-
Jul 11, 2018
Application whitelisting is the practice of specifying an index of approved software applications that are permitted to be present and active on a computer system. The main goal to protect critical systems from potentially malicious applications. How it works? The… read more »
-
Jul 9, 2018
Which is the best command line text editor? Seriously, i don't know! In my opinion, the best choice depends by the context: undoubtedly EMACS is the most complex and comprehensive, and VIM is the right balance between features and simplicity.… read more »
-
Jul 6, 2018
Recently i have found on YouTube some wonderful recordings of Heitor Villa-Lobos playing his own music. https://www.youtube.com/watch?v=KLbZLmIhggA https://www.youtube.com/watch?v=UZkEYK4WKKg The recordings seems to be extracted from the CD Villa Lobos Plays Villa-lobos, published by Sanctus Records and also available on Spotify:… read more »
-
Jul 4, 2018
Researchers at Kromtech Security Center discovers seventeen malicious Docker containers with embedded cryptominer applications that permitted to cybercriminals to earn $90,000 in 30 days. According to the Kromtech's report, containers are shaping up to be the next target for these… read more »
-
Jul 2, 2018
bash (Bourne Again shell) is the standard GNU shell, a powerful tool for the advanced and professional user. This shell is a so-called superset of the Bourne shell, a set of add-ons and plug-ins. This means that the Bourne Again… read more »
-
Jun 29, 2018
This little piece has an interesting story. Many years ago i played guitar for a brief period in a melodic rock group that tried to propose some original songs. In this period i have written some original instrumental pieces but,… read more »
-
Jun 27, 2018
Some days ago, with a colleague, i've talked about the real usefulness of USB hardware locks on critical clients/servers. USB Locks are tools that allows to completely avoid the use of USB ports using a simple padlock. Well, in my… read more »
-
Jun 25, 2018
When you develop an application, often you could need to store some configurations. This data can contain a lot of sensitive informations, and this is a critical point if your sourcecode is hosted on a GitHub repository. In fact, a… read more »