
April 16, 2013
Mike Shema speaks about a lot of different kind of attacks in his book in a real deep way, at the point that sometimes I wondered if he was planning to instruct people how to hack websites or only how to secure own websites. The book has often some code samples that allow a faster understanding of what the author is saying. Even if a coding knowledge is not required, the ability to understand HTML, JS, SQL, PHP, Python and C++ speeds up the reading.
Read More 
April 2, 2013
As the name suggests, this set of videos is for developers.
HTML 4 and Javascript are often used without much explaination about the JS code it self but only about the HTML5 Canvas part.
I felt to point this out immediately since I’ve not found it on the O’Reilly page, but I believe that is really important to specify.
Another thing that I’d like to point out is that (as it is easy to imagine, but not obvious) these videos only speak about 2D graphics in HTML (therefore there will no WebGL topics).
After these two notes (that will not influence in any way my judgement about the videos), let’s start talking about the videos.
Read More 
February 28, 2013
Today I would like to give you an idea on how to implement a spam system that can reduce some kind of spam.
The problem
Sometimes a company or a politician, that does not respect the usual privacy policy, continues to send e-mails even if the user already tried to unsubscribe.
My postulates
- The people who usually send this kind of e-mail are not very familiar with how e-mail work or how the privacy policy works. Obviously there is the case in which they are malicious, but I prefer to think that the biggest part of these people are in the first two cases.
- These people probably will have issues removing a person from a mailing list, therefore they will tend not doing it, unless they have an advantage.
- Is really annoying sending an e-mail to 10 contacts and receive 8 mail-delivery-subsystem errors.
My approach
My approach is dividable in two directions that have to be implemented as features from the e-mail provider:
Read More 
April 4, 2012
Since the four authors are very popular in the SEO field, I was expecting the best book on SEO ever. All my expectation have been met.
I think that the book authors have done a great job describing these difficult concept in an easy and ordered way.
The book, also, is very complete.
The touched topics include: user-focussed data, key analytical tools, effective website creation, result tracking, search engine theory and behaviour, the impact of social media, SEO best practices and much more.
Sometimes the authors deviate from the topics usually covered in SEO books, in fact you can find topics like In-house vs outsourced SEO.
Read More 
April 1, 2012
jQuery Mobile is a library that allows you to develop mobile apps using jQuery.
Is even possible to use a jQuery Mobile program as a native app, thanks to programs like PhoneGap.
This book assumes that you already know jQuery and I think that this is good since the author can focus only on the main topic in this way.
I think you should know or study jQuery before even starting this book.
I do know that’s possible to understand jQuery code even if you don’t know anything of JavaScript if you have rock solid programming knowledge, but I discourage it.
Read More 
February 28, 2012
Mining the Social Web is a good start for anyone is going to create scripts to analyze patterns in Social Networks.
I’ve to say that this book consider that the reader already masters Python.
I think that should be written directly on the title (ie: “Mining the Social Web with Python”).
I liked the really fast approach to the Social Networks, even if a lot of times I wanted more; for this reason I consider it only a start, not a complete book.
Read More 
December 6, 2011
Gordon Lyon (also known as Fyodor), the creator of Nmap, sent an email yesterday to the Nmap mailing list pointing out that the C|Net Download.com website is altering Nmap downloadable files injecting malware into them.
It’s also possible that other files delivered by C|Net Download.com are also subject to the same problem.
This event is a very problematic one since it will create a complete loss of trust toward Download.com.
It also reminds us of a critical aspect of security: all chain steps need to be secure and trusted.
Read More 
February 4, 2011
On the first of February, APNIC, the Asia Pacific Network Information Centre, announced that the last two IPv4 class A (/8) have been assigned.
With this assignment, there are no more IPV4 classes /8 available from IANA.
This does not mean that there are no IPv4 available, but that from now on, only smaller classes will be assignable.
Also, the RIR still has some /8 classes available.
Many people see this as a clear sign that the move to IPv6 is imminent.
I do not share this optimism.
For many years companies will continue freeing IPv4 classes by implementing NATs and will sell those classes to newer companies that will require IPv4s.
Over time the average price per address will increase, squeezing out of the market the small players.
We will see a move to IPv6 at a certain point, but I doubt it will happen before 10 or 20 years.
Read More