Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

I dati vengono già raccolti per essere decifrati con computer quantistici: cosa succederà quando questi super computer saranno realtà?

📌 Link all'articolo : redhotcyber.com/post/harvest-n…

A cura di Massimo Dionisi

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 RHC Conference 2026: Workshop "Skill On" del pomeriggio di Lunedì 18 Maggio

Di seguito le informazioni sull'evento:

📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop "hands-on" e pomeriggio workshop "skill-on")
📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)
📍Programma: redhotcyber.com/linksSk2L/prog…
📍Iscriviti ai Workshop di lunedì 18 maggio : rhc-conference-2026-workshop.e…

#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Scopri il modello linguistico che sta facendo discutere: privo di restrizioni etiche e con prestazioni sorprendenti, cosa può fare davvero…

📌 Link all'articolo : redhotcyber.com/post/qwen-e-li…

A cura di Carolina Vivianti

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news

reshared this

PDP-11 Lives in Literal Computer Desk Once More


The media in this post is not displayed to visitors. To view it, please log in.

The ikea desk, with the spectrometer on the far left.

When you think of iconic parings, your brain probably goes more to “cookies and milk” than “DEC and Ikea” but after watching [Dave]’s latest on Usagi Electric where he puts a PDP-11 into an Ikea desk, you may rethink that.

The PDP-11 is vintage hardware that actually lived inside of a different desk, once upon a time, serving as the control unit for an FTIR spectrometer. While the lab equipment has thankfully survived the decades, the desk did not and when [Dave] got the unit it was as a pile of parts. He revived it, of course– it’s kind of what he does– but it didn’t get a new desk for years, until his latest shop re-organization.

The one concession to modernity– and missing parts– is using switching power supplies rather than the bulky linear PSU that would have originally powered the unit. It’s a good thing, too, or we have trouble picturing how everything would fit! This particular PDP-11 comes with the high performance vector processing unit in order to crunch those spectrographs, and apparently those chips idle at about 60C, so the desk-case got some decent-sized 120V fans to keep everything cool and running for years to come.

This isn’t the most aesthetic or fanciest case-mod we’ve seen, mostly being made of surplus plywood and scrap metal fittings, but it certainly gets the job done. Given that the PDP-11 has been crammed into every form-factor known to man, from a system-on-a-chip (before anybody really talked about SOCs) to desktop workstations, and of course the hulking cabinets with their iconic blinkenlights-– it’s hard to say that this installation isn’t reasonably authentic, even if it isn’t the original desk.

youtube.com/embed/mG3XGbbvWH8?…


hackaday.com/2026/03/30/pdp-11…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L’intelligenza artificiale rivoluziona lo sviluppo software, ma a quale costo? Velocità e sicurezza sono davvero compatibili…

📌 Link all'articolo : redhotcyber.com/post/allarme-n…

A cura di Silvia Felici

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity

See The Computers That Powered The Voyager Space Program


The media in this post is not displayed to visitors. To view it, please log in.

A Univac 1219 cabinet

Have you ever wanted to see the computers behind the first (and for now only) man-made objects to leave the heliosphere? [Gary Friedman] shows us, with an archived tour of JPL building 230 in the ’80s.

A NASA employee picks up a camcorder and decides to record a tour of the place “before they replace it all with mainframes”. They show us computers that would seem prehistoric compared to anything modern; early Univac and IBM machines whose power is outmatched today by even an ESP32, yet made the Voyager program possible all the way back in 1977. There are countless peripherals to see, from punch card writers to Univac debug panels where you can see the registers, and from impressive cabinets full of computing hardware to the zip-tied hacks “attaching” a small box they call the “NIU”, dangling off the inner wall of the cabinet. And don’t forget the tape drives that are as tall as a refrigerator!

We could go on ad nauseum, nerding out about the computing history, but why don’t you see it for yourself in the video after the break?

youtube.com/embed/T_bqc76_3xU?…

Thanks to [Michael] for the tip!


hackaday.com/2026/03/30/see-th…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Sekoia looks at a new Phishing-as-a-Service platform named EvilTokens that has been spotted running campaigns since February.

The platform is one of the few that can run device-code phishing operations against Microsoft accounts, so expect this to become very popular in the coming months.

blog.sekoia.io/new-widespread-…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The ISO C++ committee has completed work on the C++26 specification of the C++ programming language.

This will be the biggest overhaul to C++ since the 2011 specification.

herbsutter.com/2026/03/29/c26-…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Lorenzo Meacci introduces InsomniacUnwinding, a new technique to hide and sleep malicious code, even from EDR solutions that continuously scan the memory for malicious code

lorenzomeacci.com/unwind-data-…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Trump convenes "God Squad" to override Endangered Species Act, up oil production
Administration wants to exempt all federally regulated offshore oil from protections.
arstechnica.com/tech-policy/20…
Cybersecurity & cyberwarfare ha ricondiviso questo.

CNET is being brought back after the AI articles fiasco

linkedin.com/posts/david-katzm…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Despite losing the US and EU market, Kaspersky reported a record revenue of $836 million last year

kaspersky.ru/about/press-relea…

reshared this

This Front Panel Makes Its Own Clean-Edged Drill Guides


The media in this post is not displayed to visitors. To view it, please log in.

We haven’t seen an instrument panel quite like [bluesyann]’s, which was made by curing UV resin directly onto plywood with the help of a 3D printer and a bit of software work. The result is faintly-raised linework that also makes hand drilling holes both cleaner and more accurate.

The process begins by designing the 2D layout in Inkscape, which has the advantage of letting one work in 1:1 dimensions. A 10 mm diameter circle will print as 10 mm; a nice advantage when designing for physical components. After making the layout one uses OpenSCAD to import the .svg and turn it into a 3D model that’s 0.5 mm tall. That 3D model gets loaded into the resin printer, and the goal is to put it directly onto a sheet of plywood.
A little donut shape makes a drill centering feature, and the surrounding ring keeps the edges of the hole clean.
To do that, [bluesyann] sticks the plywood directly onto the 3D printer’s build platform with double-sided tape. With the plywood taking the place of the usual build surface, the printer can cure resin directly onto its surface. Cleanup still involves washing uncured resin off the board, but it’s nothing a soak in isopropyl alcohol and an old toothbrush can’t take care of.

[bluesyann] has a few tips for getting the best results, and one of our favorites is a way to make drilling holes easier and cleaner. Marking the center of a drill hit with a small donut-shaped feature makes a fantastic centering guide, making hand drilling much more accurate. And adding a thick ring around the drill hole ensures clean edges with no stray wood fibers, so no post-drilling cleanup required. Don’t want the ring to stick around after drilling? Just peel it off. There’s a load of other tips too, so be sure to check it out.

A nice front panel really does make a project better, and we’ve seen many different approaches over the years. One can stick laminated artwork onto an enclosure, or one can perform toner transfer onto 3D printed surfaces by putting the design on top of the 3D printer’s build surface, and letting the heat of molten plastic do the work of transferring the toner. And if one should like the idea of a plywood front panel but balk at resin printing onto it, old-fashioned toner transfer works great on wood.


hackaday.com/2026/03/30/this-f…

Retro Open Source Camera Straight from the ’90s


The media in this post is not displayed to visitors. To view it, please log in.

In our modern society, we have started to take the humble camera for granted. Perhaps because of this, trendy standalone cameras have started to take off. Unfortunately, most of the time these cameras are expensive and not any better than those in our everyday smartphones. If only there were some open-source solution where you could build and customize your own standalone device? [Yutani] has done just that with the SATURNIX.

Simple microcontrollers and cameras meant for Raspberry Pis are a dime a dozen these days. Because of this, it’s no surprise to hear that the SATURNIX is based on recognizable hardware, a Raspberry Pi Zero 2W and an Arducam 16MP sensor. The Pi Zero powers both the sensors’ capture abilities and the interactive LCD display.

Some sample filtered shots from the SATURNIX
With a simple visual design, the device could certainly fit into the same market we see so many other standalone cameras. Pictures from the camera look great without or with the included filter options if you want a more retro look. While currently there do appear to be some speed improvements needed, the best part of open source is that you yourself can help out!

We always love ambitious open source projects that look to build a true base for others to work on, and this seems like no exception! If you want similarly impressive feats of optical trickery, look no further than using scotch tape as a camera lens!


hackaday.com/2026/03/30/retro-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Intesa Sanpaolo, multa da 31,8 milioni per un data breach durato oltre due anni


@Informatica (Italy e non Italy)
Un data breach protratto per più di due anni, migliaia di accessi indebiti e sistemi di controllo ritenuti inadeguati. Con queste motivazioni il Garante per la protezione dei dati personali ha sanzionato Intesa Sanpaolo con una multa da 31,8 milioni di euro,

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

La nuova legge elettorale e l'elezione del Presidente della Repubblica

Punti chiave della riforma e dell'elezione del Capo dello Stato
Ruolo del Presidente della Repubblica:
Il Capo dello Stato continuerà a essere eletto dal Parlamento in seduta comune. La riforma si concentra invece sull'elezione diretta del Presidente del Consiglio (il Premier).
Quorum per l'elezione:
Le regole per eleggere il Presidente della Repubblica rimangono quelle previste dall'Articolo 83 della Costituzione: maggioranza dei due terzi dell'assemblea per i primi tre scrutini e maggioranza assoluta (50% + 1) dal quarto scrutinio in poi.

Il nodo della legge elettorale:
La riforma Meloni prevede l'introduzione di un premio di maggioranza (attualmente ipotizzato al 55% dei seggi) per garantire stabilità al governo eletto.
Se una coalizione ottenesse il 55% dei seggi grazie al premio, supererebbe agevolmente la soglia della maggioranza assoluta richiesta dal quarto scrutinio per eleggere il Presidente della Repubblica.

Conseguenze: In questo scenario, la maggioranza di governo potrebbe effettivamente eleggere un proprio candidato "in autonomia", senza dover cercare un compromesso con le opposizioni dopo il terzo voto.

Stato della riforma (Marzo 2026)
La riforma ha superato diverse fasi del suo iter parlamentare ma, trattandosi di una modifica costituzionale, se non approvata con la maggioranza dei due terzi in entrambi i rami del Parlamento, dovrà passare attraverso un referendum confermativo. Per monitorare gli sviluppi ufficiali, è possibile consultare le schede del Servizio Studi della Camera o il sito del Senato della Repubblica.

#Stabilicum #nuovaleggeelettorale #meloni #elezionePresidenteRepubblica

@politica

in reply to emama

Diciamo che sempre se una coalizione ha abbastanza voti in parlamento da esprimere un premier, allora ha la maggioranza assoluta e può esprimere un presidente della repubblica.

