 <?xml-stylesheet type="text/css" href="https://www.rossimassimiliano.it/Data/style/rss/rss1.css" ?> <?xml-stylesheet type="text/xsl" href="https://www.rossimassimiliano.it/Data/style/rss/rss1.xsl" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
  <channel>
    <title>Blog</title>
    <link>https://www.rossimassimiliano.it/blog</link>
    <description />
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>mojoPortal Blog Module</generator>
    <language>it-IT</language>
    <managingEditor>massimiliano@rossimassimiliano.it (Massimiliano Rossi)</managingEditor>
    <ttl>2</ttl>
    <atom:link href="https://www.rossimassimiliano.it/Blog/RSS.aspx?p=14~7~-1&amp;r=796bdfb4-0807-4296-bbab-7b7c94d5601b" rel="self" type="application/rss+xml" />
    <itunes:author>massimiliano@rossimassimiliano.it (Massimiliano Rossi)</itunes:author>
    <itunes:owner>
      <itunes:email>massimiliano@rossimassimiliano.it</itunes:email>
      <itunes:name>Massimiliano Rossi</itunes:name>
    </itunes:owner>
    <itunes:explicit>no</itunes:explicit>
    <item>
      <title>test</title>
      <description><![CDATA[<p>test body test</p>
<br /><a href='https://www.rossimassimiliano.it/test'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/test</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/test</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/test</guid>
      <pubDate>Sun, 19 Jan 2025 10:07:00 GMT</pubDate>
    </item>
    <item>
      <title>Cross Site Scripting</title>
      <description><![CDATA[<p>Cross site scripting (XSS) is a common attack vector that injects malicious code into a vulnerable web application. XSS differs from other web attack vectors (e.g.,&nbsp;<a href="https://www.imperva.com/learn/application-security/sql-injection-sqli/" rel="noopener noreferrer" target="_blank">SQL injections</a>), in that it does not directly target the application itself. Instead, the users of the web application are the ones at risk.</p>

<p>A successful cross site scripting attack can have devastating consequences for an online business’s reputation and its relationship with its clients.</p>

<p>Depending on the severity of the attack, user accounts may be compromised, Trojan horse programs activated and page content modified, misleading users into willingly surrendering their private data. Finally, session cookies could be revealed, enabling a perpetrator to impersonate valid users and abuse their private accounts.</p>

<p>Cross site scripting attacks can be broken down into two types: stored and reflected.</p>

<p>Stored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application.</p>

<p><a href="https://www.imperva.com/learn/application-security/reflected-xss-attacks/" rel="noopener noreferrer" target="_blank">Reflected XSS</a>&nbsp;involves the reflecting of a malicious script off of a web application, onto a user’s browser. The script is embedded into a link, and is only activated once that link is clicked on.</p>
<br /><a href='https://www.rossimassimiliano.it/cross-site-scripting-1'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/cross-site-scripting-1</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/cross-site-scripting-1</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/cross-site-scripting-1</guid>
      <pubDate>Wed, 20 May 2020 18:50:00 GMT</pubDate>
    </item>
    <item>
      <title>SQL Alter Table</title>
      <description><![CDATA[<h2>SQL ALTER TABLE Statement</h2>

<p>The ALTER TABLE statement is used to add, delete, or modify columns in an existing table.</p>

<p>The ALTER TABLE statement is also used to add and drop various constraints on an existing table.</p>

<hr />
<h2>ALTER TABLE - ADD Column</h2>

<p>To add a column in a table, use the following syntax:</p>

<div class="w3-example">
<div class="w3-code notranslate sqlHigh"><span class="sqlcolor" style="color:black"><span class="sqlkeywordcolor" style="color:mediumblue">ALTER</span> <span class="sqlkeywordcolor" style="color:mediumblue">TABLE</span> <em>table_name</em><br />
<span class="sqlkeywordcolor" style="color:mediumblue">ADD</span> <em>column_name datatype</em>; </span></div>
</div>
<br /><a href='https://www.rossimassimiliano.it/sql-alter-table'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/sql-alter-table</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/sql-alter-table</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/sql-alter-table</guid>
      <pubDate>Mon, 11 May 2020 16:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Code Access Security</title>
      <description><![CDATA[<p><b>Code Access Security</b> (CAS), in the <a class="mw-redirect" href="https://en.wikipedia.org/wiki/Microsoft_.NET" title="Microsoft .NET">Microsoft .NET</a> framework, is <a href="https://en.wikipedia.org/wiki/Microsoft" title="Microsoft">Microsoft</a>'s solution to prevent untrusted code from performing privileged actions. When the <a href="https://en.wikipedia.org/wiki/Common_Language_Runtime" title="Common Language Runtime">CLR</a> loads an <a href="https://en.wikipedia.org/wiki/Assembly_(CLI)" title="Assembly (CLI)">assembly</a> it will obtain <a href="https://en.wikipedia.org/wiki/Code_Access_Security#Evidence">evidence</a> for the assembly and use this to identify the <a href="https://en.wikipedia.org/wiki/Code_Access_Security#Code_group">code group</a> that the assembly belongs to. A code group contains a permission set (one or more <a href="https://en.wikipedia.org/wiki/File_system_permissions" title="File system permissions">permissions</a>). Code that performs a privileged action will perform a code access <a href="https://en.wikipedia.org/wiki/Code_Access_Security#Demands">demand</a> which will cause the CLR to walk up the <a href="https://en.wikipedia.org/wiki/Call_stack" title="Call stack">call stack</a> and examine the permission set granted to the assembly of each <a class="mw-redirect" href="https://en.wikipedia.org/wiki/Method_(computer_science)" title="Method (computer science)">method</a> in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the <a href="https://en.wikipedia.org/wiki/Code_Access_Security#Policy">security policy</a>.</p>
<br /><a href='https://www.rossimassimiliano.it/code-access-security'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/code-access-security</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/code-access-security</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/code-access-security</guid>
      <pubDate>Sat, 25 Apr 2020 10:03:00 GMT</pubDate>
    </item>
    <item>
      <title>man in the middle attack type</title>
      <description><![CDATA[<div class="field-main-content">
<div about="" class="entity entity-paragraphs-item paragraphs-item-featured-section paragraphs-27666 view-mode-cyber_edu" id="featured_section_27666" typeof="">
<h2 class="field-featured-section-title">Types of Man-in-the-Middle Attacks</h2>

<div class="paragraphs-items paragraphs-items-field-featured-section-pgs paragraphs-items-field-featured-section-pgs-full paragraphs-items-full">
<div class="field-featured-section-pgs">
<div about="" class="entity entity-paragraphs-item paragraphs-item-wysiwyg paragraphs-27661 view-mode-full" typeof="">
<div class="content">
<div class="field-pg-wysiwyg-body">
<p><strong>Email Hijacking</strong> – attackers gain access to a user’s email account and watch transactions to and from the account. When the time is right, for instance the user is exchanging funds with another party, the attacker takes advantage of the situation by attempting to intercept the funds by spoofing one or all members of the conversation.</p>

<p>&nbsp;</p>

<p><strong>Wi-Fi Eavesdropping</strong> – a passive way to deploy MITM attacks, Wi-Fi eavesdropping involves cyber hackers setting up public Wi-Fi connections, typically with an unsuspecting name, and gain access to their victims as soon as they connect to the malicious Wi-Fi</p>

<p>&nbsp;</p>

<p><strong>Session Hijacking</strong> – session hijacking is when an attacker gains access to an online session via a stolen session key or stolen browser cookies.</p>

<p>&nbsp;</p>

<p><strong>DNS Spoofing</strong> – an attacker engages in DNS spoofing by altering a website’s address record within a DNS (domain name server) server. A victim unknowingly visits the fake site and the attacker will attempt to steal their information.</p>

<p>&nbsp;</p>

<p>I<strong>P Spoofing</strong> – similar to DNS spoofing, IP Spoofing sees an attacker attempt to divert traffic to a fraudulent website with malicious intent. Instead of spoofing the website’s address record, the attacker disguises an IP (internet protocol) address.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<br /><a href='https://www.rossimassimiliano.it/man-in-the-middle-attack-type'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/man-in-the-middle-attack-type</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/man-in-the-middle-attack-type</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/man-in-the-middle-attack-type</guid>
      <pubDate>Fri, 03 Apr 2020 17:20:00 GMT</pubDate>
    </item>
    <item>
      <title>Prevent SQL Injection</title>
      <description><![CDATA[<p>Most instances of SQL injection can be prevented by using parameterized queries (also known as prepared statements) instead of string concatenation within the query.</p>

<p>The following code is vulnerable to SQL injection because the user input is concatenated directly into the query:</p>

<p><code>String query = "SELECT * FROM products WHERE category = '"+ input + "'"; </code></p>

<p><code>Statement statement = connection.createStatement(); </code></p>

<p><code>ResultSet resultSet = statement.executeQuery(query); </code></p>

<p>This code can be easily rewritten in a way that prevents the user input from interfering with the query structure:</p>

<p><code>PreparedStatement statement = connection.prepareStatement("SELECT * FROM products WHERE category = ?"); </code></p>

<p><code>statement.setString(1, input); </code></p>

<p><code>ResultSet resultSet = statement.executeQuery(); </code></p>

<p>Parameterized queries can be used for any situation where untrusted input appears as data within the query, including the <code>WHERE</code> clause and values in an <code>INSERT</code> or <code>UPDATE</code> statement. They can't be used to handle untrusted input in other parts of the query, such as table or column names, or the <code>ORDER BY</code> clause. Application functionality that places untrusted data into those parts of the query will need to take a different approach, such as white-listing permitted input values, or using different logic to deliver the required behavior.</p>

<p>For a parameterized query to be effective in preventing SQL injection, the string that is used in the query must always be a hard-coded constant, and must never contain any variable data from any origin. Do not be tempted to decide case-by-case whether an item of data is trusted, and continue using string concatenation within the query for cases that are considered safe. It is all too easy to make mistakes about the possible origin of data, or for changes in other code to violate assumptions about what data is tainted.</p>
<br /><a href='https://www.rossimassimiliano.it/prevent-sql-injection'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/prevent-sql-injection</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/prevent-sql-injection</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/prevent-sql-injection</guid>
      <pubDate>Fri, 03 Apr 2020 17:03:00 GMT</pubDate>
    </item>
    <item>
      <title>retrieving data with SQL Injection</title>
      <description><![CDATA[<p>Consider a shopping application that displays products in different categories. When the user clicks on the Gifts category, their browser requests the URL:</p>

<p><code>https://insecure-website.com/products?category=Gifts </code></p>

<p>This causes the application to make an SQL query to retrieve details of the relevant products from the database:</p>

<p><code>SELECT * FROM products WHERE category = 'Gifts' AND released = 1 </code></p>

<p>This SQL query asks the database to return:</p>

<ul>
	<li>all details (*)</li>
	<li>from the products table</li>
	<li>where the category is Gifts</li>
	<li>and released is 1.</li>
</ul>

<p>The restriction <code>released = 1</code> is being used to hide products that are not released. For unreleased products, presumably <code>released = 0</code>.</p>

<p>The application doesn't implement any defenses against SQL injection attacks, so an attacker can construct an attack like:</p>

<p><code>https://insecure-website.com/products?category=Gifts'-- </code></p>

<p>This results in the SQL query:</p>

<p><code>SELECT * FROM products WHERE category = 'Gifts'--' AND released = 1 </code></p>

<p>The key thing here is that the double-dash sequence <code>--</code> is a comment indicator in SQL, and means that the rest of the query is interpreted as a comment. This effectively removes the remainder of the query, so it no longer includes <code>AND released = 1</code>. This means that all products are displayed, including unreleased products.</p>

<p>Going further, an attacker can cause the application to display all the products in any category, including categories that they don't know about:</p>

<p><code>https://insecure-website.com/products?category=Gifts'+OR+1=1-- </code></p>

<p>This results in the SQL query:</p>

<p><code>SELECT * FROM products WHERE category = 'Gifts' OR 1=1--' AND released = 1 </code></p>

<p>The modified query will return all items where either the category is Gifts, or 1 is equal to 1. Since <code>1=1</code> is always true, the query will return all items.</p>
<br /><a href='https://www.rossimassimiliano.it/retrieving-data-with-sql-injection'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/retrieving-data-with-sql-injection</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/retrieving-data-with-sql-injection</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/retrieving-data-with-sql-injection</guid>
      <pubDate>Fri, 03 Apr 2020 17:01:00 GMT</pubDate>
    </item>
    <item>
      <title>la storia di Microsoft</title>
      <description><![CDATA[<header>
<h1 itemprop="name">&nbsp;</h1>
</header>

<div class="itemBody">
<p style="margin-top: 6pt; text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span><img alt="logo old" height="123" src="http://www.storiainformatica.it/images/stories/history/company/microsoft/logo_old.png" width="300" /></span></span></p>

<p style="margin-top: 6pt; text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>La nascita di Microsoft è indissolubilmente legata alla storia dei due co-fondatori, <strong>William Henry “Bill” Gates III</strong> e <strong>Paul Gardner Allen</strong> che già nel 1973, hanno dato vita ad una propria società, la <em>Traff-o-Data</em>, per l’analisi dei dati sul traffico urbano.</span></span></p>

<p style="margin-top: 6pt; text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>I due futuri co-fondatori sono impegnati da tempo, sia singolarmente che congiuntamente, nello sviluppo di programmi, ma l’euforia si scatena all’inizio di dicembre del 1974 quando sulla prestigiosa rivista <em>Popular Electronics</em> fa bella mostra di sé il “primo microcomputer kit”, ovvero l’<strong>Altair 8800</strong>, realizzato dalla società <em>MITS</em> (<em>Micro Instrumentation and Telemetry Systems</em>). Va precisato che per prassi, <em>Popular Electronics</em> riportava nella testata la data del mese successivo a quello di pubblicazione.</span></span></p>

<p style="text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>Il sistema proposto da MITS è affascinate ma non dispone di un linguaggio di programmazione evoluto e per “programmarlo” è necessario intervenire fisicamente su appositi switch. Gates e Allen intuiscono di potersi ritagliare un ruolo nel settore a cui <em>Ed Roberts</em>, proprietario di MITS, sta dando un contributo fondamentale. I due amici propongono a Roberts un interprete Basic per l’Altair, ma non hanno a disposizione né un Altair (disponibile ufficialmente dagli inizi del dicembre 1974 ma difficilissimo da reperire) né un interprete Basic, neanche per altre piattaforme.</span></span></p>

<p style="text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>Ma la sfida non spaventa Gates ed Allen che si buttano a capofitto nell’impresa, assumendo <em>Monte Davidoff </em>per lo sviluppo di alcune routine di base. Il 2 gennaio del 1975 viene siglato l’accordo per poco più di 31.000$ e il 4 aprile, i due soci si trasferiscono ad Albuquerque (New Mexico), vicino alla sede della MITS, per continuare lo sviluppo del BASIC e realizzare un software che consenta di collegare un’unità disco all’Altair. Allen, parallelamente, viene assunto come direttore del software alla stessa MITS.</span></span></p>

<p style="text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>L’Altair Basic diventa largamente utilizzato dagli Hobbisti, soprattutto quelli dell'Homebrew Computer Club, ben noti a Gates, che, contestando l’alto prezzo d’acquisto (500$ in versione stand-alone e $75 se comprato con un Altair dotato di una interface board e 8K di memoria), non si fanno problemi a copiarlo illecitamente. Il futuro CEO di Microsoft va su tutte le furie e scrive una inattesa lettera aperta agli hobbisti del club, pubblicata sul bollettino ufficiale di febbraio del 1976, in cui non lesina di criticare aspramente la prassi. </span></span></p>

<p style="text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>Durante quasi tutto il biennio successivo, a legare Gates e Allen c’è un accordo di collaborazione e fiducia, anche se la volontà di fondare una propria società è già nell’aria, come dimostra la lettera del 29 novembre del 1975, scritta da Gates ad<em> </em>Allen,<em> </em>in cui viene utilizzato per la prima volta il termine “<strong>Micro-Soft</strong>”. Secondo il futuro CEO, il nome “Micro-Soft” rappresenta bene la loro Vision, coniugando due elementi fondamentali: <em>MICROcomputer e SOFTware</em>. La società viene registrata</span> <span> ufficialmente solo un anno dopo, il 26 novembre del 1976, come <strong>Microsoft</strong>, poco dopo che Allen rassegna le dimissioni dalla MITS.</span></span></p>

<p style="text-align: center;"><span itemprop="articleBody"><img alt="gates allen primi anni ms" height="302" src="http://www.storiainformatica.it/images/stories/history/company/microsoft/gates_allen_primi_anni_ms.jpg" width="500" /></span></p>

<p style="text-align: center;"><span itemprop="articleBody"><em>Gates e Allen durante i primi anni in Microsoft</em></span></p>

<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>Microsoft ha intenzione di creare nuove versioni del Microsoft Basic da vendere ai produttori storici che si stanno affacciando al business del personal computer, come <em>General Electric</em>, <em>Citibank</em>, <em>NCR</em> e i nuovi arrivati, come Commodore, Apple e Radio Shack che siglano velocemente un accordo di licenza per il linguaggio. In particolare, Microsoft incassa una tantum 21.000 dollari da Apple, per quello che diventerà l’<em>Applesoft BASIC</em>, non fiutando il grande potenziale di vendita dell’Apple II (più di un milione di macchine). Facendo un calcolo semplicissimo è come se la Microsoft avesse venduto ogni copia a 2 centesimi di dollaro!</span></span></p>

<p style="text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>Cominciano anche le prime campagne pubblicitarie, a partire da “The Legend of Micro-Kid”, e la società prende casa al <em>One Park Central Tower in Albuquerque</em></span></span></p>

<p style="text-align: center;"><span itemprop="articleBody"><img alt="legend micro kid" src="http://www.storiainformatica.it/images/stories/history/company/microsoft/legend_micro-kid.jpg" /></span></p>

<p style="text-align: center;"><span itemprop="articleBody"><em>The Legend of Micro-Kid</em></span></p>

<p style="text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>Nel 1977 arriva il <strong>Microsoft FORTRAN</strong>, seguito nel 1978 dal <strong>Microsoft Cobol</strong>, entrami sviluppati per il sistema operativo CP/M che, nel giro di un biennio, diventa il sistema operativo di riferimento per micro/personal computer (</span> <span style="font-size: 11pt; line-height: 150%; color: black; background-image: initial; background-attachment: initial; background-position: initial; background-repeat: initial;">Sirius, Zenith, Sharp, ecc.)</span><span>, trasformando, di conseguenza, Microsoft nella società leader nel settore dei linguaggi per microcomputer. Sempre nel 1977, Ed Roberts è costretto a vendere MITS alla PERTEC per gravi problemi economici, scatenando una battaglia giudiziaria in merito ai diritti di proprietà intellettuale del Basic dell'Altair, rivendicati dalla nuova proprietà. La questione, visto anche la scarsa</span> <span> giurisprudenza relativa, si protrae per diversi mesi, ma alla fine Gates ed Allen la spuntano, sostenendo e dimostrando che il Basic era stato dato solamente in concessione. </span></span></p>

<p style="text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>Alla fine del 1978, pronta a trasferirsi nella nuova sede a <em>Bellevue </em>(stato di Washington), <em>Microsoft</em> ha 13 dipendenti, due in più della storica foto di gruppo dello stesso anno, un ufficio vendite in Giappone (denominato ASCII MICROSOFT) e circa 1milione di dollari di fatturato.</span></span></p>

<p style="text-align: center;"><span itemprop="articleBody"><img alt="primi11 dipendenti 1978" height="375" src="http://www.storiainformatica.it/images/stories/history/company/microsoft/primi11_dipendenti_1978.jpg" width="500" /></span></p>

<p style="text-align: center;"><span itemprop="articleBody"><em>I primi 11 dipendenti di Microsoft (1978)</em></span></p>

<p style="text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>Nel 1979 Microsoft ha un compilatore BASIC praticamente per qualsiasi microcomputer, ma non fatica ad intuire come il business legato al mondo dei personal computer sia ben più ampio. Gates e Allen danno così vita alla <strong>Consumer Products Division</strong>, pensata per la creazione e commercializzazione per prodotti destinati al settore consumer. Nonostante i titoli realizzati riscuotano un ampio successo, fra tutti <em>Adventure</em> e <em>Olympic Decathlon</em>, Microsoft ha anticipato troppo i tempi ed i numeri sono relativamente bassi, così come i profitti.</span></span></p>

<p style="text-align: center; line-height: 150%; page-break-after: avoid;"><span itemprop="articleBody"><span style="line-height: 1.6;"><img alt="microsoft adventure" src="http://www.storiainformatica.it/images/stories/history/company/microsoft/microsoft_adventure.jpg" /></span></span></p>

<p style="text-align: center; line-height: 150%; page-break-after: avoid;"><span itemprop="articleBody"><em><span style="line-height: 1.6;">Microsoft Adventure</span></em></span></p>

<p style="text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>Nel frattempo arrivano i primi premi, come l’“ICP Million Dollar Award” che per la prima volta viene dato ad un prodotto per personal computer, e viene annunciato (giugno 1979) il compilatore BASIC per il nuovo i8086 a 16bit.</span></span></p>

<p style="text-align: justify; line-height: 150%;"><span itemprop="articleBody"><span>Il decennio si chiude con l’espansione Europa, stabilendo una nuova sede per la distribuzione in Belgio (per meglio supportare <em>ICL</em>, <em>Phillips</em>, <em>R2E</em> e svariati altri OEM), con un fatturato di oltre 2milioni di dollari e 28 dipendenti.</span></span></p>
</div>
<br /><a href='https://www.rossimassimiliano.it/la-storia-di-microsoft'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/la-storia-di-microsoft</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/la-storia-di-microsoft</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/la-storia-di-microsoft</guid>
      <pubDate>Sun, 10 Feb 2019 11:07:00 GMT</pubDate>
    </item>
    <item>
      <title>DOT NET CORE</title>
      <description><![CDATA[<blockquote>
<p>.NET Core is a general purpose development platform maintained by Microsoft and the .NET community on <a href="https://github.com/dotnet" target="_blank">GitHub</a>. It is cross-platform, <strong>supporting Windows, macOS and Linux</strong>, and can be used in device, cloud, and embedded/IoT scenarios.</p>

<p>The following characteristics best define .NET Core:</p>

<ul>
	<li>
	<p>Flexible deployment: Can be included in your app or installed side-by-side user- or machine-wide.</p>
	</li>
	<li>
	<p>Cross-platform: Runs on Windows, macOS and Linux; can be ported to other OSes. The supported Operating Systems (OS), CPUs and application scenarios will grow over time, provided by Microsoft, other companies, and individuals.</p>
	</li>
	<li>
	<p>Command-line tools: All product scenarios can be exercised at the command-line.</p>
	</li>
	<li>
	<p>Compatible: .NET Core is compatible with .NET Framework, Xamarin and Mono, via the .NET Standard Library.</p>
	</li>
	<li>
	<p>Open source: The .NET Core platform is open source, using MIT an Apache 2 licenses. Documentation is licensed under CC-BY. .NET Core is a .NET Foundation project.</p>
	</li>
	<li>
	<p>Supported by Microsoft: .NET Core is supported by Microsoft, per .NET Core Support</p>
	</li>
</ul>

<p><a href="https://docs.microsoft.com/en-us/dotnet/articles/core/index" target="_blank">More on the Official .NET Core Documentation from Microsoft</a></p>
</blockquote>

<p>Basically, Microsoft built a version of .NET to allow developers to write cross-platform and cloud-optimized applications.</p>

<p>First, .NET is cross-platform. It runs on Windows, macOS and Linux, which allows the developer to share and run the exact same code between machines running different operating systems, with no changes in code and minimum or no changes in the development process. (Watch out for OS specific APIs!)</p>

<p>But the true innovation in .NET came with the modularization in design and architecture. The compiler (<a href="https://github.com/dotnet/roslyn" target="_blank">Roslyn</a>) and the runtime (<a href="https://github.com/dotnet/coreclr" target="_blank">CoreCLR</a>) are separate components that allow you to use different implementations (or even write your own).</p>

<p>Every library comes as a NuGet package, so when you start a new project, you don’t have any libraries, but a project file (currently a <code>.json</code>, in the future a <code>.csproj</code> to maintain consistency with all .NET projects) and a <code>Program.cs</code>. As you develop your app, you add libraries as you need them, allowing you to minimize the size of your application.</p>

<p>.NET Core also allows you to have multiple versions installed at the same time without having apps / parts of the OS breaking when you update or install a newer version of the framework, and will even allow you to ship the framework / parts of the framework with the application (since the footprint of the framework si small enough).</p>
<br /><a href='https://www.rossimassimiliano.it/dot-net-core'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/dot-net-core</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/dot-net-core</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/dot-net-core</guid>
      <pubDate>Mon, 26 Nov 2018 19:41:00 GMT</pubDate>
    </item>
    <item>
      <title>Cross Site Scripting</title>
      <description><![CDATA[<p><b>Il cross-site scripting</b> (<b>XSS</b>) è una vulnerabilità che affligge siti web dinamici che impiegano un insufficiente controllo dell'input nei form. Un XSS permette a un cracker di inserire o eseguire codice lato client al fine di attuare un insieme variegato di attacchi quali, ad esempio, raccolta, manipolazione e reindirizzamento di informazioni riservate, visualizzazione e modifica di dati presenti sui server, alterazione del comportamento dinamico delle pagine web, ecc.</p>

<p>Nell'accezione odierna, la tecnica ricomprende l'utilizzo di qualsiasi linguaggio di scripting lato client tra i quali JavaScript, VBScript, Flash. Il loro effetto può variare da un piccolo fastidio a un significativo rischio per la sicurezza, a seconda della sensibilità dei dati trattati nel sito vulnerabile e dalla natura delle strategie di sicurezza implementate dai proprietari del sito web.</p>
<br /><a href='https://www.rossimassimiliano.it/cross-site-scripting'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/cross-site-scripting</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/cross-site-scripting</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/cross-site-scripting</guid>
      <pubDate>Thu, 22 Nov 2018 17:39:00 GMT</pubDate>
    </item>
    <item>
      <title>anonymous for the voiceless</title>
      <description><![CDATA[<p class="text-align-center"><strong>Anonymous for the Voiceless</strong>&nbsp;is an animal rights organisation that specializes in street activism.</p>

<p class="text-align-center">Over 4,010<strong>&nbsp;</strong>demonstrations in 729 cities WORLDWIDE,&nbsp;we've convinced at least 216,102 bystanders to take veganism seriously.</p>

<p class="text-align-center">THROUGH THE USE OF LOCAL STANDARD-PRACTICE FOOTAGE, WE EXPOSE TO THE PUBLIC WHAT IS INTENTIONALLY HIDDEN FROM THEM WHEN IT COMES TO ANIMAL EXPLOITATION. COMBINING THIS WITH A VALUE-BASED SALES APPROACH AND RESOURCE LITERATURE, WE FULLY EQUIP THE PUBLIC WITH EVERYTHING THEY NEED IN SWITCHING TO A VEGAN LIFESTYLE. WE HOLD AN ABOLITIONIST STANCE ON ANIMAL EXPLOITATION.</p>
<br /><a href='https://www.rossimassimiliano.it/anonymous-for-the-voiceless'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/anonymous-for-the-voiceless</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/anonymous-for-the-voiceless</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/anonymous-for-the-voiceless</guid>
      <pubDate>Mon, 17 Sep 2018 16:01:00 GMT</pubDate>
    </item>
    <item>
      <title>sql injection</title>
      <description><![CDATA[<p><em>&lt;&lt; Le dita dell’hacker scorrono veloci sulla tastiera, il form di autenticazione web non è un problema. Non conosce username e password, non gli servono: pochi secondi, tre battute sulla tastiera e il sistema è completamente nelle sue mani. “Good Morning, Administrator!”, recita la nuova schermata. Non sono così sicuro che sarà una buona giornata per l’amministratore, pensa l’intruso fra sé. &gt;&gt;</em></p>

<p>Se pensate che una cosa simile possa accadere solo al cinema, vi ricrederete: questa scena viene girata ogni giorno decine, se non centinaia di volte, a causa di una delle tecniche di hacking del web più diffuse: la <strong>SQL injection</strong>. L’introduzione romanzata non esagera riguardo alla semplicità con cui un aggressore può oltrepassare i login messi a protezione delle nostre applicazioni web: è davvero questione di secondi.</p>
<br /><a href='https://www.rossimassimiliano.it/sql-injection'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/sql-injection</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/sql-injection</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/sql-injection</guid>
      <pubDate>Sun, 20 Mar 2016 18:59:00 GMT</pubDate>
    </item>
  </channel>
</rss>