<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://www.endsummercamp.org/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.endsummercamp.org/index.php?action=history&amp;feed=atom&amp;title=ESC08-Talks</id>
		<title>ESC08-Talks - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://www.endsummercamp.org/index.php?action=history&amp;feed=atom&amp;title=ESC08-Talks"/>
		<link rel="alternate" type="text/html" href="https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;action=history"/>
		<updated>2026-04-20T08:52:01Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.21.1</generator>

	<entry>
		<id>https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=6595&amp;oldid=prev</id>
		<title>Se: Protected &quot;ESC08-Talks&quot; ([edit=sysop] (indefinite) [move=sysop] (indefinite))</title>
		<link rel="alternate" type="text/html" href="https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=6595&amp;oldid=prev"/>
				<updated>2011-08-04T20:29:13Z</updated>
		
		<summary type="html">&lt;p&gt;Protected &amp;quot;&lt;a href=&quot;/index.php/ESC08-Talks&quot; title=&quot;ESC08-Talks&quot;&gt;ESC08-Talks&lt;/a&gt;&amp;quot; ([edit=sysop] (indefinite) [move=sysop] (indefinite))&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
			&lt;tr style='vertical-align: top;'&gt;
			&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 20:29, 4 August 2011&lt;/td&gt;
			&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>Se</name></author>	</entry>

	<entry>
		<id>https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=6594&amp;oldid=prev</id>
		<title>Se at 20:28, 4 August 2011</title>
		<link rel="alternate" type="text/html" href="https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=6594&amp;oldid=prev"/>
				<updated>2011-08-04T20:28:33Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr style='vertical-align: top;'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 20:28, 4 August 2011&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Approfondimento del sistema OpenSource Xen. Storia, installazione, configurazione. PV/HVM, Clustering. Come avere un datacenter dentro un PC. :)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Approfondimento del sistema OpenSource Xen. Storia, installazione, configurazione. PV/HVM, Clustering. Come avere un datacenter dentro un PC. :)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;There&lt;/del&gt;'&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;s a srceet about your post&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;ICTYBTIHTKY&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;=== &lt;/ins&gt;'&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;''803 - Tutto quello che avreste voluto sapere su XUL e XPCOM (ma xulplanet&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;com era giù)''' &amp;lt;small&amp;gt; - Hackbunny &amp;lt;/small&amp;gt;=== &lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Quando ho iniziato questo lavoro, mai avrei potuto immaginare che per sviluppare un client di posta personalizzato basato su Thunderbird avrei dovuto imparare come hookare funzioni e oggetti Javascript, sostituire al volo componenti XPCOM, scrivere overlay XUL e binding XBL, scrivere script che premessero automaticamente &amp;quot;OK&amp;quot; nelle finestre di messaggio... ci dev'essere un malinteso! io non sono un hacker, sono un ''programmatore''!&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''804 - Mappable Blind SQL Injections explained''' &amp;lt;small&amp;gt;- Francesco `ascii` Ongaro, Antonio `s4tan` Parata &amp;lt;/small&amp;gt; === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''804 - Mappable Blind SQL Injections explained''' &amp;lt;small&amp;gt;- Francesco `ascii` Ongaro, Antonio `s4tan` Parata &amp;lt;/small&amp;gt; === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 26:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 27:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;L'analisi dei malware risulta di interesse non solo per i ricercatori, e gli esperti di sicurezza, anche&amp;#160; gli amministratori di sistema e chiunque sia responsabile della gestione di sistemi informatici. Bisogna essere in grado di utilizzare gli strumenti adatti per poter comprendere a fondo i rischi associati ai malware, analizzare i sistemi compromessi e sviluppare strategie di difesa effettive. Verranno presentati strumenti e tecniche usati per analizzare codice ostile. Una breve introduzione all'assembly, al formato pe, trick antidebug e unpacking. Infine verra'&amp;#160; effettuata l'analisi di un malware.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;L'analisi dei malware risulta di interesse non solo per i ricercatori, e gli esperti di sicurezza, anche&amp;#160; gli amministratori di sistema e chiunque sia responsabile della gestione di sistemi informatici. Bisogna essere in grado di utilizzare gli strumenti adatti per poter comprendere a fondo i rischi associati ai malware, analizzare i sistemi compromessi e sviluppare strategie di difesa effettive. Verranno presentati strumenti e tecniche usati per analizzare codice ostile. Una breve introduzione all'assembly, al formato pe, trick antidebug e unpacking. Infine verra'&amp;#160; effettuata l'analisi di un malware.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;I went to tons of links before this, what was I thkining?&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;===&amp;#160; '''807 - vserver security''' &amp;lt;small&amp;gt;- malveo &amp;lt;/small&amp;gt; === &lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;''aggiungere abstract''&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''808 - XPath Injection''' &amp;lt;small&amp;gt;- Alessandro `jekil` Tanasi&amp;lt;/small&amp;gt; ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''808 - XPath Injection''' &amp;lt;small&amp;gt;- Alessandro `jekil` Tanasi&amp;lt;/small&amp;gt; ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key www-wiki:diff:version:1.11a:oldid:6583:newid:6594 --&gt;
&lt;/table&gt;</summary>
		<author><name>Se</name></author>	</entry>