Non è così facile perché il voto è segreto e in esso hanno luogo molti intrighi politici. Ma tecnicamente anche il governo di oggi avrebbe i numeri, pur essendo un parlamento da Rosatellum.

Inoltre la legge elettorale non è una legge costituzionale, l'emanazione è espressione di parlamento e firma del presidente della repubblica. Non ci sarà un referendum.

La novità della legge è un sistema senza collegi uninominali, e che il premio di maggioranza va a una coalizione che supera il 40% dei voti espressi, oppure vince un ballottaggio tra le (due) coalizioni che superano il 35%.

Cybersecurity & cyberwarfare ha ricondiviso questo.

Nuova legge elettorale ed elezione del Presidente della Repubblica

In questo scenario, la maggioranza di governo potrebbe effettivamente eleggere un proprio candidato "in autonomia", senza dover cercare un compromesso con le opposizioni dopo il terzo voto.

il post completo su

poliversity.it/@emama/11631980…

#stabilicum


La nuova legge elettorale e l'elezione del Presidente della Repubblica

Punti chiave della riforma e dell'elezione del Capo dello Stato
Ruolo del Presidente della Repubblica:
Il Capo dello Stato continuerà a essere eletto dal Parlamento in seduta comune. La riforma si concentra invece sull'elezione diretta del Presidente del Consiglio (il Premier).
Quorum per l'elezione:
Le regole per eleggere il Presidente della Repubblica rimangono quelle previste dall'Articolo 83 della Costituzione: maggioranza dei due terzi dell'assemblea per i primi tre scrutini e maggioranza assoluta (50% + 1) dal quarto scrutinio in poi.

Il nodo della legge elettorale:
La riforma Meloni prevede l'introduzione di un premio di maggioranza (attualmente ipotizzato al 55% dei seggi) per garantire stabilità al governo eletto.
Se una coalizione ottenesse il 55% dei seggi grazie al premio, supererebbe agevolmente la soglia della maggioranza assoluta richiesta dal quarto scrutinio per eleggere il Presidente della Repubblica.

Conseguenze: In questo scenario, la maggioranza di governo potrebbe effettivamente eleggere un proprio candidato "in autonomia", senza dover cercare un compromesso con le opposizioni dopo il terzo voto.

Stato della riforma (Marzo 2026)
La riforma ha superato diverse fasi del suo iter parlamentare ma, trattandosi di una modifica costituzionale, se non approvata con la maggioranza dei due terzi in entrambi i rami del Parlamento, dovrà passare attraverso un referendum confermativo. Per monitorare gli sviluppi ufficiali, è possibile consultare le schede del Servizio Studi della Camera o il sito del Senato della Repubblica.

#Stabilicum #nuovaleggeelettorale #meloni #elezionePresidenteRepubblica

@politica


Cybersecurity & cyberwarfare ha ricondiviso questo.

Come trasformare qualsiasi cosa in un router

Non mi piace molto coprire “gli eventi attuali”, ma il governo americano ha appena rivelato una politica davvero sconcertante che vieta di fatto l'importazione di nuovi modelli di router consumer. Questo è ridicolo per molte ragioni, ma se ciò dovesse effettivamente accadere potrebbe essere utile imparare a “produrre in casa” un router.

Fortunatamente, è possibile realizzare un router utilizzando praticamente qualsiasi cosa assomigli a un computer.

nbailey.ca/post/router/

@Informatica (Italy e non Italy)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

La Commissione europea conferma la violazione dei dati dopo l'hacking di Europa.eu


La Commissione europea ha confermato una violazione dei dati dopo che la sua piattaforma web Europa.eu è stata hackerata in un attacco informatico rivendicato dalla banda di estorsori ShinyHunters.

Computer che emette segnali acustici segnalato per la prima volta venerdì che questa violazione riguarda almeno uno degli account AWS (Amazon Web Services) della Commissione.

La Commissione afferma che l'attacco non ha interrotto alcun sito web Europa e che il suo personale ha adottato misure per contenere l'incidente e prevenire ulteriori furti di dati.

"I primi risultati della nostra indagine in corso suggeriscono che i dati sono stati presi da quei siti web. La Commissione ne informa debitamente le entità dell'Unione che potrebbero essere state colpite dall'incidente. I servizi della Commissione stanno ancora indagando sul pieno impatto dell'incidente", il principale organo esecutivo dell'Unione europea detto in un comunicato stampa di venerdì pubblicato dopo che BleepingComputer lo ha contattato per maggiori dettagli sul cyberattacco.

(CONTINUA)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

L'FBI conferma l'hacking della casella di posta elettronica personale del direttore Patel


Gli hacker di Handala associati all'Iran hanno violato l'account di posta elettronica personale del direttore dell'FBI Kash Patel e pubblicato foto e documenti.

L'FBI ha confermato il compromesso, affermando che i dati rubati non erano recenti e non includevano dati governativi.

Venerdì, l'autore della minaccia Handala ha annunciato su uno dei suoi siti web che Patel è stato aggiunto all'elenco delle sue vittime, sostenendo che hanno compromesso “i cosiddetti sistemi ‘impenetrabili’ dell'FBI” in poche ore.

Gli hacker hanno affermato che la loro azione era in risposta al L'FBI sequestra i domini di Handala e il governo degli Stati Uniti che offre un ricompensa fino a 10 milioni di dollari per informazioni sui membri del gruppo minaccioso.

