{"id":1798,"date":"2005-12-03T19:33:01","date_gmt":"2005-12-03T17:33:01","guid":{"rendered":"https:\/\/www.fullo.net\/blog\/archives\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/"},"modified":"2005-12-03T19:33:01","modified_gmt":"2005-12-03T17:33:01","slug":"intervista-sulla-programmazione-sicura-in-php","status":"publish","type":"post","link":"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/","title":{"rendered":"Intervista sulla programmazione sicura in php"},"content":{"rendered":"<p>Sono stato intervistato da <a href=\"http:\/\/www.isacaroma.it\/\">ISACA<\/a> a riguardo del talk tenuto durante il Security Day di Cesena. Il testo integrale lo <a href=\"http:\/\/www.isacaroma.it\/html\/newsletter\/?q=node\/121\">trovate qui<\/a>.<\/p>\n<p>ciuaz<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sono stato intervistato da ISACA a riguardo del talk tenuto durante il Security Day di Cesena. Il testo integrale lo trovate qui. ciuaz<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[4,9],"tags":[906,2248,907,908,307,909],"class_list":["post-1798","post","type-post","status-publish","format-standard","hentry","category-pensieri","category-php","tag-intervista","tag-php","tag-programmazione-sicura","tag-security-day","tag-sicurezza","tag-talk"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intervista sulla programmazione sicura in php - Fullo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intervista sulla programmazione sicura in php - Fullo\" \/>\n<meta property=\"og:description\" content=\"Sono stato intervistato da ISACA a riguardo del talk tenuto durante il Security Day di Cesena. Il testo integrale lo trovate qui. ciuaz\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/\" \/>\n<meta property=\"og:site_name\" content=\"Fullo\" \/>\n<meta property=\"article:published_time\" content=\"2005-12-03T17:33:01+00:00\" \/>\n<meta name=\"author\" content=\"Francesco Fullone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fullo\" \/>\n<meta name=\"twitter:site\" content=\"@fullo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francesco Fullone\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/12\\\/03\\\/intervista-sulla-programmazione-sicura-in-php\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/12\\\/03\\\/intervista-sulla-programmazione-sicura-in-php\\\/\"},\"author\":{\"name\":\"Francesco Fullone\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"headline\":\"Intervista sulla programmazione sicura in php\",\"datePublished\":\"2005-12-03T17:33:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/12\\\/03\\\/intervista-sulla-programmazione-sicura-in-php\\\/\"},\"wordCount\":29,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"keywords\":[\"intervista\",\"php\",\"programmazione sicura\",\"security day\",\"sicurezza\",\"talk\"],\"articleSection\":[\"pensieri\",\"php\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/12\\\/03\\\/intervista-sulla-programmazione-sicura-in-php\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/12\\\/03\\\/intervista-sulla-programmazione-sicura-in-php\\\/\",\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/12\\\/03\\\/intervista-sulla-programmazione-sicura-in-php\\\/\",\"name\":\"Intervista sulla programmazione sicura in php - Fullo\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#website\"},\"datePublished\":\"2005-12-03T17:33:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/12\\\/03\\\/intervista-sulla-programmazione-sicura-in-php\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/12\\\/03\\\/intervista-sulla-programmazione-sicura-in-php\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2005\\\/12\\\/03\\\/intervista-sulla-programmazione-sicura-in-php\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intervista sulla programmazione sicura in php\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/\",\"name\":\"Fullo\",\"description\":\"nulla e&#039; impossibile per chi non lo deve fare!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\",\"name\":\"Francesco Fullone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"width\":622,\"height\":622,\"caption\":\"Francesco Fullone\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/www.fullo.net\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/fullo\",\"https:\\\/\\\/x.com\\\/fullo\"],\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/author\\\/fullo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intervista sulla programmazione sicura in php - Fullo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/","og_locale":"en_US","og_type":"article","og_title":"Intervista sulla programmazione sicura in php - Fullo","og_description":"Sono stato intervistato da ISACA a riguardo del talk tenuto durante il Security Day di Cesena. Il testo integrale lo trovate qui. ciuaz","og_url":"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/","og_site_name":"Fullo","article_published_time":"2005-12-03T17:33:01+00:00","author":"Francesco Fullone","twitter_card":"summary_large_image","twitter_creator":"@fullo","twitter_site":"@fullo","twitter_misc":{"Written by":"Francesco Fullone"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/#article","isPartOf":{"@id":"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/"},"author":{"name":"Francesco Fullone","@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"headline":"Intervista sulla programmazione sicura in php","datePublished":"2005-12-03T17:33:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/"},"wordCount":29,"commentCount":0,"publisher":{"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"keywords":["intervista","php","programmazione sicura","security day","sicurezza","talk"],"articleSection":["pensieri","php"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/","url":"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/","name":"Intervista sulla programmazione sicura in php - Fullo","isPartOf":{"@id":"https:\/\/www.fullo.net\/blog\/#website"},"datePublished":"2005-12-03T17:33:01+00:00","breadcrumb":{"@id":"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fullo.net\/blog\/2005\/12\/03\/intervista-sulla-programmazione-sicura-in-php\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fullo.