	<entry>
		<id>https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=6583&amp;oldid=prev</id>
		<title>84.115.127.28: /* 807 - vserver security - malveo  */</title>
		<link rel="alternate" type="text/html" href="https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=6583&amp;oldid=prev"/>
				<updated>2011-08-04T18:58:11Z</updated>
		
		<summary type="html">&lt;p&gt;‎&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;807 - vserver security - malveo&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr style='vertical-align: top;'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 18:58, 4 August 2011&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 26:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 26:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;L'analisi dei malware risulta di interesse non solo per i ricercatori, e gli esperti di sicurezza, anche&amp;#160; gli amministratori di sistema e chiunque sia responsabile della gestione di sistemi informatici. Bisogna essere in grado di utilizzare gli strumenti adatti per poter comprendere a fondo i rischi associati ai malware, analizzare i sistemi compromessi e sviluppare strategie di difesa effettive. Verranno presentati strumenti e tecniche usati per analizzare codice ostile. Una breve introduzione all'assembly, al formato pe, trick antidebug e unpacking. Infine verra'&amp;#160; effettuata l'analisi di un malware.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;L'analisi dei malware risulta di interesse non solo per i ricercatori, e gli esperti di sicurezza, anche&amp;#160; gli amministratori di sistema e chiunque sia responsabile della gestione di sistemi informatici. Bisogna essere in grado di utilizzare gli strumenti adatti per poter comprendere a fondo i rischi associati ai malware, analizzare i sistemi compromessi e sviluppare strategie di difesa effettive. Verranno presentati strumenti e tecniche usati per analizzare codice ostile. Una breve introduzione all'assembly, al formato pe, trick antidebug e unpacking. Infine verra'&amp;#160; effettuata l'analisi di un malware.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;===&amp;#160; '''807 - vserver security''' &amp;lt;small&amp;gt;- malveo &amp;lt;/small&amp;gt; === &lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;I went to tons of links before this, what was I thkining?&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;''aggiungere abstract''&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''808 - XPath Injection''' &amp;lt;small&amp;gt;- Alessandro `jekil` Tanasi&amp;lt;/small&amp;gt; ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''808 - XPath Injection''' &amp;lt;small&amp;gt;- Alessandro `jekil` Tanasi&amp;lt;/small&amp;gt; ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key www-wiki:diff:version:1.11a:oldid:6551:newid:6583 --&gt;
&lt;/table&gt;</summary>
		<author><name>84.115.127.28</name></author>	</entry>

	<entry>
		<id>https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=6551&amp;oldid=prev</id>
		<title>94.93.150.247: /* 803 - Tutto quello che avreste voluto sapere su XUL e XPCOM (ma xulplanet.com era giÃ¹)  - Hackbunny  */</title>
		<link rel="alternate" type="text/html" href="https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=6551&amp;oldid=prev"/>
				<updated>2011-08-04T03:36:15Z</updated>
		
		<summary type="html">&lt;p&gt;‎&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;803 - Tutto quello che avreste voluto sapere su XUL e XPCOM (ma xulplanet.com era giÃ¹)  - Hackbunny&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr style='vertical-align: top;'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 03:36, 4 August 2011&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Approfondimento del sistema OpenSource Xen. Storia, installazione, configurazione. PV/HVM, Clustering. Come avere un datacenter dentro un PC. :)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Approfondimento del sistema OpenSource Xen. Storia, installazione, configurazione. PV/HVM, Clustering. Come avere un datacenter dentro un PC. :)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;=== &lt;/del&gt;'&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;''803 - Tutto quello che avreste voluto sapere su XUL e XPCOM (ma xulplanet&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;com era giù)''' &amp;lt;small&amp;gt; - Hackbunny &amp;lt;/small&amp;gt;=== &lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;There&lt;/ins&gt;'&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;s a srceet about your post&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;ICTYBTIHTKY&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Quando ho iniziato questo lavoro, mai avrei potuto immaginare che per sviluppare un client di posta personalizzato basato su Thunderbird avrei dovuto imparare come hookare funzioni e oggetti Javascript, sostituire al volo componenti XPCOM, scrivere overlay XUL e binding XBL, scrivere script che premessero automaticamente &amp;quot;OK&amp;quot; nelle finestre di messaggio... ci dev'essere un malinteso! io non sono un hacker, sono un ''programmatore''!&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''804 - Mappable Blind SQL Injections explained''' &amp;lt;small&amp;gt;- Francesco `ascii` Ongaro, Antonio `s4tan` Parata &amp;lt;/small&amp;gt; === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''804 - Mappable Blind SQL Injections explained''' &amp;lt;small&amp;gt;- Francesco `ascii` Ongaro, Antonio `s4tan` Parata &amp;lt;/small&amp;gt; === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key www-wiki:diff:version:1.11a:oldid:4708:newid:6551 --&gt;
&lt;/table&gt;</summary>
		<author><name>94.93.150.247</name></author>	</entry>

	<entry>
		<id>https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=4708&amp;oldid=prev</id>
		<title>Se: /* Seminari &amp; Talk */</title>
		<link rel="alternate" type="text/html" href="https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=4708&amp;oldid=prev"/>
				<updated>2008-09-14T18:22:28Z</updated>
		
		<summary type="html">&lt;p&gt;‎&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Seminari &amp;amp; Talk&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr style='vertical-align: top;'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 18:22, 14 September 2008&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 3:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 3:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Seminari &amp;amp; Talk ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Seminari &amp;amp; Talk ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Ecco l'elenco e l'eventuale descrizione degli interventi, per conoscerne la collocazione vai alla pagina [[ESC08-Programma | &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Programma&lt;/del&gt;]] :)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Ecco l'elenco e l'eventuale descrizione degli interventi, per conoscerne la collocazione &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;nel tempo &lt;/ins&gt;vai alla pagina &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt;&lt;/ins&gt;[[ESC08-Programma | &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;PROGRAMMA&lt;/ins&gt;]]&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;/small&amp;gt; &lt;/ins&gt;:)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''801 - RadioMobile For Dummies''' &amp;lt;small&amp;gt;- PHCV &amp;lt; m.pietravalle@flycommunications.net &amp;gt; &amp;lt;/small&amp;gt; === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''801 - RadioMobile For Dummies''' &amp;lt;small&amp;gt;- PHCV &amp;lt; m.pietravalle@flycommunications.net &amp;gt; &amp;lt;/small&amp;gt; === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key www-wiki:diff:version:1.11a:oldid:4662:newid:4708 --&gt;
&lt;/table&gt;</summary>
		<author><name>Se</name></author>	</entry>

	<entry>
		<id>https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=4662&amp;oldid=prev</id>
		<title>Se at 16:59, 14 September 2008</title>
		<link rel="alternate" type="text/html" href="https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=4662&amp;oldid=prev"/>
				<updated>2008-09-14T16:59:36Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr style='vertical-align: top;'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 16:59, 14 September 2008&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{ESC08-Navigation}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Seminari &amp;amp; Talk ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Seminari &amp;amp; Talk ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key www-wiki:diff:version:1.11a:oldid:4648:newid:4662 --&gt;
&lt;/table&gt;</summary>
		<author><name>Se</name></author>	</entry>

	<entry>
		<id>https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=4648&amp;oldid=prev</id>
		<title>Se: /* Seminari &amp; Talk */</title>
		<link rel="alternate" type="text/html" href="https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=4648&amp;oldid=prev"/>
				<updated>2008-09-14T16:35:03Z</updated>
		
		<summary type="html">&lt;p&gt;‎&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Seminari &amp;amp; Talk&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr style='vertical-align: top;'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 16:35, 14 September 2008&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 3:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 3:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Ecco l'elenco e l'eventuale descrizione degli interventi, per conoscerne la collocazione vai alla pagina [[ESC08-Programma | Programma]] :)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Ecco l'elenco e l'eventuale descrizione degli interventi, per conoscerne la collocazione vai alla pagina [[ESC08-Programma | Programma]] :)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''801 - RadioMobile For Dummies''' - PHCV &amp;lt; m.pietravalle@flycommunications.net &amp;gt; === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''801 - RadioMobile For Dummies''' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt;&lt;/ins&gt;- PHCV &amp;lt; m.pietravalle@flycommunications.net &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;gt; &amp;lt;/small&lt;/ins&gt;&amp;gt; === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Breve introduzione sulle onde radio e loro propagazione in base alle varie bande;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Breve introduzione sulle onde radio e loro propagazione in base alle varie bande;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Introduzione a radiomobile, pratico tool gratuito per l'analisi di tratte radio, installazione, configurazione base, qualche esempio di analisi di tratta punto-punto e prova di analisi compertura omnidirezionale a varie frequenze; (to be completed)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Introduzione a radiomobile, pratico tool gratuito per l'analisi di tratte radio, installazione, configurazione base, qualche esempio di analisi di tratta punto-punto e prova di analisi compertura omnidirezionale a varie frequenze; (to be completed)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''802 - Xen &amp;amp; Zen''' - fabioFVZ === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''802 - Xen &amp;amp; Zen''' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt; &lt;/ins&gt;- fabioFVZ &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;/small&amp;gt; &lt;/ins&gt;=== &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Panoramica sulle varie tipologie di virtualizzazione lato server. Pregi e difetti.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Panoramica sulle varie tipologie di virtualizzazione lato server. Pregi e difetti.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Approfondimento del sistema OpenSource Xen. Storia, installazione, configurazione. PV/HVM, Clustering. Come avere un datacenter dentro un PC. :)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Approfondimento del sistema OpenSource Xen. Storia, installazione, configurazione. PV/HVM, Clustering. Come avere un datacenter dentro un PC. :)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''803 - Tutto quello che avreste voluto sapere su XUL e XPCOM (ma xulplanet.com era giù)''' - Hackbunny === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''803 - Tutto quello che avreste voluto sapere su XUL e XPCOM (ma xulplanet.com era giù)''' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt; &lt;/ins&gt;- Hackbunny &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;/small&amp;gt;&lt;/ins&gt;=== &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Quando ho iniziato questo lavoro, mai avrei potuto immaginare che per sviluppare un client di posta personalizzato basato su Thunderbird avrei dovuto imparare come hookare funzioni e oggetti Javascript, sostituire al volo componenti XPCOM, scrivere overlay XUL e binding XBL, scrivere script che premessero automaticamente &amp;quot;OK&amp;quot; nelle finestre di messaggio... ci dev'essere un malinteso! io non sono un hacker, sono un ''programmatore''!&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Quando ho iniziato questo lavoro, mai avrei potuto immaginare che per sviluppare un client di posta personalizzato basato su Thunderbird avrei dovuto imparare come hookare funzioni e oggetti Javascript, sostituire al volo componenti XPCOM, scrivere overlay XUL e binding XBL, scrivere script che premessero automaticamente &amp;quot;OK&amp;quot; nelle finestre di messaggio... ci dev'essere un malinteso! io non sono un hacker, sono un ''programmatore''!&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''804 - Mappable Blind SQL Injections explained''' - Francesco `ascii` Ongaro, Antonio `s4tan` Parata === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''804 - Mappable Blind SQL Injections explained''' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt;&lt;/ins&gt;- Francesco `ascii` Ongaro, Antonio `s4tan` Parata &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;/small&amp;gt; &lt;/ins&gt;=== &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Verra' spiegato in dettaglio il funzionamento di una tecnica scoperta da Stefano `wisec` Di Paola nell'Ottobre 2007. La Mappable SQLi e' una tecnica di exploiting delle Blind SQLi che permette di confrontare un valore con una mappa di N elementi, permettendone l'identificazione in maniera ottimizzata rispetto ai classici test true/false. Puoi approfondire l'argomento consultando l'articolo originale di wisec [[http://www.wisec.it/sectou.php?id=4706611fe9210 Optimizing the number of requests in blind SQL injection]].&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Verra' spiegato in dettaglio il funzionamento di una tecnica scoperta da Stefano `wisec` Di Paola nell'Ottobre 2007. La Mappable SQLi e' una tecnica di exploiting delle Blind SQLi che permette di confrontare un valore con una mappa di N elementi, permettendone l'identificazione in maniera ottimizzata rispetto ai classici test true/false. Puoi approfondire l'argomento consultando l'articolo originale di wisec [[http://www.wisec.it/sectou.php?id=4706611fe9210 Optimizing the number of requests in blind SQL injection]].&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''805 - Bakeca.it DDos: how evil forces have been defeated''' - Alessio L.R. &amp;quot;mayhem&amp;quot; Pennasilico &amp;amp;&amp;amp; fabioFVZ === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''805 - Bakeca.it DDos: how evil forces have been defeated''' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt;&lt;/ins&gt;- Alessio L.R. &amp;quot;mayhem&amp;quot; Pennasilico &amp;amp;&amp;amp; fabioFVZ &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;/small&amp;gt; &lt;/ins&gt;=== &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Per 600 USD a settimana la vostra webfarm potrebbe essere resa inutilizzabile da chiunque. Come difendersi con qualche macchina, OpenBSD ed un po' di scripting ...&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Per 600 USD a settimana la vostra webfarm potrebbe essere resa inutilizzabile da chiunque. Come difendersi con qualche macchina, OpenBSD ed un po' di scripting ...&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''806 - Introduzione all'analisi dei malware''' - ocean === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''806 - Introduzione all'analisi dei malware''' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt; &lt;/ins&gt;- ocean &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;/small&amp;gt; &lt;/ins&gt;=== &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;L'analisi dei malware risulta di interesse non solo per i ricercatori, e gli esperti di sicurezza, anche&amp;#160; gli amministratori di sistema e chiunque sia responsabile della gestione di sistemi informatici. Bisogna essere in grado di utilizzare gli strumenti adatti per poter comprendere a fondo i rischi associati ai malware, analizzare i sistemi compromessi e sviluppare strategie di difesa effettive. Verranno presentati strumenti e tecniche usati per analizzare codice ostile. Una breve introduzione all'assembly, al formato pe, trick antidebug e unpacking. Infine verra'&amp;#160; effettuata l'analisi di un malware.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;L'analisi dei malware risulta di interesse non solo per i ricercatori, e gli esperti di sicurezza, anche&amp;#160; gli amministratori di sistema e chiunque sia responsabile della gestione di sistemi informatici. Bisogna essere in grado di utilizzare gli strumenti adatti per poter comprendere a fondo i rischi associati ai malware, analizzare i sistemi compromessi e sviluppare strategie di difesa effettive. Verranno presentati strumenti e tecniche usati per analizzare codice ostile. Una breve introduzione all'assembly, al formato pe, trick antidebug e unpacking. Infine verra'&amp;#160; effettuata l'analisi di un malware.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''807 - vserver security''' - malveo === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''807 - vserver security''' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt;&lt;/ins&gt;- malveo &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;/small&amp;gt; &lt;/ins&gt;=== &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;''aggiungere abstract''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;''aggiungere abstract''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''808 - XPath Injection''' - Alessandro `jekil` Tanasi ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''808 - XPath Injection''' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt;&lt;/ins&gt;- Alessandro `jekil` Tanasi&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;/small&amp;gt; &lt;/ins&gt;===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Rappresentazione dei dati in formato XML e tecnologie per la loro estrapolazione. Vecchi errori di validazione degli input proveniente da buoni e cattivi utenti. Scopriamo cosa e` XPath e come si puo` realizzare e sfruttare un'XPath Injection.