella sicurezza&lt;/span&gt;...ma possono essere usati anche da chi cerca invece modi per infastidire la gente(script kiddies).&lt;br /&gt;&lt;br /&gt;Fatene buon uso !&lt;br /&gt;&lt;/span id=&quot;fullpost&quot;&gt;</content><link rel='replies' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/exploit-me-un-firefox-add-on-per-la.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/1055460211270583466'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6759023183465774680/posts/default/1055460211270583466'/><link rel='alternate' type='text/html' href='http://pcinsecurity.blogspot.com/2009/06/exploit-me-un-firefox-add-on-per-la.html' title='Exploit Me: un Firefox Add-on per la vigilanza privata'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>