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Intervista sulla programmazione sicura in php"}]},{"@type":"WebSite","@id":"https:\/\/www.fullo.net\/blog\/#website","url":"https:\/\/www.fullo.net\/blog\/","name":"Fullo","description":"nulla e&#039; impossibile per chi non lo deve fare!","publisher":{"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fullo.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c","name":"Francesco Fullone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","url":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","width":622,"height":622,"caption":"Francesco Fullone"},"logo":{"@id":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1"},"sameAs":["http:\/\/www.fullo.net","https:\/\/www.linkedin.com\/in\/fullo","https:\/\/x.com\/fullo"],"url":"https:\/\/www.fullo.net\/blog\/author\/fullo\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OSc1-t0","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":88,"url":"https:\/\/www.fullo.net\/blog\/2003\/01\/19\/php-e-programmazione-sicura\/","url_meta":{"origin":1798,"position":0},"title":"php e programmazione sicura","author":"Francesco Fullone","date":"19\/01\/2003","format":false,"excerpt":"Tratto da PHP-ML: A chi interessasse c'e' un breve articoletto su come evitare le 10 vulnerabilita' piu' pericolose nelle applicazioni web usando PHP: http:\/\/www.sklar.com\/page\/article\/owasp-top-ten Ciao IS ciuaz","rel":"","context":"In &quot;tecnologia&quot;","block_context":{"text":"tecnologia","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1516,"url":"https:\/\/www.fullo.net\/blog\/2005\/07\/13\/php-security\/","url_meta":{"origin":1798,"position":1},"title":"php security","author":"Francesco Fullone","date":"13\/07\/2005","format":false,"excerpt":"su Hardened-PHP e sul blog di Shiflett si discute di possibili bug nella guida alla programmazione sicura pubblicata dallo stesso Shiflett per il phpSec Consortium ciuaz","rel":"","context":"In &quot;php&quot;","block_context":{"text":"php","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/php\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1783,"url":"https:\/\/www.fullo.net\/blog\/2005\/11\/25\/spostamento-talk\/","url_meta":{"origin":1798,"position":2},"title":"Spostamento talk&#8230;","author":"Francesco Fullone","date":"25\/11\/2005","format":false,"excerpt":"A tutti i miei fans (8 su orkut...) il mio talk su programmazione sicura in php \u00e8 stato anticipato alle 14.30! ciuaz","rel":"","context":"In &quot;SdI&quot;","block_context":{"text":"SdI","link":"https:\/\/www.fullo.net\/blog\/category\/di-tutto-un-po\/sdi\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2075,"url":"https:\/\/www.fullo.net\/blog\/2006\/10\/09\/securityday-a-cesena\/","url_meta":{"origin":1798,"position":3},"title":"SecurityDay a Cesena","author":"Francesco Fullone","date":"09\/10\/2006","format":false,"excerpt":"Ho finalmente deciso il titolo (ma soprattutto l'argomento) del talk che terr\u00f2 durante il prossimo SecurityDay\/LinuxDay a Cesena. Il talk in questione si intitoler\u00e0 quindi \"Dal tuo sito al mio spam relay, piccole regole di hardening per siti in php\" e continuer\u00e0 il discorso lasciato aperto lo scorso anno, e\u2026","rel":"","context":"In &quot;eventi&quot;","block_context":{"text":"eventi","link":"https:\/\/www.fullo.net\/blog\/category\/eventi\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1564,"url":"https:\/\/www.fullo.net\/blog\/2005\/07\/31\/qualche-articolo-sul-php\/","url_meta":{"origin":1798,"position":4},"title":"Qualche articolo sul php&#8230;","author":"Francesco Fullone","date":"31\/07\/2005","format":false,"excerpt":"Su ONLamp \u00e8 stata pubblicata una guida intitolata The Practicality of OO PHP che descrive alcune best practices per la programmazione OO su php. L'articolo di ONLamp \u00e8 dedicato per lo pi\u00f9 a chi si avvicina per la prima volta a questo metodo di programmazione e quindi non approfondisce molto\u2026","rel":"","context":"In &quot;php&quot;","block_context":{"text":"php","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/php\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1831,"url":"https:\/\/www.fullo.net\/blog\/2005\/12\/30\/php-e-programmazione-fluente\/","url_meta":{"origin":1798,"position":5},"title":"PHP e programmazione fluente","author":"Francesco Fullone","date":"30\/12\/2005","format":false,"excerpt":"Leggo con un certo interesse del nuovo meme di planet-php, cio\u00e8 dell'uso di interfacce fluent. A seguire un piccolo tutorial su come utilizzarle. In cosa consistono le interfaccie fluent? Detto in maniera semplice si tratta del principio di method chaining di linguaggi come SmallTalk che comporta l'esecuzione metodi in cascata\u2026","rel":"","context":"In &quot;php&quot;","block_context":{"text":"php","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/php\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts\/1798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/comments?post=1798"}],"version-history":[{"count":0,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts\/1798\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/media?parent=1798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/categories?post=1798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/tags?post=1798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}