{"id":1485,"date":"2005-06-24T16:59:16","date_gmt":"2005-06-24T14:59:16","guid":{"rendered":"https:\/\/www.fullo.net\/blog\/index.php\/archives\/2005\/06\/24\/insecurity-magazine-n2\/"},"modified":"2005-06-24T16:59:16","modified_gmt":"2005-06-24T14:59:16","slug":"insecurity-magazine-n2","status":"publish","type":"post","link":"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/","title":{"rendered":"insecurity magazine n.2"},"content":{"rendered":"<p>\u00e8 uscito il secondo numero di <a href=\"http:\/\/insecuremag.com\/\">insecurity magazine<\/a>, tra gli articoli:<\/p>\n<blockquote>\n<ul>\n<li>Advanced PHP security \u2013 vulnerability containment<\/li>\n<li>Web applications worms \u2013 the next Internet infestation<\/li>\n<li>What you need to know before migrating your applications to the Web<\/li>\n<li>Information security in campus and open environments<\/li>\n<li>Integrating automated patch and vulnerability management into an enterprise-wide environment<\/li>\n<li>Protecting an organization\u2019s public information<\/li>\n<li>Application security: the noveau blame game<\/li>\n<li>Clear cut cryptography<\/li>\n<li>How to lock down enterprise data with infrastructure services<\/li>\n<\/ul>\n<\/blockquote>\n<p>ciuaz<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00e8 uscito il secondo numero di insecurity magazine, tra gli articoli: Advanced PHP security \u2013 vulnerability containment Web applications worms \u2013 the next Internet infestation What you need to know before migrating your applications to the Web Information security in campus and open environments Integrating automated patch and vulnerability management into an enterprise-wide environment Protecting [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5],"tags":[278,2248,307],"class_list":["post-1485","post","type-post","status-publish","format-standard","hentry","category-tecnologia","tag-magazine","tag-php","tag-sicurezza"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>insecurity magazine n.2 - Fullo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"insecurity magazine n.2 - Fullo\" \/>\n<meta property=\"og:description\" content=\"\u00e8 uscito il secondo numero di insecurity magazine, tra gli articoli: Advanced PHP security \u2013 vulnerability containment Web applications worms \u2013 the next Internet infestation What you need to know before migrating your applications to the Web Information security in campus and open environments Integrating automated patch and vulnerability management into an enterprise-wide environment Protecting [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/\" \/>\n<meta property=\"og:site_name\" content=\"Fullo\" \/>\n<meta property=\"article:published_time\" content=\"2005-06-24T14:59:16+00:00\" \/>\n<meta name=\"author\" content=\"Francesco Fullone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fullo\" \/>\n<meta name=\"twitter:site\" content=\"@fullo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francesco Fullone\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/06\\\/24\\\/insecurity-magazine-n2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/06\\\/24\\\/insecurity-magazine-n2\\\/\"},\"author\":{\"name\":\"Francesco Fullone\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"headline\":\"insecurity magazine n.2\",\"datePublished\":\"2005-06-24T14:59:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/06\\\/24\\\/insecurity-magazine-n2\\\/\"},\"wordCount\":79,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"keywords\":[\"magazine\",\"php\",\"sicurezza\"],\"articleSection\":[\"tecnologia\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/06\\\/24\\\/insecurity-magazine-n2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/06\\\/24\\\/insecurity-magazine-n2\\\/\",\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/06\\\/24\\\/insecurity-magazine-n2\\\/\",\"name\":\"insecurity magazine n.2 - Fullo\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#website\"},\"datePublished\":\"2005-06-24T14:59:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/06\\\/24\\\/insecurity-magazine-n2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/06\\\/24\\\/insecurity-magazine-n2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/06\\\/24\\\/insecurity-magazine-n2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"insecurity magazine n.2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/\",\"name\":\"Fullo\",\"description\":\"nulla e&#039; impossibile per chi non lo deve fare!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\",\"name\":\"Francesco Fullone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"width\":622,\"height\":622,\"caption\":\"Francesco Fullone\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/www.fullo.net\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/fullo\",\"https:\\\/\\\/x.com\\\/fullo\"],\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/author\\\/fullo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"insecurity magazine n.2 - Fullo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/","og_locale":"en_US","og_type":"article","og_title":"insecurity magazine n.2 - Fullo","og_description":"\u00e8 uscito il secondo numero di insecurity magazine, tra gli articoli: Advanced PHP security \u2013 vulnerability containment Web applications worms \u2013 the next Internet infestation What you need to know before migrating your applications to the Web Information security in campus and open environments Integrating automated patch and vulnerability management into an enterprise-wide environment Protecting [&hellip;]","og_url":"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/","og_site_name":"Fullo","article_published_time":"2005-06-24T14:59:16+00:00","author":"Francesco Fullone","twitter_card":"summary_large_image","twitter_creator":"@fullo","twitter_site":"@fullo","twitter_misc":{"Written by":"Francesco Fullone"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/#article","isPartOf":{"@id":"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/"},"author":{"name":"Francesco Fullone","@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"headline":"insecurity magazine n.2","datePublished":"2005-06-24T14:59:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/"},"wordCount":79,"commentCount":0,"publisher":{"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"keywords":["magazine","php","sicurezza"],"articleSection":["tecnologia"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/","url":"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/","name":"insecurity magazine n.2 - Fullo","isPartOf":{"@id":"https:\/\/www.fullo.net\/blog\/#website"},"datePublished":"2005-06-24T14:59:16+00:00","breadcrumb":{"@id":"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fullo.net\/blog\/2005\/06\/24\/insecurity-magazine-n2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fullo.net\/blog\/"},{"@type":"ListItem","position":2,"name":"insecurity magazine n.2"}]},{"@type":"WebSite","@id":"https:\/\/www.fullo.net\/blog\/#website","url":"https:\/\/www.fullo.net\/blog\/","name":"Fullo","description":"nulla e&#039; impossibile per chi non lo deve fare!","publisher":{"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fullo.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c","name":"Francesco Fullone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","url":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","width":622,"height":622,"caption":"Francesco Fullone"},"logo":{"@id":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1"},"sameAs":["http:\/\/www.fullo.net","https:\/\/www.linkedin.com\/in\/fullo","https:\/\/x.com\/fullo"],"url":"https:\/\/www.fullo.net\/blog\/author\/fullo\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OSc1-nX","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":667,"url":"https:\/\/www.fullo.net\/blog\/2004\/01\/16\/phplinks-carthag\/","url_meta":{"origin":1485,"position":0},"title":"php::Links(&#8216; carthag &#8216; );","author":"Francesco Fullone","date":"16\/01\/2004","format":false,"excerpt":"Dopo l'ottimo Ampoliros i ragazzi dell'italianissima Solarix hanno creato un nuovo framework in php: Carthag is an open source applications platform written in PHP 5, making full use of the new language features. Being distributed with the GPL license, Carthag is free to use and distribute. Carthag's main purpose is\u2026","rel":"","context":"In &quot;tecnologia&quot;","block_context":{"text":"tecnologia","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1420,"url":"https:\/\/www.fullo.net\/blog\/2005\/05\/28\/wp-1512-security-update\/","url_meta":{"origin":1485,"position":1},"title":"wp 1.5.1.2 security update","author":"Francesco Fullone","date":"28\/05\/2005","format":false,"excerpt":"\u00e8 stata rilasciata una security update per wordpress: It has come to our attention that under certain circumstances there is a security vulnerability in WordPress that may be triggered if you\u2019re running the default template. We were able to respond very quickly (under 40 minutes) and update the download to\u2026","rel":"","context":"In &quot;php&quot;","block_context":{"text":"php","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/php\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1418,"url":"https:\/\/www.fullo.net\/blog\/2005\/05\/26\/phparchitect-di-maggio-e-corso-di-ajax\/","url_meta":{"origin":1485,"position":2},"title":"php|architect di maggio e corso di ajax","author":"Francesco Fullone","date":"26\/05\/2005","format":false,"excerpt":"ho appena finito di seguire il corso di php|architect su php e ajax tenuto da joshua eichorn, niente di nuovo o eclatante: una spiegazione di base sulla tecnologia, l'introduzione all'uso della libreria jpspan con qualche piccolo esempio di utilizzo e due\/tre suggerimenti su come debuggare il proprio codice. ne approfitto\u2026","rel":"","context":"In &quot;ajax&quot;","block_context":{"text":"ajax","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/ajax\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1251,"url":"https:\/\/www.fullo.net\/blog\/2005\/02\/05\/phpsec\/","url_meta":{"origin":1485,"position":3},"title":"php|sec","author":"Francesco Fullone","date":"05\/02\/2005","format":false,"excerpt":"dopo la mailing list promossa da php|architect nasce il PHP Security Consortium, che si occuper\u00e0 di fare formazione e redigere documenti sulla sicurezza delle applicazioni scritte in php. NEW YORK, NY - January 31, 2005 - An international group of PHP experts today announced the official launch of the PHP\u2026","rel":"","context":"In &quot;php&quot;","block_context":{"text":"php","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/php\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1842,"url":"https:\/\/www.fullo.net\/blog\/2006\/01\/12\/php-512\/","url_meta":{"origin":1485,"position":4},"title":"php 5.1.2","author":"Francesco Fullone","date":"12\/01\/2006","format":false,"excerpt":"Rilasciato php 5.1.2: the PHP development team is proud to announce the release of PHP 5.1.2. This release combines small feature enhancements with a fair number of bug fixes and addresses three security issues. All PHP 5 users are encouraged to upgrade to this release. Some of the key changes\u2026","rel":"","context":"In &quot;php&quot;","block_context":{"text":"php","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/php\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1312,"url":"https:\/\/www.fullo.net\/blog\/2005\/03\/22\/phparchitect-marzo-2\/","url_meta":{"origin":1485,"position":5},"title":"php|architect marzo","author":"Francesco Fullone","date":"22\/03\/2005","format":false,"excerpt":"\u00e8 uscito il numero di marzo! meglio tardi che mai... Crunching Data with PHP There are various file formats to archive, pack, zip or crunch data. PHP supports many of them, in different ways: using external PHP scripts, PEAR packages or PHP extensions. In this article, author Christian Wenz explores\u2026","rel":"","context":"In &quot;php&quot;","block_context":{"text":"php","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/php\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts\/1485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/comments?post=1485"}],"version-history":[{"count":0,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts\/1485\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/media?parent=1485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/categories?post=1485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/tags?post=1485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}