Technology articles



Tech Cat

«We are stuck with technology when what we really want is just stuff that works.»

Douglas Adams


Security

Programming


Latest posts

 

OpenSSL Security Advisory, 3rd May 2016: Patch, Patch ASAP!

May 03, 2016
Memory corruption in the ASN.1 encoder (CVE-2016-2108) and Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)

Read more...

Lubuntu 16 freeze after suspend? Upgrade the kernel!

April 28, 2016
After upgrade to Lubuntu 16, your laptop not responding when suspended? It can be solved with a simple kernel upgrade.

Read more...

Tor in a company network: how to detect and block it?

April 27, 2016
TOR is an important tool. It has its benefits and it could be the perfect way for end users to cover their tracks, but the use of this tool in a corporate network can open up organizations to some risks.

Read more...

Mazar BOT campaign in Denmark and Italy

April 20, 2016
A new Mazar BOT campaign is currently targeting Android users in Denmark and Italy. Attackers are spoofing trustworthy organizations to infected Android smartphones.

Read more...

BadLock: let's take stock of situation!

April 18, 2016
BadLock was revealed a few days, we take a look at what is said on the internet about it

Read more...

Recovering from a 'rm -rf /'?

April 13, 2016


Read more...

The Panama Papers Leak – What You Need To Know

April 12, 2016
What You Need To Know About The Panama Papers Leak

Read more...

Frederike Kaltheuner @ #IJF16: understanding predictive privacy harms

April 11, 2016
Predictive analytics based on big data can turn into privacy harms? In this interesting talk at International Journalism Festival, Frederike Kaltheuner seeks to clarify.

Read more...

Bash on Windows 10?

April 07, 2016
Funny, but my mom has never put a cherry on my food!

Read more...

WhatsApp (finally!) enables End-To-End encryption by default

April 06, 2016
WhatsApp has enabled end-to-end encryption across all versions of its app, according to the announcement on the company's blog.

Read more...

SQL Injection in a Nutshell

April 04, 2016
Ay Caramba!

Read more...

FBI has successfully unlocked terrorist's iPhone without Apple's help? Let's assessing the situation.

March 31, 2016
A quick rundown of the main articles on the blogs about the unlocking of the iPhone by the FBI (constantly updated)

Read more...

Save the Date: on April 12, 2016 a critical security bug on Windows and Samba will be disclosed

March 24, 2016
The pre-patch hype is good for business?

Read more...

Governments don't understand cyber warfare. We need hackers

March 23, 2016
A TED's talk by Rodrigo Bijou about conflict that is being waged online between non-state groups, activists and private corporations, and the digital landscape that is proving to be fertile ground for the recruitment and radicalization of terrorists.

Read more...

Two new threats for mobile users

March 17, 2016
In the last two days, two new threats for mobile users are discovered by researchers.

Read more...

Wordpress Tips: hide a particular account from User List

March 16, 2016
For a lot of reasons you may need to hide the presence of a user in the user list of a wordpress blog.

Read more...

Capture network traffic on a VirtualBox VM

March 09, 2016
Simple tip to dump all network traffic of a VirtualBox VM without using other tools.

Read more...

KeRanger, the first OSX ransomware comes bundled into Transmission installer

March 07, 2016
Security researchers from Palo Alto Networks claims to have discovered the first OSX Ransomware, called 'KeRanger'.

Read more...

Ransomware written in PHP attacks blogs and CMS?

March 03, 2016
Interesting article that i read on Naked Security Blog by Sophos, about a specific type of ransomware written in PHP attacking blogs and CMS

Read more...

Undetected Mac malware sighted online: HackingTeam has returned?

March 02, 2016
Researchers have uncovered a malicious tool that appears to be a newly developed Mac malware from HackingTeam, the first since the hack of last July that leaked gigabytes of the group's private e-mail and source code.

Read more...

DROWN attack breaking TLS using SSLv2: more than 13 million sites at risk

March 01, 2016
A new attack allows an attacker to decrypt an intercepted TLS-protected communications that rely on the RSA cryptosystem when the key is exposed even indirectly through SSLv2, a TLS precursor that was retired almost two decades ago for structural weaknesses.

Read more...

Project Shield: a Google free service to protect sites from DDoS attacks

February 25, 2016
Google has built a free tool for journalists, news sites and other organizations, called Project Shield that re-routes nasty traffic through its own infrastructure in order to stop websites being overwhelmed.

Read more...

VMWare AirWatch MDM Agent on rooted Android Devices: how to force the enrollment

February 19, 2016
A short and simple procedure to force the enrollment of rooted Android devices on AirWatch MDM.

Read more...

Cisco ASA VPN Portal Cross Site Scripting, 0Day

February 18, 2016
After the vulnerability in the fragmentation of the IKE payload, a new zero-day afflicts the Cisco ASA VPN Portal.

Read more...

CVE-2015-7547: a new buffer overflow in glibc affect all Linux machines

February 17, 2016
The Google Security Team and Red Hat reported the security impact of a new buffer overflow discovered in glibc 2.9

Read more...

Mazar BOT: new Android malware that can root and erase your device

February 16, 2016
Researchers of Heimdal Security, analyzing an SMS message sent to random mobile numbers and locations, have discovered a new Android Malware, Mazar BOT.

Read more...

Vulnerability on Sparkle framework affects a lot of Mac apps

February 11, 2016
Sparkle is open source framework to include autoupdate feature in OSX apps, and a recently discovered vulnerability has made many applications using this framework susceptible to man-in-the-mirror attacks.

Read more...

New malware attacks Skype on Windows: the T9000

February 11, 2016
A new sophisticated malware which can take recordings and screenshots of Skype activity, avoiding detection by security software, has been discovered by Palo Alto Networks

Read more...

Jekyll: a custom 'related posts' script

February 10, 2016
I do not like the system of related articles native of Jekyll, so for my site so I created a short script to filter posts similar based on shared tags.

Read more...

Apache Hadoop: an introduction and a Cheat Sheet

February 03, 2016
A brief introduction about Apache Hadoop and a useful PDF Cheat Sheet

Read more...

Christopher Soghoian: How to avoid surveillance with the phone in your pocket

January 20, 2016
Very interesting talk by Christopher Soghoian on a 2015 TED Conference, about phone wiretapping and privacy

Read more...

Rooting and installing Xposed Framework on Vodafone Smart Prime 6 (VF-895N)

November 10, 2015
Rooting and installing Xposed Framework on Vodafone Smart Prime 6 (VF-895N): a simple tutorial!

Read more...

Fitbit hackable in 10 seconds?

October 24, 2015
A vulnerability in FitBit fitness trackers first reported to the vendor in March could still be exploited by an attacker that sits near you.

Read more...

eFast Browser, a smart adWare that replaces your Google Chrome: how to remove it?

October 15, 2015


Read more...

Geolocating with a single javascript line

September 22, 2015
Geolocating in HTML5 with a single line of code? 'It Could Work!'

Read more...

Wordpress tips: bulk update of permalinks and image paths

September 15, 2015
When you change domain for an existing wordpress blog, it may be difficult to upgrade permalinks and posts meta.

Read more...

Joel Watson predicted Apple's iPad Pro 3 years ago!

September 10, 2015
Several sites, from Engadged to IlDisinformatico, talks about the 2012's comic that anticipates the release of the iPad Pro and its keyboard-cover.

Read more...

Import a Windows physical machine into a VirtualBox virtual machine

September 09, 2015
It had to help a user in the migration from an old laptop (with serious motherboard issues) to a new laptop.

Read more...

A huge list of cheat sheets for programmers

September 07, 2015
Post initially short but growing: a list of all the cheat sheets that i'll find online

Read more...

How to remove all Windows Telemetry Updates?

September 03, 2015
Windows 10 terms and conditions clearly say 'we will access, disclose and preserve personal data.'

Read more...

Windows 10: uninstall all modern apps with a single Powershell command

August 31, 2015
I have already explained how to uninstall a Metro/Modern app using Powershell on Windows 8, but some readers ask me how to 'clean' the new Windows 10 from all pre-installed Apps.

Read more...

Windows 10: generate a battery report

August 27, 2015
When Windows 10 is running on a tablet or a laptop, one of the aspects to be checked periodically is the battery life.

Read more...

Bash pitfall: old but gold!

August 24, 2015
When writing bash scripts often we make errors difficult to detect and correct.

Read more...

Windows 10: enable right click with two fingers tap on Synaptics touchpad

August 05, 2015
After upgrading to Windows 10, the touchpad of my Lenovo G50-45 has lost a feature in my opinion very useful: the right click with the two-fingers tap.

Read more...

Windows 10: how to disable Windows Update Delivery Optimization (WUDO)

August 03, 2015
Windows 10 introduced a new feature, called Windows Update Delivery Optimization (WUDO), initially designed to help users get faster software updates.

Read more...

Windows 10: how to fix the 0x803F7000 error on Store

July 31, 2015
During the download of the apps from the Windows Store, you may receive the error code 0x803F700X during the license acquisition.

Read more...

Windows 10: missing MIDI wavetable?

July 30, 2015
After upgrading to Windows 10, I discovered that the softwares I use to write music (musescore, for example), are no longer able to carry out the reproduction of the music scores using the GS Wavetable Windows virtual midi interface

Read more...

95% of Android smartphones can be hacked with a text message?

July 28, 2015
Your Android smartphone can be hacked by just a malformed text message?

Read more...

Milano: Detection Utility for Hacking Team Malware

July 22, 2015
RookSecurity has released a malware removal tool called 'Milano', that scans the filesystem to search 'Hacking Team malware' associated files.

Read more...

Apple was planning the Wi-Fi networks in 1991?

July 09, 2015
Flipping an old publication of MC-Microcomputer (an italian magazine dedicated to IT and Personal Computing), n. 106 of April 1991, my eye falls on this article (p. 74)

Read more...

Weekly Roundup Special Edition: all about Hacking Team!

July 08, 2015
Some articles that i read in the last days about the 'Hacking Team breach' (in constant update)

Read more...

Shutting down computer on USB port activity? Yes, with USBKill

July 01, 2015
USBKill, a simple console tool to shutdown computer on USB port activity

Read more...

HTML5: Using WebWorkers

June 24, 2015
WebWorkers was created to allow execution of javaScript code asynchronously: can be compared to a thread that the webpage can launch and with which it can communicate through specific methods.

Read more...

Working day...

June 18, 2015
Today I do not have much time to write on the blog, but I want to share an image that sums up my working day!

Read more...

How to disable the message 'Upgrade To Windows 10' From Windows 7 and Windows 8

June 15, 2015
Annoyed by the notification in the tray area that reminds you that is available the free upgrade to Windows 10?

Read more...

Android M vs. iOS 9: 'battery life' challenge?

June 09, 2015
Android M and iOS 9 will introduce new features for battery saving: who will win?

Read more...

A Lego 3D printer that prints lego

June 08, 2015
A Lego 3D printer that prints lego: the dawn of the machines?

Read more...

Skype: the eight-characters of death!

June 03, 2015
This eight-character message causes Skype to endlessly crash

Read more...

Crashing an iPhone with a simple message?

May 29, 2015
A iOS bug allows anyone to reboot an iPhone by simply sending it a certain string of characters in a message

Read more...

Wordpress tips: courtesy page for anonymous users without plugins

May 26, 2015
Create on wordpress a courtesy page for anonymous users without plugins

Read more...

Apply a text watermark on images with HTML5 Canvas

May 20, 2015
A simple code snippet to watermarking images with HTML5 Canvas, and a complete browser tool

Read more...

Testing the performance of a new system before website's migration

May 12, 2015
a very simple trick to testing the performance of a new system before the website's migration

Read more...

Wordpress tips: disable all update notifications without plugins

May 07, 2015
Disable Update Notifications and Maintenance Nags in WordPress

Read more...

'No iOS': a 'terrifying iOS flaw'

April 23, 2015
'No iOS': a 'terrifying iOS flaw'

Read more...

'Redirect to SMB': an old Windows bug that back in the spotlight

April 15, 2015
A very old Windows bug back in the spotlight

Read more...

Facebook Fitness Report: a small update

March 26, 2015
A very small update of my 'runner-oriented' webapp Facebook Fitness Report

Read more...

The Life of a Software Engineer

March 13, 2015
The Life of a Software Engineer

Read more...

Reconnect, a Facebook hacking tool

March 11, 2015
Hacking Facebook Account with 'Reconnect' Tool

Read more...

Project Managers and Social Media: my two Cents

March 04, 2015
Project Managers with no knowledge about social media ecosystem

Read more...

A very simple bug can crash the stock Email App on Android

February 18, 2015
Hector Marco discover a very simple bug can crash the stock Email App on Android

Read more...

Discovered (and fixed) a vulnerability that permits attacker to delete any photo album on Facebook

February 12, 2015
Discovered (and fixed) a vulnerability that permits attacker to delete any photo album on Facebook

Read more...

Windows 98 on iPad?

February 11, 2015
Running Windows 98 and some old games on iPad

Read more...

Discovered a serious and unpatched Internet Explorer vulnerability

February 04, 2015
Discovered a serious and unpatched Internet Explorer vulnerability

Read more...

GHOST: a really serious glibc vulnerability

January 29, 2015
GHOST: a really serious glibc vulnerability

Read more...

HTML5: resize a photo before upload

January 26, 2015
Simple tutorial: resize a photo before upload

Read more...

WhatSim, a WhatsApp-Only SIM?

January 21, 2015
WhatSim: you can't call, surf or text. Only WhatsApp!

Read more...

HTML5: take a photo and upload it from mobile phone browser

January 21, 2015
Simple tutorial: take a photo and upload it from mobile phone browser

Read more...

Facebook Fitness Report: a simple webapp to access opengraph fitness data

January 14, 2015
Accessing opengraph fitness data through facebook API

Read more...

Thunderstrike, the first OSX bootkit

January 09, 2015
Thunderstrike, infect OSX through thunderbolt

Read more...

Merry Christmas!

December 24, 2014
Merry Christmas!

Read more...

Exploiting a computer through the USB port

December 21, 2014
USBdriveby is a device you stylishly wear around your neck which can quickly and covertly install a backdoor and override DNS settings on any unlocked machine via USB in a matter of seconds.

Read more...

Multithreaded programming - theory and practice

December 19, 2014
Multithreaded programming - theory and practice

Read more...

OneClick PayPal Hacking?

December 03, 2014
Hacking PayPal Accounts with one click

Read more...

Three new Android vulnerabilities, one remote

November 27, 2014
Three new Android vulnerabilities, one remote

Read more...

Windows Tips: Completely uninstall Metro Apps from Windows 8/8.1/10 with PowerShell

November 17, 2014
Windows Tips: Completely Uninstall Metro Apps From Windows 8/8.1/10 with PowerShell

Read more...

Seriously? Another iOS vulnerability?

November 11, 2014
Masque Attack allow hackers to replace apps with malware

Read more...

WireLurker, a new malware generation?

November 06, 2014
WireLurker: A New Era in iOS and OS X Malware

Read more...

Rootpipe, a critical OS X Yosemite Vulnerability

November 04, 2014
Critical OSX vulnerability allow root access without password

Read more...

Another day, another ShellShock vector: today is the turn of the SMTP

October 29, 2014
Another ShellShock attack vector: SMTP!

Read more...

Tips: using PV instead of CP to copy large files

October 27, 2014


Read more...

Windows 10: fix 'two-finger scrolling' issue for Synaptics touchpads

October 20, 2014
Windows 10: fix 'two-finger scrolling' issue for Synaptics touchpads

Read more...

Apple launched a new multi-carrier Sim Card

October 17, 2014


Read more...

OSX vulnerable to Shellshock through DNS reverse lookup

October 15, 2014


Read more...

Change your Dropbox password, right now!

October 14, 2014


Read more...

What Every App Developer Should Know About Android

October 05, 2014


Read more...

OpenVPN Vulnerable to Shellshock

October 04, 2014


Read more...

Protesters in Hong Kong are spied through a trojan installed on their iPhone?

October 03, 2014


Read more...

How to schedule a post in Jekyll?

October 02, 2014


Read more...

Nixie, a wearable drone for extreme selfies

October 01, 2014


Read more...

Apple releases OSX bash update 1.0, patching shellshock vulnerability

September 30, 2014


Read more...

Edit markdown files with Evernote using Marxi.co

September 29, 2014


Read more...

We migrate on Jekyll!

September 28, 2014
After a few years on blogspot, I decided to migrate my blog on a more modern platform.

Read more...