Andrea Fortuna
AboutRss
  • Jan 21, 2019

    My Weekly RoundUp #76

    The subjects of my reads in the last week?Qubits, Collection#1, AS400, Lisp and....Game of Thrones! Sci-Fi HBO revealed Game of Thrones season 8’s premiere date https://www.youtube.com/watch?v=wA38GCX4Tb0 As expected, HBO used Sunday Night’s premiere of the third season of True Detective… read more »
  • Jan 18, 2019

    Family Guy Theme Song, Ukulele cover based on Jake Shimabukuro version

    The theme song of Family Guy was one of the first ukulele arrangement that i've made, and seeing it again making me feel a mix of tenderness and shame. Today i'd like to share a new version of this arrangement,… read more »
  • Jan 16, 2019

    DNS tunneling techniques in cyberattacks

    How DNS tunneling can be used for data exfiltration? And how can be detected? DNS Tunneling is a technique that encodes data of other programs or protocols in DNS queries, including data payloads that can be added to an attacked… read more »
  • Jan 14, 2019

    My Weekly RoundUp #75

    After some months of rest, i've decided to star again publishing of my Weekly RoundUp. Why? That’s simple: i also started a process of Social Media Detox, that involve deactivation of my Social Network accounts. Without them, i don’t have… read more »
  • Jan 11, 2019

    "Remember me", from "Coco": ukulele arrangement

    Remember me, though I have to say goodbyeRemember me, don't let it make you cry "Remember Me" is a song from the 2017 animated Pixar film Coco, written by Robert Lopez and Kristen Anderson-Lopez. My arrangement Really simple in the… read more »
  • Jan 9, 2019

    My Social Media Detox, part 1: Facebook account

    Right after new year's, I've decided to start a process of "social media detox": one of my 2019 goals is to find more time left to read, study and watch movies. Of course social networks are main candidates to get… read more »
  • Jan 7, 2019

    VBSIOC Search: a simple VBS script for IoC search on old Windows systems

    When a security incident occurs on your network, one of the most important steps of the response process is the identification of all assets involved by the attack. Once a subset of filesystem Indicator of Compromise (IoC) has been compiled,… read more »
  • Jan 6, 2019

    "Town of Salem" leak: more than 2 million password hashes are already cracked

    ...and are available to download. Personal details of 7.6 million users of BlankMediaGames game "Town of Salem" has been stolen by an unknown attacker. Town of Salem is a browser-based game that challenges players on their ability to convincingly lie… read more »
  • Jan 3, 2019

    Jazz Standards for Fingerstyle Ukulele

    It's available on Amazon my new book, with ten simple ukulele arrangements of famous jazz standards Ukulele is a great instrument to play jazz songs on: it is always associated with good vibes, that it makes this instrument particularly adaptable… read more »
  • Dec 24, 2018

    Merry Christmas!

    Have you been naughty, or nice? XKCD gave us this little gem: https://xkcd.com/838/ See you back in January, with a lot of new interesting posts! … read more »
  • Dec 21, 2018

    My Christmas present for ukulele fans

    Free download (with tabs) of four famous Christmas Songs It's about to be Christmas, I'm feeling nice and i want to share four free arrangement of famous Christmas carols. https://www.youtube.com/watch?v=vcHem3sdZ6E Jingle Bells "Jingle Bells" is one of the best-known American… read more »
  • Dec 17, 2018

    De-Googling my digital life

    Some time ago I've written a post about my custom linux laptop. The system is configured to run only open source software, and focused on "Avoiding interpreted languages, web-based desktop apps, JavaScript garbage and background programs that can use a… read more »
  • Dec 14, 2018

    Christmas Carols on Ukulele: "El Noi de la Mare"

    El Noi de la Mare is a Catalan folk song, both a lullaby and a Christmas song. The title is Catalan for “The Child of the Mother”, that categorize the song as a Christmas carol. One of the most famous… read more »
  • Dec 10, 2018

    SNDBOX: using Artificial Intelligence for malware analysis

    Cybersecurity researchers Ran Dubin and Ariel Koren have developed a new platform form malware analysis, based on an AI engine. The platform, named SNDBOX, makes the approach of behavior-based malware research more easier and accurate: it is not just capable… read more »
  • Dec 7, 2018

    "Satin Doll", by Duke Ellington and Billy Strayhorn: a solo ukulele arrangement

    “Satin Doll” is a song written by Duke Ellington and Billy Strayhorn in 1953. Duke Ellington wrote the melody, and Strayhorn was responsible for its harmonization. "Satin Doll" was first recorded on April 6, 1953 during Ellington's first session for… read more »
  • Dec 3, 2018

    Android Forensics: imaging android filesystem using ADB and DD

    Let's starting a series of article related to digital forensic focused on mobile devices. In this first post i'd like to share some thoughts about image acquisition on android devices. On android devices we can perform two kind of image… read more »
  • Nov 30, 2018

    "Summertime" by George Gershwin, arranged for Ukulele

    “Summertime” is a tune written by George Gershwin in 1934 for the opera “Porgy and Bess”, published in 1935. This tune is recognized as one of the most covered songs in the history of music, with more than 25,000 covers… read more »
  • Nov 26, 2018

    How to extract HTTPS websites subdomains from Certificate Transparency logs

    ...using a small python script! SSL certificate system suffer of several structural flaws that weaken the reliability and effectiveness of encrypted Internet connections and can compromise critical TLS/SSL mechanisms, such us domain validation, end-to-end encryption, and the chains of trust… read more »
  • Nov 23, 2018

    "All of me", arranged for Ukulele

    A great exercise, in my opinion, is to start improvising on a well known melody or chord sequence, record the session and after transcribe the result on the score. Today i've applied this method on "All Of Me", a famous… read more »
  • Nov 19, 2018

    AutoTimeliner: automatically extract forensic timeline from memory dumps

    Often, during an incident response, may be necessary to analyze a lot of evidences, like disk and memory dumps. In my workflow, one of the first step is the creation of a timeline extracted from the volatile memory dump. For… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician