Andrea Fortuna
AboutRss
  • Jun 20, 2016

    Open Source Ukulele Project

    What happened to the ukulele transcriptions published on the old blog? Some weeks ago I’ve migrated my blog in a Medium’s Pubblication. Some people have written to me asking: “But, what happened to the ukulele transcriptions published on the old blog?”… read more »
  • Jun 20, 2016

    Firefox Security Toolkit — A Tool that Transforms Firefox Browsers into a Penetration Testing Suite

    A simple tool that transforms a Firefox Browsers into a penetration testing suite Firefox Security Toolkit is a bash script that downloads the most important extensions (also downloads Burp Suite certificate and a large user-agent list for User-Agent Switcher), and installs… read more »
  • Jun 17, 2016

    Seriously? US Defense Department runs the Nuclear Arsenal using floppy disks?

    The U.S. Defense Department is still using 8-inch floppy disks in a computer system that coordinates the operational functions of the nation’s nuclear forces. According to a report from the US Governmental Accountabilty Office, major governmental agencies use IT systems that… read more »
  • Jun 16, 2016

    Person of Interest, Season 5, Episode 12: “.exe”

    TheMachine got the driver license? How excite the geeky side of the spectators?Put a scene with which Harold Finch that travels on a Tesla Model S, driven by TheMachine. The Snowden’s Router Another deeply nerd moment: Shaw and Reese recovers, in… read more »
  • Jun 15, 2016

    John Williams: the making of “The Seville Concert”

    In November 1992 John Williams has recorded “The Seville Concert”: let’s take a look to the “making-of” In November 1993, on british TV was airing “The Seville Concert”: in this concert (perhaps more properly a recording session, since no audience… read more »
  • Jun 14, 2016

    Game of Thrones 6x08: “No One”

    The Blackfish dies offscreen? The Hound teaches us that the offscreen deaths are not reliable! Episode highlights The Mountain: rips a man’s head with his bare hands [embed]https://www.youtube.com/watch?v=lx1t8zwVbRU[/embed] The Hound: responds to the brotherhood’s carnage with philosophy. Cersei: was disappointed… read more »
  • Jun 14, 2016

    15 Signs You’re in Love With Running? But also no!

    I’m sure: i’m an unusual runner On my Facebook stream, recently has showed up this link: 15 Signs You’re in Love With Running: Whether it’s the thrill of crossing a finish line, the euphoric feeling you get when you’ve completed a… read more »
  • Jun 13, 2016

    Windows 10 upgrade chronicles: the aggressive push by Microsoft, explained with a comic

    From arstechnica.com: […] Microsoft has become progressively more aggressive. In the early days, this upgrade was found to be downloading the new operating system even before users opted in, and it was then accused of installing automatically. Perfectly explained in… read more »
  • Jun 13, 2016

    Dropbox’s Project Infinite needs kernel access: could be a security problem?

    On the surface, Dropbox’s Project Infinite sounds great, but there are security risks? From Dropbox Tech Blog: Project Infinite is designed to enable you to access all of the content in your Dropbox — no matter how small the hard disk on your… read more »
  • Jun 10, 2016

    Chrome Net-Internals: little known but very useful

    Chrome has a lot of functionality, for both end users and developers. One of this i little known but very usefull: the net-internals application, which is accessible by typing chrome://net-internals into your Chrome browser. What is net-internals? From Chromium Project… read more »
  • Jun 9, 2016

    Another day, another leak: 32 millions Twitter accounts may have being sold on the dark web

    The website LeakedSource has gathered a database of Twitter usernames and passwords that are on sale on the dark web. LeakedSource noted in a blog post that the database contains 32,888,300 accounts: the passwords were stored as plain text and several… read more »
  • Jun 9, 2016

    Need a playlist of music suited to yoga and meditation? Moby has a gift for you!

    “Long ambients1: calm. sleep.” — 11 instrumental tracks, perfect for meditation and yoga sessions Moby, a yoga enthusiast, has shared a playlist designed for yoga and meditation, free downloadable on his website: over the last couple of years i’ve been making really really… read more »
  • Jun 9, 2016

    Start Tor Browser with another instance of Firefox opened

    A short tip to open 2 instances of Firefox (one on ‘clean web’, one on the ‘hidden web’) Sometimes it may become necessary to keep open both Firefox and Tor Browser. And in that case usually appear this message: The solution… read more »
  • Jun 8, 2016

    Java tips: how to fix the “InvalidKeyException: Illegal key size or default parameters” runtime…

    How to remove the key size restriction in Java JDK? Are you developing your beautiful application using the Java Cryptography Extension, and using a key length of more than 128 bits you encounter the following error? Caused by: java.security.InvalidKeyException: Illegal key… read more »
  • Jun 6, 2016

    Game of Thrones season 6, episode 7: Beware The Hound!

    Sandor “The Hound” Clegane, whom we last saw back in season four, was badly injured in a brutal fight with Brienne, and Arya apparently left him to die alone. But Sandor aren’t easy to kill, and reappears in this episode: the… read more »
  • Jun 6, 2016

    peace_of_mind is back: now sell 100 millions VK.com’s account with cleartext passwords!

    Another day, another data breach! peace_of_mind, the same hacker who previously sold data dumps from LinkedIn is now selling more than 100 Million VK.com accounts. VK.com is the Russia’s biggest social networking site, it’s based in St. Petersburg and has at… read more »
  • Jun 5, 2016

    TeamViewer has been hacked? Some suggested readings

    What really happened to TeamViewer? According TeamViewer there is no breach, the only problem is located between the chair and the keyboard. https://imgur.com/eHPpzEL Let’s take a look at what they say the most known blogs about technology and security: [embed]https://www.teamviewer.com/en/company/press/statement-on-service-outage/[/embed]… read more »
  • Jun 4, 2016

    Linux vs. Windows: killing a process

    http://ctp200.com/comic/13 … read more »
  • Jun 3, 2016

    Ransomware: preventions and mitigation

    Some tips to prevent and mitigate ransomware infections How prevent the infection? http://www.humor.ezgeta.com/ Do as often as possible a backup of all the important data and hold it offline and away from the local network when not in use. Avoid… read more »
  • Jun 2, 2016

    Turn your Raspberry Pi into a War Machine with WarBerryPi

    A collection of scanning tools to obtain as much information as possible in a short period of time with being as stealth as possible The WarBerry was built with one goal in mind: to be used in red teaming engagement where… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician