<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Fullo</provider_name><provider_url>https://www.fullo.net/blog</provider_url><author_name>Francesco Fullone</author_name><author_url>https://www.fullo.net/blog/author/fullo/</author_url><title>insecurity magazine n.2 - Fullo</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="bSOznP8PLQ"&gt;&lt;a href="https://www.fullo.net/blog/2005/06/24/insecurity-magazine-n2/"&gt;insecurity magazine n.2&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.fullo.net/blog/2005/06/24/insecurity-magazine-n2/embed/#?secret=bSOznP8PLQ" width="600" height="338" title="&#x201C;insecurity magazine n.2&#x201D; &#x2014; Fullo" data-secret="bSOznP8PLQ" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.fullo.net/blog/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>&#xE8; uscito il secondo numero di insecurity magazine, tra gli articoli: Advanced PHP security &#x2013; vulnerability containment Web applications worms &#x2013; the next Internet infestation What you need to know before migrating your applications to the Web Information security in campus and open environments Integrating automated patch and vulnerability management into an enterprise-wide environment Protecting [&hellip;]</description></oembed>