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Rappresentazione dei dati in formato XML e tecnologie per la loro estrapolazione. Vecchi errori di validazione degli input proveniente da buoni e cattivi utenti. Scopriamo cosa e` XPath e come si puo` realizzare e sfruttare un'XPath Injection.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''809 - AES: Perchè è da buttare. Ciò che nessuno ha capito da Bernstein io ve lo spiego.''' - Accatron === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== '''809 - AES: Perchè è da buttare. Ciò che nessuno ha capito da Bernstein io ve lo spiego.''' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt;&lt;/ins&gt;- Accatron&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;/small&amp;gt; &lt;/ins&gt;=== &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Presentazione e spiegazione del documento di Daniel J. Bernstein &amp;quot;AES Cachetiming Attack&amp;quot; dove viene matematicamente e informaticamente dimostrato che l'attuale AES è vulnerabile ad un attacco di tipo side channel(recovery di una key a 128bit in 24 ore con un pentium III 850Mhz) indipendentemente dall'implementazione in quanto il bug è insito nell'algoritmo stesso. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Presentazione e spiegazione del documento di Daniel J. Bernstein &amp;quot;AES Cachetiming Attack&amp;quot; dove viene matematicamente e informaticamente dimostrato che l'attuale AES è vulnerabile ad un attacco di tipo side channel(recovery di una key a 128bit in 24 ore con un pentium III 850Mhz) indipendentemente dall'implementazione in quanto il bug è insito nell'algoritmo stesso. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''810 - Archittetura e Progettazione con i microcontrollers''' - Ulisse@HGComo === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''810 - Archittetura e Progettazione con i microcontrollers''' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt;&lt;/ins&gt;- Ulisse@HGComo &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;/small&amp;gt; &lt;/ins&gt;=== &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Un Talking relativo a quei dispositivi che collegano l'informatica all'elettronica: i microcontrollers.&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Un Talking relativo a quei dispositivi che collegano l'informatica all'elettronica: i microcontrollers.&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;- Architettura delle principali famiglie e relativo funzionamento.&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;- Architettura delle principali famiglie e relativo funzionamento.&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 43:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 43:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Powered by: Ulisse @ [[http://www.hgcomo.org Hacking Group Como]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Powered by: Ulisse @ [[http://www.hgcomo.org Hacking Group Como]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''Riserva - Crittografia Avanzata''' - Accatron === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''Riserva - Crittografia Avanzata''' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;small&amp;gt;&lt;/ins&gt;- Accatron&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;/small&amp;gt; &lt;/ins&gt;=== &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Attacchi vecchi e nuovi agli algoritmi crittografici e concetti per il disegno di un algoritmo crittografico. All'interno del talk verranno passati in rassegna tutti gli attacchi agli algoritmi crittografici esistenti(sia a crittografia simmetrica che asimmetrica), e verranno spiegati la maggior parte dei concetti che i crittografi utilizzano per il disegno di un algoritmo crittografico.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Attacchi vecchi e nuovi agli algoritmi crittografici e concetti per il disegno di un algoritmo crittografico. All'interno del talk verranno passati in rassegna tutti gli attacchi agli algoritmi crittografici esistenti(sia a crittografia simmetrica che asimmetrica), e verranno spiegati la maggior parte dei concetti che i crittografi utilizzano per il disegno di un algoritmo crittografico.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;__NOTOC__&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;__NOTOC__&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key www-wiki:diff:version:1.11a:oldid:4646:newid:4648 --&gt;
&lt;/table&gt;</summary>
		<author><name>Se</name></author>	</entry>

	<entry>
		<id>https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=4646&amp;oldid=prev</id>
		<title>Se at 16:31, 14 September 2008</title>
		<link rel="alternate" type="text/html" href="https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=4646&amp;oldid=prev"/>
				<updated>2008-09-14T16:31:10Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr style='vertical-align: top;'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 16:31, 14 September 2008&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 45:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 45:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''Riserva - Crittografia Avanzata''' - Accatron === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&amp;#160; '''Riserva - Crittografia Avanzata''' - Accatron === &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Attacchi vecchi e nuovi agli algoritmi crittografici e concetti per il disegno di un algoritmo crittografico. All'interno del talk verranno passati in rassegna tutti gli attacchi agli algoritmi crittografici esistenti(sia a crittografia simmetrica che asimmetrica), e verranno spiegati la maggior parte dei concetti che i crittografi utilizzano per il disegno di un algoritmo crittografico.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Attacchi vecchi e nuovi agli algoritmi crittografici e concetti per il disegno di un algoritmo crittografico. All'interno del talk verranno passati in rassegna tutti gli attacchi agli algoritmi crittografici esistenti(sia a crittografia simmetrica che asimmetrica), e verranno spiegati la maggior parte dei concetti che i crittografi utilizzano per il disegno di un algoritmo crittografico.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;__NOTOC__&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key www-wiki:diff:version:1.11a:oldid:4645:newid:4646 --&gt;
&lt;/table&gt;</summary>
		<author><name>Se</name></author>	</entry>

	<entry>
		<id>https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=4645&amp;oldid=prev</id>
		<title>Se at 16:30, 14 September 2008</title>
		<link rel="alternate" type="text/html" href="https://www.endsummercamp.org/index.php?title=ESC08-Talks&amp;diff=4645&amp;oldid=prev"/>
				<updated>2008-09-14T16:30:51Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Seminari &amp;amp; Talk ==&lt;br /&gt;
&lt;br /&gt;
Ecco l'elenco e l'eventuale descrizione degli interventi, per conoscerne la collocazione vai alla pagina [[ESC08-Programma | Programma]] :)&lt;br /&gt;
&lt;br /&gt;
=== '''801 - RadioMobile For Dummies''' - PHCV &amp;lt; m.pietravalle@flycommunications.net &amp;gt; === &lt;br /&gt;
Breve introduzione sulle onde radio e loro propagazione in base alle varie bande;&lt;br /&gt;
Introduzione a radiomobile, pratico tool gratuito per l'analisi di tratte radio, installazione, configurazione base, qualche esempio di analisi di tratta punto-punto e prova di analisi compertura omnidirezionale a varie frequenze; (to be completed)&lt;br /&gt;
&lt;br /&gt;
=== '''802 - Xen &amp;amp; Zen''' - fabioFVZ === &lt;br /&gt;
Panoramica sulle varie tipologie di virtualizzazione lato server. Pregi e difetti.&lt;br /&gt;
Approfondimento del sistema OpenSource Xen. Storia, installazione, configurazione. PV/HVM, Clustering. Come avere un datacenter dentro un PC. :)&lt;br /&gt;
&lt;br /&gt;
=== '''803 - Tutto quello che avreste voluto sapere su XUL e XPCOM (ma xulplanet.com era giù)''' - Hackbunny === &lt;br /&gt;
Quando ho iniziato questo lavoro, mai avrei potuto immaginare che per sviluppare un client di posta personalizzato basato su Thunderbird avrei dovuto imparare come hookare funzioni e oggetti Javascript, sostituire al volo componenti XPCOM, scrivere overlay XUL e binding XBL, scrivere script che premessero automaticamente &amp;quot;OK&amp;quot; nelle finestre di messaggio... ci dev'essere un malinteso! io non sono un hacker, sono un ''programmatore''!&lt;br /&gt;
&lt;br /&gt;
===  '''804 - Mappable Blind SQL Injections explained''' - Francesco `ascii` Ongaro, Antonio `s4tan` Parata === &lt;br /&gt;
&lt;br /&gt;
Verra' spiegato in dettaglio il funzionamento di una tecnica scoperta da Stefano `wisec` Di Paola nell'Ottobre 2007. La Mappable SQLi e' una tecnica di exploiting delle Blind SQLi che permette di confrontare un valore con una mappa di N elementi, permettendone l'identificazione in maniera ottimizzata rispetto ai classici test true/false. Puoi approfondire l'argomento consultando l'articolo originale di wisec [[http://www.wisec.it/sectou.php?id=4706611fe9210 Optimizing the number of requests in blind SQL injection]].&lt;br /&gt;
&lt;br /&gt;
===  '''805 - Bakeca.it DDos: how evil forces have been defeated''' - Alessio L.R. &amp;quot;mayhem&amp;quot; Pennasilico &amp;amp;&amp;amp; fabioFVZ === &lt;br /&gt;
&lt;br /&gt;
Per 600 USD a settimana la vostra webfarm potrebbe essere resa inutilizzabile da chiunque. Come difendersi con qualche macchina, OpenBSD ed un po' di scripting ...&lt;br /&gt;
&lt;br /&gt;
===  '''806 - Introduzione all'analisi dei malware''' - ocean === &lt;br /&gt;
L'analisi dei malware risulta di interesse non solo per i ricercatori, e gli esperti di sicurezza, anche  gli amministratori di sistema e chiunque sia responsabile della gestione di sistemi informatici. Bisogna essere in grado di utilizzare gli strumenti adatti per poter comprendere a fondo i rischi associati ai malware, analizzare i sistemi compromessi e sviluppare strategie di difesa effettive. Verranno presentati strumenti e tecniche usati per analizzare codice ostile. Una breve introduzione all'assembly, al formato pe, trick antidebug e unpacking. Infine verra'  effettuata l'analisi di un malware.&lt;br /&gt;
&lt;br /&gt;
===  '''807 - vserver security''' - malveo === &lt;br /&gt;
''aggiungere abstract''&lt;br /&gt;
&lt;br /&gt;
=== '''808 - XPath Injection''' - Alessandro `jekil` Tanasi ===&lt;br /&gt;
Rappresentazione dei dati in formato XML e tecnologie per la loro estrapolazione. Vecchi errori di validazione degli input proveniente da buoni e cattivi utenti. Scopriamo cosa e` XPath e come si puo` realizzare e sfruttare un'XPath Injection.&lt;br /&gt;
&lt;br /&gt;
=== '''809 - AES: Perchè è da buttare. Ciò che nessuno ha capito da Bernstein io ve lo spiego.''' - Accatron === &lt;br /&gt;
Presentazione e spiegazione del documento di Daniel J. Bernstein &amp;quot;AES Cachetiming Attack&amp;quot; dove viene matematicamente e informaticamente dimostrato che l'attuale AES è vulnerabile ad un attacco di tipo side channel(recovery di una key a 128bit in 24 ore con un pentium III 850Mhz) indipendentemente dall'implementazione in quanto il bug è insito nell'algoritmo stesso. &lt;br /&gt;
&lt;br /&gt;
===  '''810 - Archittetura e Progettazione con i microcontrollers''' - Ulisse@HGComo === &lt;br /&gt;
Un Talking relativo a quei dispositivi che collegano l'informatica all'elettronica: i microcontrollers.&amp;lt;br&amp;gt;&lt;br /&gt;
- Architettura delle principali famiglie e relativo funzionamento.&amp;lt;br&amp;gt;&lt;br /&gt;
- Programmazione dei uControllers PIC (microchip) ed AVR (Atmel) in diversi linguaggi.&amp;lt;br&amp;gt;&lt;br /&gt;
- Interfacciamento a sensori, motori, relè etc etc con dimostrazioni interattive pratiche.&amp;lt;br&amp;gt;&lt;br /&gt;
- uControllers &amp;amp;&amp;amp; PC come far dialogare questi due signori.&amp;lt;br&amp;gt;&lt;br /&gt;
- Realizzaizone di circuiti di esempio contando sulla vostra partecipazione attiva e la disponibilità del relativo laboratorio dove si possono effettuare test su un robot apposito.&amp;lt;br&amp;gt;&lt;br /&gt;
Powered by: Ulisse @ [[http://www.hgcomo.org Hacking Group Como]]&lt;br /&gt;
&lt;br /&gt;
===  '''Riserva - Crittografia Avanzata''' - Accatron === &lt;br /&gt;
Attacchi vecchi e nuovi agli algoritmi crittografici e concetti per il disegno di un algoritmo crittografico. All'interno del talk verranno passati in rassegna tutti gli attacchi agli algoritmi crittografici esistenti(sia a crittografia simmetrica che asimmetrica), e verranno spiegati la maggior parte dei concetti che i crittografi utilizzano per il disegno di un algoritmo crittografico.&lt;/div&gt;</summary>
		<author><name>Se</name></author>	</entry>

	</feed>