Tuttavia, gli hacker avevano violato la casella di posta Gmail personale del direttore dell'FBI.

“Tutte le informazioni personali e riservate di Kash Patel, tra cui e-mail, conversazioni, documenti e persino file classificati, sono ora disponibili per il download pubblico”, hanno affermato gli hacker di Handala prima di pubblicare la prova della violazione.

(CONTNUA)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 nuova rivendicazione #ransomware Italia 🚨 🏴‍☠️ gruppo #TheGentlemen🧬 Gaposa S.R.L. | Fermo (FM) 🎯 settore: fabbricazione strutture in metallo 🔗 gaposa.it🗓️ 30 marzo 2026 📄 sample: - ▪️ dati esfiltrati dichiarati: - ▪️ dati esfiltrati pubblicati: - ⏲️ scadenza: 09 aprile 2026 #ransomNews

reshared this

Recreating One of the First Hackintoshes


The media in this post is not displayed to visitors. To view it, please log in.

Apple’s Intel era was a boon for many, especially for software developers who were able to bring their software to the platform much more easily than in the PowerPC era. Macs at the time were even able to run Windows fairly easily, which was unheard of. A niche benefit to few was that it made it much easier to build Hackintosh-style computers, which were built from hardware not explicitly sanctioned by Apple but could be tricked into running OSX nonetheless. Although the Hackintosh scene exploded during this era, it actually goes back much farther and [This Does Not Compute] has put together one of the earliest examples going all the way back to the 1980s.

The build began with a Macintosh SE which had the original motherboard swapped out for one with a CPU accelerator card installed. This left the original motherboard free, and rather than accumulate spare parts [This Does Not Compute] decided to use it to investigate the Hackintosh scene of the late 80s. There were a few publications put out at the time that documented how to get this done, so following those as guides he got to work. The only original Apple part needed for this era was a motherboard, which at the time could be found used for a bargain price. The rest of the parts could be made from PC components, which can also be found for lower prices than most Mac hardware. The cases at the time would be literally hacked together as well, but in the end a working Mac would come out of the process at a very reasonable cost.

[This Does Not Compute]’s case isn’t scrounged from 80s parts bins, though. He’s using a special beige filament to print a case with the appropriate color aesthetic for a computer of this era. There are also some modern parts that make this style computer a little easier to use in today’s world like a card that lets the Mac output a VGA signal, an SD card reader, and a much less clunky power supply than the original would have had. He’s using an original floppy disk drive though, so not everything needs to be modernized. But, with these classic Macintosh computers, modernization can go to whatever extreme suits your needs.

Thanks to [Stephen] for the tip!

youtube.com/embed/RUUVNi_X8w8?…


hackaday.com/2026/03/30/recrea…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Sony sospende le vendite di schede SD

La carenza globale di memoria, dovuta alla rapida espansione dei data center per l'intelligenza artificiale sta colpendo tutti, persino Sony.

L'offerta non sarà in grado di soddisfare la domanda di schede di memoria CFexpress e SD nel prossimo futuro. L'accettazione di ordini da parte dei rivenditori autorizzati e dei clienti del Sony Store sarà sospesa a partire dal 27 marzo 2026.

mashable.com/article/sony-sd-c…

@aitech

Cybersecurity & cyberwarfare ha ricondiviso questo.

L’identità digitale è il bersaglio: l’attacco che segna un cambio di paradigma


@Informatica (Italy e non Italy)
È stata identificata una campagna di attacco particolarmente sofisticata e strutturata basata su phishing il cui vero obiettivo strategico sono i token di accesso alle piattaforme Microsoft 365 di oltre 340 organizzazioni in tutto il mondo. Ecco tutti i

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

#China-Linked groups target Southeast Asian government with advanced #malware in 2025
securityaffairs.com/190174/hac…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

’Una vulnerabilità critica scoperta in Telegram, ma la società afferma che è un falso allarme... cosa sta realmente accadendo?…

📌 Link all'articolo : redhotcyber.com/post/una-falla…

#redhotcyber #news #cybersecurity #hacking #telegram #zerodayinitiative #bugbounty #trendmicro

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

FEDINEWS si è rinnovato: vieni a visitarlo!

Il servizio #Fedinews è un portale collaborativo che mostra le notizi pubblicate dagli utenti del Fediverso italiano.

Grazie al lavoro di @skariko abbiamo un nuovo design e la possibilità per l'utente di filtrare le istanze che lo alimentano.

Se vuoi partecipare anche tu, puoi pubblicare una notizia menzionando uno dei gruppi del circuito:
- feddit.it
- citiverse.it
- poliverso.it
- forum.androidiani.net

fedinews.it

@fediverso

Cybersecurity & cyberwarfare ha ricondiviso questo.

EPIDEMIE IN TRINCEA: SOLDATI RUSSI IN TRAPPOLA

@Informatica (Italy e non Italy)

Il brusio soffuso delle conversazioni e il tintinnio di posate d'argento riempivano l'aria del Circolo Militare Centrale di Mosca.
L'articolo EPIDEMIE IN TRINCEA: SOLDATI RUSSI IN TRAPPOLA proviene da GIANO NEWS.
#DIFESA

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il governo americano registra un dominio misterioso dopo la declassificazione dei documenti sugli UFO... cosa nasconde Alien.gov…

📌 Link all'articolo : redhotcyber.com/post/il-govern…

A cura di Silvia Felici

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence

reshared this

Medieval Alhambra’s Pulser Pump and Other Aquatic Marvels


The media in this post is not displayed to visitors. To view it, please log in.

