-
Mar 29, 2019
A small piece from "Instruccion de musica sobre la guitarra española". Gaspar Sanz was a guitarist and organist in the baroque musical period, along with other notable composers such as Bach, Vivaldi and Pachelbel. Sanz wrote several "españoletas" ("old Spanish… read more »
-
Mar 27, 2019
Today let's try to make your own Linux build of Signal Desktop, in .deb and .AppImage format. Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, voice and video calling, and all communications are… read more »
-
Mar 25, 2019
Nokia, what are you doing? Cybersecurity Hacking smart car alarm systems Information security specialists at Pen Test Partners have hijacked a car — using its alarm. What is more, the security systems that the researchers hacked — Pandora and Viper… read more »
-
Mar 22, 2019
"Jesu, Joy of Man's Desiring" is the common English title of a piece derived from the chorale setting of the cantata "Herz und Mund und Tat und Leben", BWV 147, composed by Johann Sebastian Bach in 1723. A transcription by… read more »
-
Mar 20, 2019
Recently, during a forensic analysis on a laptop of an employee charged with corporate espionage, I've carved from disk a suspicious Excel file. Obviously, the file was password protected, and I had to find a way to read it. I… read more »
-
Mar 18, 2019
A bad week for Citrix, Hard Disks used as microphone and some news from Marvel.Enjoy! Cybersecurity Encrypted Messaging Apps Facilitating Cybercrime in Latin America As Spanish- and Portuguese-speaking markets continue to drop off the Deep & Dark Web (DDW), criminals… read more »
-
Mar 15, 2019
Just some thoughts about memory, Forensics and Volatility! Second 'episode' of my "Little Handbook" serie. After the pubblication of "The Little Handbook of Windows Forensics", a lot of readers asked me more information about analysis of volatile memory. In effects,… read more »
-
Mar 13, 2019
Malware analysis and digital forensic analysis are processes that often needs the analyst to look into system memory.In this regard, a good analyst must have at least a base knowledge of Windows Memory Management. In this post I will try… read more »
-
Mar 11, 2019
Last week I had a lot of work, so I fell behind with my usual readings. Here some highlights (less is more, right?) Cybersecurity Windows Exploit Suggester - Next Generation (WES-NG) WES-NG is a tool which based on the output… read more »
-
Mar 8, 2019
Last episode of my brief series about "campanella patterns": today we talking about pentatonic scales! Some months ago i've already talked about pentatonic scales on ukulele: if you need a bit overview on musical theory you can refer to the… read more »
-
Mar 6, 2019
Some months ago I've written a brief post about code injection on Windows using python. Some readers asked me if the code proposed in the post (which calls standard windows API) is portable on other languages. Well, obviously yes! Today… read more »
-
Mar 4, 2019
Last week's news? A lot of Sci-Fi topics, a strange Chrome vulnerability and a totally unnecessary book! Self-promotion The little handbook of Windows Memory Analysis Just some thoughts about memory, Forensics and Volatility! This handbook is dedicated to a deep… read more »
-
Mar 1, 2019
"Pachelbel's Canon" is the common name for the the piece "Canon and Gigue for 3 violins and basso continuo" by the Johann Pachelbel, also referred to as Canon and Gigue in D or Canon in D. The canon was originally… read more »
-
Feb 27, 2019
Mozilla Firefox allows a lot of configurations, the heaven for tweakers! Today i'd like to share my personal configurations, focused on privacy. This settings can be configured from about:config page, but i've also developed a small user.js file that can… read more »
-
Feb 25, 2019
My question is, how many folds a foldable screen will able to endure? Cybersecurity Vulnerability in Facebook login allowed attackers to take-over any account A security issue in Facebook’s login procedure made it possible for attackers to take-over random accounts.… read more »
-
Feb 22, 2019
The most famous ragtime written by Scott Joplin that also appears in a famous movie, "The Sting" which Robert Redford and Paul Newman acted in. The song "The Entertainer" is a 1902 classic piano rag written by Scott Joplin: is… read more »
-
Feb 20, 2019
Last episode of my "Social Media Detox": today we rid of Linkedin! Why should I delete LinkedIn? As in the last post, I borrow this post by Richard Stallman, for topics concerning privacy and ethics: - LinkedIn is trying to… read more »
-
Feb 18, 2019
A really bad week for application containers and secure email providers, and a sad news from Mars. Cybersecurity VFEmail suffers ‘catastrophic’ attack, as hacker wipes email service’s primary and backup data Disaster. There’s no other word for it.Customers of VFEmail,… read more »
-
Feb 15, 2019
A timeless classic! "Greensleeves" is a traditional English folk song, found in several late-16th-century and early-17th-century sources, such as Ballet's MS Lute Book and Het Luitboek van Thysius, as well as various manuscripts preserved in the Seeley Historical Library at… read more »
-
Feb 13, 2019
How attackers can exploit Group Policy Preferences file in order to discover passwords? And how SysAdmins can mitigate this vulnerability? During a penetration test or a security assessment, an important point must be the analysis of AD domain, especially the… read more »