Reflective pool of the Court of the Myrtles, looking north towards the Comares Tower. (Credit: Tuxyso, Wikimedia)

Recently the Practical Engineering YouTube channel featured a functional recreation of a pump design that is presumed by some to have been used to pump water up to the medieval Alhambra palace and its fortress, located in what is today Spain. This so-called pulser pump design is notable for not featuring any moving parts, but the water pump was just one of many fascinating engineering achievements that made the Alhambra a truly unique place before the ravages of time had their way with it.

Although the engineering works were said to still have been functional in the 18th century, this pumping system and many other elements that existed at the peak of its existence had already vanished by the 19th century for a number of reasons. During this century a Spanish engineering professor, Cáceres, tried to reconstruct the mechanism as best as he could based on the left-over descriptions, but sadly we’ll likely never know for certain that it is what existed there.

Similarly, the speculated time-based fountain in the Court of the Lions and other elements are now forever lost to time, but we have plenty of theories on how all of this worked in a pre-industrial era.

Alhambra

Evening panorama of Alhambra from Mirador de San Nicolás, Granada, Spain. (Credit: Slaunger, Wikimedia)Evening panorama of Alhambra from Mirador de San Nicolás, Granada, Spain. (Credit: Slaunger, Wikimedia)
A UNESCO World Heritage Site since 1984, the Alhambra saw its first construction in 1238 CE by Muhammad I, the first Nasrid emir. The Nasrid dynasty would last from 1238 to 1491 CE when the Muslim state of al-Andalus fell during the Christian Reconquista.

Even after the end of the Nasrid dynasty would the Alhambra see further construction by Charles V in the 16th century. This made the Alhambra a rather unique amalgamation of Islamic and Renaissance-era architecture and engineering. Sadly by the 18th century the structure had been abandoned for centuries, invaded by squatters, and partially destroyed by the troops of Napoleon in 1812.

Only after these troubled times did an appreciation for such cultural heritage begin to flourish, with European and American tourists alike frequenting the area. One of them – US author Washington Irving – was so inspired by his visit in 1828 that he’d end up writing Tales of the Alhambra, containing many myths, stories, sketches, and essays pertaining to the site. This book in particular was instrumental in making an international audience aware of this site and its legacy.

This renewed attention resulted in the site becoming recognized first as a Spanish Cultural Heritage monument in 1870 and subsequently by UNESCO more than a century later.

Water Features


Most fortresses of the era relied primarily on water cisterns that collected rainwater, as well as access to local rivers in some form, usually requiring human or animal labor to transport the latter. This was also how the Alhambra started in its initial fortress form, called the Alcazaba, meaning ‘citadel’ in Spanish, from Arabic al-qaṣabah. The water from this cistern didn’t just supply drinking water, but also for the bathhouse (hammam) and water elements like a pool or fountain for houses in the interior urban area. These houses additionally featured latrines that were flushed using this cistern water.

As the Alhambra expanded, with many palaces and related structures added, its water requirements increased correspondingly. Rather than some small decorative water features for a dozen houses and a communal bath, there were now reflective pools, fountains and a much larger population. This necessitated finding more efficient ways to get more water up the hill on which the Alhambra was constructed.
Aqueduct of the Alhambra as it enters the wall. (Credit: Sharon Mollerus, Wikimedia)Aqueduct of the Alhambra as it enters the wall. (Credit: Sharon Mollerus, Wikimedia)
In addition to the aforementioned pump, there was also an aqueduct (the Acequia Real) that carried water from the Darro River. At a distance of 6.1 km from the fortress the river is at a sufficiently high elevation to provide water using just gravity. This aqueduct additionally provided water via additional branches to gardens and settlements beyond the Alhambra’s walls.

Many details can be found in this 2019 summary of applied hydraulic techniques at al-Andalus fortresses by Luis José García-Pulido and Sara Peñalver Martín.

As noted in that overview article, the reason for the Alhambra being significantly more advanced than other fortresses in the al-Andalus region was that it was the seat of the Nasrid dynasty, ergo it was only natural that it’d not only get all the palaces and comforts, but also the most advanced technologies for supplying water.

Unfortunately the unique pumping device that was used to supply the Alcazaba with water from the aqueduct was replaced in the 18th century with a more basic syphon system and the original device was removed. Up till that point the previous device had continued to work, despite the new owners of the Alhambra not understanding its operating principles. This left 19th century researchers like Cáceres to essentially fully rely on notes made during the previous century.

That said, there are also hints that the Alcazaba of the Antequera fortress used a similar device to pump water uphill, featuring ceramic pipes and other features that are described in by Sancho de Toledo in 1545. Unfortunately these accounts were all written by people who lacked the engineering know-how of the original Nasrid engineers – or any engineering knowledge at all – and thus had no understanding of the workings of these pumps.

This means that we will unfortunately never know exactly what this device looked like or how it worked, but we can still look at some mechanisms which we are familiar with today that could have been used. The concept of the hydraulic ram or pulser pump would seem to come closest compared to what little we do know.

Self-Powered Pumps

1) Inlet - drive pipe; 2) Free flow at waste valve; 3) Outlet - delivery pipe; 4) Waste valve; 5) Delivery check valve; 6) Pressure vessel (Source: Wikimedia)1) Inlet – drive pipe; 2) Free flow at waste valve; 3) Outlet – delivery pipe; 4) Waste valve; 5) Delivery check valve; 6) Pressure vessel (Source: Wikimedia)
Unlike a water pump that uses e.g. an impeller to impart kinetic energy and thus move the liquid, a self-powered pump uses physical phenomena like the water hammer effect or the fact that gas in a liquid will rise in order to effect a pumping effect. The hydraulic ram, for example, uses the water hammer effect and relies only on the kinetic energy of the incoming water.

The basic hydraulic ram functional sequence involves the water current pushing the normally open waste valve close, at which point the water hammer effect from the sudden current cessation forces the delivery valve open and pushing water into the delivery pipe.

This process will reverse again after a short while, sending a pressure wave upstream and eventually leading to the waste valve reopening. The downstream flow will then resume again, restarting the whole process.

In terms of technological complexity this is a very straightforward design, with the most complex parts being the valves and the pressure vessel that cushions the system against pressure shocks. This is however a design that would have been technologically quite feasible to manufacture and operate.
Basic pulser pump design. (Credit: Belbury, Wikimedia)Basic pulser pump design. (Credit: Belbury, Wikimedia)
Another, similar type of pump is the gas lift pump. A very small variant of this is commonly used in devices like coffee percolators, with the pulser pump being in effect a very large implementation of the same general principle. Rather than applying heat to the water reservoir in order to create gas (i.e. steam), the pulser pump uses an air compressing effect that’s also used with water-powered trompe air compressors.

As water falls down a pipe it drags air bubbles along with it, which eventually arrive at the bottom where said air is trapped in a cavity while the water flows on to a lower elevation.

The thinner pipe through which water ultimately is pumped is inserted into this air chamber in such a way that it’ll alternately ingest water and air as the level of the latter varies over time. This way pockets of water become trapped between pockets of air, with a resulting pulsing output of water at the end of this pipe.

Whether the original device at the Alhambra or Antequera exactly matches either pump design will likely remain forever a mystery, but neither were beyond the technological means of the time, with the pulser pump arguably even more straightforward due to a lack of need for any valves and pressure vessels.

Time Or Reflective Fountain


Although the Practical Engineering video focuses on this pump design, its author – Grady – was inspired by a Primal Space video that’s basically just history slop content, not citing any proper sources and propagating myths and misinformation as fact. The worst offender is probably the myth that the fountain that is found in the Court of the Lions was time-activated, with the only evidence for it being a clock being that there are twelve lion statues and there are two times twelve hours in a day.
Court of the Lions and its fountain in 2021. (Credit: Sean Adams, Wikimedia)Court of the Lions and its fountain in 2021. (Credit: Sean Adams, Wikimedia)
When we consider the archaeological evidence that exists so far, as well as the findings during the recent restorations, it seems clear that the marble block with its many holes through which the water entered the bowl was intended to diffuse the flow. Around the bowl we can see a corresponding poem of twelve verses by the vizier and poet Ibn Zamrak.

In verses 3 through 7 it specifically refers to “[..] which runs to that which is still, that we know not which of them is flowing”. This quite strongly suggests that the theme was similar to that of the many reflective pools that were so popular around the Alhambra and elsewhere. The idea of it being a time-controlled mechanism would thus seem to be a purely Western interpretation, barring some hitherto unknown evidence appearing.

Lossy History


Perhaps the most cruel aspect of history is that, much like time itself, it has no concern for those of us who live in the present. Throughout the eons as empires rise and crumble back into dust, wondrous inventions are made and soon again forgotten, leaving behind only echoes of deeds and wonder.

If we’re lucky some of it is recorded in a form as durable as Sumerian clay tablets buried underneath desert sands, but if not then what once was shall never be again. This impermanence is the eternal curse of the past, and also the reason why it’s always so important to make multiple copies of your important data.

Due to the passage of time history is mostly just ruins, pot shards and bones buried in mud and sand. Some will try to spruce things up with one’s imagination resulting in faux romanticism, but this naturally bears little connection to the past. That today the Alhambra has been largely restored is testament to how much more respectful we now approach the past, but the parts that were erased after the demise of the Nasrid dynasty are sadly likely to be lost forever.

Featured image: Reflective pool of the Court of the Myrtles, looking north towards the Comares Tower. (Credit: Tuxyso, Wikimedia)


hackaday.com/2026/03/30/mediev…

Tame the Tape: Open-Source Dotterboard for Bulk SMT Parts


The media in this post is not displayed to visitors. To view it, please log in.

Dotterboard smt counter

One of the great things about building electronics today is how affordable SMT components have become — sometimes just fractions of a cent each. That low price often means ordering far more than you need so you’ll have spares on hand the next time a project calls for them. Keeping track of exactly how many of each part you actually have, though, is rarely easy. To solve that problem, [John] built the Dotterboard, an open-source SMT tape counter.

While working on some of his other projects, [John] found himself managing thousands of tiny SMT parts and decided it was time to automate the counting. The Dotterboard takes inspiration from the BeanCounter — a compact, portable SMT tape counter — but expands the design to handle larger components beyond the 8 mm tapes the BeanCounter targets.

The Dotterboard is mostly 3D-printed and uses just a few common hardware parts such as springs and ball bearings. An OLED displays the current count, which comes from an encoder tracking movement and multiplying by the number of components per hole. At the heart sits an RP2040 Zero that needs nothing more than a single USB-C cable for power, unlike the bulky industrial SMT counters that demand AC outlets and desk space.

Be sure to check out all the details of the build on [John]’s website, and grab the files from his GitHub if you want to make your own. Let us know what are some projects you’ve done to save you the headache of doing the same task by hand for hours on end.

youtube.com/embed/WIFQgdVEmkg?…


hackaday.com/2026/03/30/tame-t…

Cybersecurity & cyberwarfare ha ricondiviso questo.

AI Act, la semplificazione che complica: meno regole, più incoerenza?


@Informatica (Italy e non Italy)
L’adozione da parte del Parlamento UE della propria posizione sul cosiddetto digital omnibus, il settimo pacchetto di semplificazione che interviene, tra gli altri, sull’AI Act, non è una semplice calibrazione dei tempi di applicazione o razionalizzazione degli obblighi, ma

reshared this

Spy Tech: Conflicts Bring a New Number Station


The media in this post is not displayed to visitors. To view it, please log in.

If you know much about radios and espionage, you’ve probably encountered number stations. These are mysterious stations that read out groups of numbers or otherwise encoded messages to… well… someone. Most of the time, we don’t know who is receiving the messages. You’d be excused for thinking that this is an old technology. After all, satellite phones, the Internet, and a plethora of options now exist to allow the home base to send spies secret instructions. However, the current-day global conflict has seen at least one new number station appear, apparently associated with the United States and, presumably, targeting some recipients in Iran, according to priyom.org.

As you might expect, these stations don’t identify themselves, but the Enigma Control List names this one as V32. It broadcasts two two-hour blocks a day at 0200 UTC and a repeat at 1800 UTC. Each message starts with the Farsi word for “attention” followed by what is assumed to be some header information as two 5-digit groups. Then there is a set of 181 five-digit groups. Each message is padded out to take 20 minutes, and there are six messages in each transmission.

How Do You Know?


While this could, in theory, be from (and to) anywhere, direction finding has traced the signal to a US base near Stuttgart, Germany. In addition to using Farsi, Iran has repeatedly attempted to jam the signal, causing V32 to change frequencies a few times. There’s also a more recent, so far unidentified, jammer trying to block the signal.

In addition to direction finding, there is a surprising amount of information you can glean from the audio. The first few days of broadcasts had specific beeps in the background, which appear to be warning tones from a specific type of American military transmitter that warns the operator when encryption is not engaged. At first, a human read the numbers. Eventually, the station switched to using automated numbers.

Oops


In addition, there have been a few times when Windows 10 system sounds have leaked into the transmission. Other oddities are several cases where a word was read out in the middle of the numbers. We aren’t cryptographers, but that suggests the numbers refer to words in some sort of codebook, and that book doesn’t contain the proper words.

If you want to try your hand at decoding, you can hear the station on USB just under 8 MHz, or just listen to the recordings made by others (like the ones below or this one). You might like to read what other people say about it, too.

youtube.com/embed/3-eg3i9XYt4?…

youtube.com/embed/r6CzkwAXltk?…

We are fascinated by spy stations. Even when they aren’t really number stations.


hackaday.com/2026/03/30/spy-te…

Cybersecurity & cyberwarfare ha ricondiviso questo.

It's a mystery ... alleged unpatched Telegram zero-day allows device takeover, but Telegram denies
securityaffairs.com/190167/sec…
#securityaffairs #hacking

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

MAI PIU'?

Gad Lerner

Condivido la mia recensione al libro di Anna Foa, "Mai più" (Laterza editore) pubblicata su Il Manifesto di sabato scorso.

Il nuovo pamphlet di Anna Foa mi offre l’opportunità di esprimere una protesta a proposito del trattamento riservato all’autrice da parte di chi si autopercepisce in prima fila nel contrasto all’antisemitismo, ignaro del contributo che fornisce nell’alimentarlo. Il libro, intanto: si tratta di settanta agili pagine edite da Laterza, col titolo secco Mai più, per ricordarci che tenere viva la memoria dello sterminio degli ebrei in Europa dovrebbe fare il paio con l’impegno di scongiurarne la ripetizione a danno di altri popoli; e che quel “mai più” non può certo essere usato come scusante per giustificare nuovi crimini, infliggere umiliazioni, seminare disprezzo nei confronti di altri. Tanto meno dichiarandosi portavoce (vendicatori?) degli antenati. Dunque non vale solo per gli ebrei il “mai più”. Semmai agli ebrei tocca in sorte, a seguito di ciò han sofferto, il compito di sentinelle pronte a segnalare il pericolo che quell’abominio si ripeta. Come raccomandava Primo Levi.
Perché, allora, la lettura di Anna Foa mi muove alla protesta? Perché credo meriti di venir studiato il meccanismo di espulsione di fatto dalla Comunità ebraica romana di cui era animatrice riconosciuta dacché nell’estate 2024 è stato pubblicato Il suicidio di Israele. E non parliamo dacché il libro è stato insignito del Premio Strega per la saggistica. Di colpo l’illustre storica Anna Foa da personalità benvoluta, ammirata e rispettata, s’è tramutata in reietta che neppure si deve più nominare. Una sindrome di di psicologia collettiva tipica dei nostri tempi contraddistinti dall’intreccio fra ossessioni identitarie e richiami all’appartenenza esasperati da parodie mediatiche della guerra.
Stiamo parlando di una donna ebrea per parte di padre, cresciuta in una famiglia laica, che in età adulta ha compiuto la scelta del ghiur (conversione) e dell’osservanza, divenuta per questo assai cara anche alla componente religiosa della Comunità. E da quali genitori, da quale storia di coraggio e sacrifici alla base della conquista di un’Italia democratica, proviene Anna, che ormai ha passato la soglia degli ottant’anni! Ne ha trascorsi otto nelle carceri del regime Vittorio Foa, antifascista della prima ora, per poi diventare padre costituente, scegliere la militanza sindacale anziché una più agevole carriera politica, restare “giovane” fino all’ultimo nella ricerca culturale di una nuova sinistra. Quanto alla madre di Anna Foa, Lisa Giua, troppo ci sarebbe da dire tanto di lei che della sua famiglia. A noi basti ricordare quando nell’agosto del 1944, ventenne e incinta di sei mesi, per la sua attività di staffetta partigiana venne arrestata e rinchiusa nei sotterranei di Villa Triste a Milano, là dove la famigerata Banda Koch praticava torture e maltrattamenti. Ricoverata in ospedale, Lisa riuscì ad evadere. La neonata Anna Foa dovette essere registrata all’anagrafe come “figlia di ignoti”, con un cognome inventato, perché la Liberazione era ancora di là da venire. Venuta al mondo così in tempo di guerra, quasi una sfida alla malasorte, un segno d’amore e di Resistenza, adesso le tocca provare l’ostracismo dell’ambiente in cui ha coltivato le sue amicizie ma si dimostra incapace di rispettare il suo dissenso.
Questi cenni biografici non sembrino una divagazione. Chi l’accusa di tradimento, chi definisce scritti “col paraocchi” i testi di una fino a ieri rispettata accademica, chi ravvede solo un “dubbio onore” nel successo riscosso da Anna Foa “solo perché da ebrea ha consegnato argomenti nelle mani di forze ostili a Israele”, magari non se n’è reso conto ma è incorso in una forma di rimozione della realtà che potremmo definire negazionista. Capita di sperimentarla continuamente, in Israele come nella diaspora, fra persone sempre disperate, spesso in buona fede secondo le quali i resoconti della stampa internazionale sul conflitto mediorientale sarebbero tutti intessuti di falsità, assoggettati a una montatura mediatica bene orchestrata dai nemici, nuovi e vecchi antisemiti. Descrivere i crimini perpetrati da Israele, qualunque sia il grado di accuratezza nella scelta delle parole, viene percepito come un’aggressione. Le immagini che li comprovano sono definite senza fallo forzate o artefatte. Quando risultino innegabili, si obietta che riguardano il comportamento di frange estremiste minoritarie in una società che conserva la propria superiorità morale nei confronti del nemico che la minaccia. Alla fine, in questo negazionismo si manifesta inconsapevolmente l’angoscia per la perdita dell’innocenza.
Qui diventa prezioso il nuovo libro di Anna Foa che, dopo una sintetica storia delle diverse modalità assunte nei secoli dall’odio antiebraico -l’accusa di deicidio; il socialismo degli imbecilli che equiparava ebreo a padrone; la razza parassita che depreda gli ariani; il popolo colonizzatore- esamina le complesse relazioni fra antisemitismo e antisionismo senza eludere il nesso evidente tra il crescente odio antiebraico e la persecuzione dei palestinesi da parte di un establishment israeliano che neppure riconosce loro di essere una nazione. “A dar retta a queste voci, il mondo intero è antisemita. Ma se l’antisemitismo è dappertutto, come distinguerlo?”. Aggiungerei: vorrà pur dire qualcosa se nel secolo scorso gli antisemiti si vantavano di esserlo; mentre oggi chi critica Israele -ricorrendo purtroppo talvolta, per lo più inconsapevolmente, a stereotipi radicati nel passato- trova infamante l’accusa di esserlo?

#antisemitismo #antisionismo #annafoa #maipiu #gadlerner

@cultura
@politica

in reply to emama

personalmente sono davvero stanco di vedere così in risalto i drama identitari e psicologici, e i battibecchi interni, di persone che ancora tentano di riportare il dibattito sull'ebraismo nella giusta strada. Da bravi bianchi occidentali, al riparo. Il dramma è uno solo, e, per rispetto, dovrebbero tacere per sempre.
Questa voce è stata modificata (14 ore fa)

Questo account è gestito da @informapirata ⁂ e propone e ricondivide articoli di cybersecurity e cyberwarfare, in italiano e in inglese

I post possono essere di diversi tipi:

1) post pubblicati manualmente
2) post pubblicati da feed di alcune testate selezionate
3) ricondivisioni manuali di altri account
4) ricondivisioni automatiche di altri account gestiti da esperti di cybersecurity

NB: purtroppo i post pubblicati da feed di alcune testate includono i cosiddetti "redazionali"; i redazionali sono di fatto delle pubblicità che gli inserzionisti pubblicano per elogiare i propri servizi: di solito li eliminiamo manualmente, ma a volte può capitare che non ce ne accorgiamo (e no: non siamo sempre on line!) e quindi possono rimanere on line alcuni giorni. Fermo restando che le testate che ricondividiamo sono gratuite e che i redazionali sono uno dei metodi più etici per sostenersi economicamente, deve essere chiaro che questo account non riceve alcun contributo da queste pubblicazioni.

reshared this