Bellissimo, da far vedere a chi progetta l'esperienza utente di siti internet!
reshared this
Bellissimo, da far vedere a chi progetta l'esperienza utente di siti internet!
reshared this
Flow batteries are rather unique. They generate electricity by the combination of two fluids flowing on either side of a membrane. Typically, this involves the use of some kind of pump to get everything moving. However, [Dusan Caf] has demonstrated another way to make a flow battery operate.
[Dusan]’s build is a zinc-iodide flow battery. It uses two 3D printed reservoirs, each holding a ZnI2 solution and a graphite electrode. Unlike traditional flow batteries, there is no mechanism included to mechanically push the fluid around. Instead, fluid motion is generated by the magnetohydrodynamic effect, which you may know from that Japanese boat that didn’t work very well.
When charging the liquid-based cell, current flows through the conductive electrolyte that sits between both electrodes. This sees zinc electroplated onto the graphite anode, while iodide ions are oxidized at the cathode. There’s also a permanent magnet installed beneath the electrodes, which provides a stable magnetic field. This field, combined with the current flowing through the electrolyte, sees the Lorentz force pushing the electrolyte along, allowing the flow battery to operate. When the cell is being discharged, the reactions happen in reverse, with the flow through the electrodes changing direction in turn. Neatly, as current draw or supply increases, the flow rate increases in turn, naturally regulating the system.
[Dusan] notes this isn’t feasible for large batteries, due to the limited flow rate, but it’s fine for small-scale demos regarding the operation of a flow battery. We’ve featured some more typical flow battery designs in the past, too.
youtube.com/embed/p2LaPcJia7U?…
youtube.com/embed/i3Abqr1r-mk?…
Rete TELCO sotto assedio: BPFDoor è in scena per un attacco senza precedenti
📌 Link all'articolo : redhotcyber.com/post/rete-telc…
#redhotcyber #news #cybersecurity #hacking #malware #minaccesibernetica #sicurezzainformatica #gruppihacker #haccin Cina
Gruppo hacker Red Menshen impianta backdoor BPFDoor in reti telecom per spiare. Scopri come funziona e perchè è un problemaRedazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
🔴 Benvenuta Marilena in Red Hot Cyber Cyber Angels 🔴
🔗 Seguitela attraverso Gli ultimi articoli su RHC : redhotcyber.com/post/author/ma…
#redhotcyber #rhccyberangels #hacking #benesseredigitale #it #cybercrime #cybersecurity
Cybersecurity & cyberwarfare reshared this.
L’AI vuole entrare nell’energia nucleare: la tecnologia c’è, ma il vero ostacolo è nascosto
📌 Link all'articolo : redhotcyber.com/post/lai-vuole…
#redhotcyber #news #intelligenzaartificiale #energianucleare #digitaltwins #automazionedocumentale #tecnologiedigitali #settoreenergetico
L'intelligenza artificiale promette di velocizzare i processi di progettazione e permitting nel settore nucleare, ma i risultati attuali sono ancora parziali.Bajram Zeqiri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
🚀 RHC Conference 2026: Workshop "Hands On" di Lunedì 18 Maggio
Di seguito le informazioni sull'evento:
📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop "hands-on" e pomeriggio workshop "skill-on")
📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)
📍Programma: redhotcyber.com/linksSk2L/prog…
📍Iscriviti ai Workshop di lunedì 18 maggio : rhc-conference-2026-workshop.e…
#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity
Registrazione per i Workshop di Lunedì 18 Maggio 2026 presso il Teatro Italia di Roma, in Via Bari 18.Eventbrite
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Gli attacchi informatici si evolvono: le API sono nel mirino degli aggressori
📌 Link all'articolo : redhotcyber.com/post/gli-attac…
#redhotcyber #news #akamai #rapportosullostatointernet #sicurezzainformatica #attacchidDos #abusoapi #attacchiweb #infrastrutturaaziendale
Gli attacchi informatici sono sempre più sistematici e mirano alle API. Scopri come le aziende possono proteggersi da queste minacce.Silvia Felici (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
China-linked Red Menshen APT group used stealthy BPFDoor implants in telecom networks to spy on government targets.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Ransomware in evoluzione: il 57% delle aziende colpite, subisce una nuova estorsione
📌 Link all'articolo : redhotcyber.com/post/ransomwar…
#redhotcyber #news #cybersecurity #ransomware #attacchimirati #zerotrust #resilienzaoperativa #malware #ddos #insider #sicurezzainformatica
Il ransomware è una minaccia in costante aumento. Scopri come proteggerti da questo tipo di attacco informatico e quali sono le strategie migliori per prevenire danni.Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Test tasting soda mead. (Credit: Golden Hive Mead, YouTube)
You can certainly just chug down that bottle of soda you purchased, but if you accept the premise that the preparation of food and drink is just a subset of chemistry, and that chemistry is fun, then it naturally follows that using soda as the basis for brewing up some mead makes perfect sense. Thus the [Golden Hive Mead] blokes over on YouTube decided to create some Coca Cola flavored mead.
Mead is essentially just water mixed with honey that is left to ferment after adding yeast, resulting in what is also called ‘honey wine’, with an ethanol content of usually between 3.5% and 20%. Since soda is mostly water and comes with its own supply of sugar for yeast to feast on, this isn’t such a crazy choice in that respect. Just make sure to remove the carbonation, as the CO2 makes the soda too acidic for the yeast to be happy.
Instead of straight honey, caramelized honey was used for extra flavor after which the brew was left to ferment for a while. For extra flavor notes aged oak, vanilla and cinnamon were added as well, to ensure that the fermentation didn’t erase those core notes of the coke. The result was apparently rather flavorful, with about a 10.5% ethanol content, receiving the full approval of both tame test tasters.
youtube.com/embed/eLYPGYn7WYA?…
A lot of the time, we must assign our own meaning to the numbers on the clock. 8:30 AM is work kicking off, 12 PM is lunch, and 5PM is when the corporate chains release us to what’s left of the day. If you’d rather the clock tell you what’s special about the current time, though, you might like this project from [Andy Isaacson].
It’s called Momentous—”a clock to make every minute meaningful” in [Andy’s] own words. The concept is simple—for each minute, the clock digs up some random mathematical fact relevant to the current time. For example, you might think of 3:14 as Pi o’clock, but Momentous also notes that the sequence “314” shows up at the 856th decimal of e. Useful? Probably not. Fun? If you like numbers, then very!
[Andy] wrote Momentous in Typescript with React Native and Expo. Baked into the app is a computed list of fun number facts for every conceivable time from 00:00 to 23:59. All these timely numbers were processed through a “fact generation” algorithm to dig up mathly tidbits. Do they contain primes? Do the numbers show up in a famous irrational number sequence? Are they palindromic, or can some neat facts be gleaned from Wikipedia? Maybe the current time shows up in your best friend’s phone number! Momentous uses all these and more to make every minute of the day a little bit more interesting.
You can check out the clock for yourself in your web browser. Alternatively, you can install it on your iPhone if you so desire. We feature all kinds of fun clocks here, from the wordy to the absurdy. If you’re cooking up your own timely hacks, we always love to to hear about them on the tipsline!
È finalmente online il P.U.C.S., Portale Unico delle Complicazioni Semplici. Grazie a @lastknight per il design
«Qui trovi i timbri raccolti e i documenti acquisiti durante la tua Avventura Burocratica. Ogni azione completata viene debitamente protocollata. Dicono che chi li raccoglie tutti possa accedere a una pagina super segreta... In basso a destra trovi anche il Rag. Botteri, l'assistente virtuale del portale — ma non aspettarti troppo da lui.»
Il portale parodia che trasforma le cose semplici in complicate. Login con SPID finto, moduli autodistruttivi, captcha impossibili e certificati di sopravvivenza burocratica.P.U.C.S.
reshared this
reshared this
Ai sensi dell’art.13-bis del decreto-legge 15 settembre 2023 n. 123 (cd. Decreto Caivano), i siti web e le piattaforme di condivisione video che diffondono in Italia immagini e video a carattere pornografico, sono tenuti a verificare la maggiore età degli utenti, al fine di evitare l'accesso a contenuti pornografici da parte di minori di anni diciotto.
L’Autorità, con delibera n. 96/25/CONS, ha adottato le linee guida che stabiliscono le modalità tecniche e di processo che i fornitori di contenuti pornografici sono tenuti a adottare per l'accertamento della maggiore età degli utenti, assicurando un livello di sicurezza adeguato al rischio e il rispetto della minimizzazione dei dati personali raccolti in ragione dello scopo.
reshared this
If you have a 12 VDC power system, like the battery of a PV solar system or car, would it be more efficient to boil water for that cup of tea with that 12V straight from the battery, or use a 240 VAC mains kettle via a ~90% efficient inverter instead? That’s the question that [Cahn] decided to answer experimentally, using a bulky 3 kW inverter and a collection of electric kettles.
Although the used amount of 500 mL of water is boiled much faster in the 2,200 Watt mains kettle than in the 150 and 350 Watt low-voltage kettles, this obvious difference is somewhat irrelevant if you’re only concerned with efficiency. To measure the power used a Victron smart shunt was used with each run, keeping in mind that a perfect efficiency for heating 500 mL from room temperature to boiling is around 43-44 Wh.
With two runs per kettle, the 240 VAC kettle used 65-70 Wh. The first ‘150 Watt’ kettle pulled nearly 200 Watt to boil the water after about 20 minutes, using 62-64 Wh. The second ‘150 Watt’ kettle pulled around 180 Watt, took 23-25 minutes and used 68-74 Wh. Finally, the ‘350 Watt’ kettle drew over 420 Watt and used 50-56 Wh in just over 8 minutes.
When you look at the final results, it’s interesting to note that the low-voltage kettles got both first and last place in this contest, even when factoring in the inverter losses for the 2.2 kW kettle. This makes it quite obvious that the issue at hand is less about DC vs AC or mains vs low-voltage.
The 350 Watt kettle is clearly better designed, featuring a level of insulation that the cheap 12V kettles lack, while pumping more energy into the water at a much faster pace due to the higher current.
Of course, this also shows the whole headache of using 12 VDC appliances like this, as you can only pull so much current from a cigarette lighter socket, while connecting directly to the battery and its juicy 100 A or more poses its own logistical problems. Taking the inverter losses as the price to pay for convenience is thus another totally valid option whenever you’re out camping or at that off-grid cabin.
youtube.com/embed/D3xOxzk9oS0?…
reshared this
#ChatControl fermato - le scansioni di massa finiscono il 4 aprile!
❌️ Ma incombono la verifica dell'età e nuove scansioni di massa. Come abbiamo vinto di misura il blitz del voto di oggi, chi ha votato cosa e come continua la lotta per la libertà
like this
reshared this
Fine di chatcontrol: il Parlamento europeo pone fine alla sorveglianza di massa durante le elezioni, aprendo la strada a una vera tutela dei minori!
#ChatControl fermato – le scansioni di massa finiscono il 4 aprile!
❌️ Ma incombono la verifica dell’età e nuove scansioni di massa. Come abbiamo vinto di misura il blitz del voto di oggi, chi ha votato cosa e come continua la lotta per la libertà
informapirata.it/2026/03/26/fi…
#ChatControl fermato - le scansioni di massa finiscono il 4 aprile! ❌️ Ma incombono la verifica dell'età e nuove scansioni di massa. Come…informapirata
reshared this
Die umstrittene massenhafte Überwachung privater Nachrichten in Europa endet. Nachdem das Europäische Parlament bereits am 13.Patrick Breyer
Piratenpartei Deutschland likes this.
reshared this
If only corporations like facebook, microsoft, apple and google disappeared off the face of the earth and were replaced with ones like commodore64's at minimum.
Or better yet, like the people who develop libre software or as some call it open source.
Things would be way better.
Anti-features should be illegal.
Ryan Moran has published profiles on members of the Cl0p (former ransomware) data extortion gang
This includes j0nny, AELS, Baddie, Rastafareye, and orlylyly
rmoskovy.github.io/posts/who-r…
Cl0p has hit over 2,600 organizations, exposed data on 90 million people, and made hundreds of millions in ransoms without a single operator being publicly named. After months of investigation, here is what we found.Ryan Moran
reshared this
Appalti truccati, blitz Gdf al Ministero Difesa, Terna e Rfi nell'inchiesta Sogei
Si ipotizzano i reati di corruzione, riciclaggio e autoriciclaggio. Le indagini rappresentano un ulteriore sviluppo del filone investigativo già avviato su Sogei
reshared this
reshared this
reshared this
🇪🇺
reshared this
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Langflow to its Known Exploited Vulnerabilities catalog.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
EU Chat Control vote fails again
Find out how the Members of the European Parliament voted.HowTheyVote.eu
reshared this
Dutch Police disclose breach from phishing incident
politie.nl/nieuws/2026/maart/2…
De politie is doelwit geweest van phishing. Het Security Operations Center van de politie heeft dit zeer snel ontdekt en heeft de toegang direct afgesloten. De impact wordt nog onderzocht maar lijkt beperkt.www.politie.nl
reshared this
Russian security firm F6 has spotted a new trend in Russia where online fraud and scam groups are targeting children, social-engineering them into taking photos of their parents' e-banking apps and verification codes in exchange for in-game currencies.
reshared this
So-called bug out cars are a rather silly venture that serve little purpose more than snagging your jumper. The odds of a car working well through a nuclear winter are rather minimal. But what about a bicycle? On paper it’s a better choice, with extreme efficiency, reliability, and runs off whatever sustenance you can find in the barren landscape of a collapsed society. But [Seth] over at Berm Peak proved an apocalypse bike is at least as silly as a bug out car.
While a utilitarian bike fit for a cross-country trek across a nuclear wasteland can certainly be a reasonable venture, this particular bicycle is not that. This three wheeled monstrosity of a bicycle (is it still a bicycle if it has three wheels?) was built by [TOMO] for the Bespoked bike show’s apocalypse buildoff. It placed second among a number of strange bikes with features ranging from pedal driven circular saws to beer keg grills. But this particular example of apocalypse bike is easily the strangest example of the lot.
The features on this custom build are rather extensive, but the star of the show is the trailing link two wheel drive rear end. The third wheel was thrown on last minute with a random shock providing some measure of compliance to the rather unwieldy system. But while adding unnecessary complexity, the third wheel does offer the benefit of bringing along a number of spare parts on the last bikepacking trip of a lifetime. Moreover, it can be easily removed to get something resembling bicycle.
The aforementioned front of the bike while being an actual bike, is likewise a rather strange build. It’s best described as a fat-tired long nosed tall cargo bike. The removable cargo rack is quite effective in storing heavy loads by keeping the center of gravity near or below the axles, it can remain rideable with quite heavy loads. But, if ground clearance is needed, then simply remove the cargo rack, and the bike becomes a bike capable of navigating the nuclear wasteland it was made for.
While this is a silly and questionable bike, it’s certainly not the first strange bike we have seen.
youtube.com/embed/BlP_RAKlTAk?…
Cybersecurity & cyberwarfare reshared this.
Rapid7 links BPFDoor deployments on telco networks to Chinese APT Red Menshen
rapid7.com/blog/post/tr-bpfdoo…
A months-long investigation by Rapid7 Labs has uncovered evidence of an advanced China-nexus threat actor placing stealthy digital sleeper cells in telecommunications networks, in order to carry out high-level espionage – including against government…Rapid7
reshared this
Four former high-ranking NSA officials warned that the US is losing its advantage in cyberspace as the government is failing to keep up with foreign adversaries
The four cited "brain drain" across the public sector and disintegrating relations with the private sector
cyberscoop.com/former-nsa-chie…
A systemic numbness to cyberattacks has exposed the U.S. economy and its institutions to ever-widening threats. Retired four-star military officials worry the worst day in cyber is yet to come.Matt Kapko (CyberScoop)
reshared this
Data-wiping attacks were reported at 50 Israeli organizations
Attacks were linked to 20 different groups
israelnationalnews.com/news/42…
The head of the National Cyber Authority reveals the scope of Iran's cyberattacks against Israel and warns that the war in cyberspace will continue even after a ceasefire.Yoni Kempinski (Israel National News)
reshared this
Security firm Palo Alto Networks says a threat actor is impersonating its recruiters in a phishing campaign
unit42.paloaltonetworks.com/ph…
Unit 42 identifies a recruitment phishing campaign targeting senior professionals via impersonation and fraudulent resume fees.Justin Moore (Unit 42)
reshared this
Kaspersky found Coruna iOS exploits reuse updated code from the 2023 Operation Triangulation attacks, suggesting a possible link.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Fatemi fare il meloniano: complimenti a @GiorgiaMecojoni per avere sfanculato i personaggi oghi più dannosi per l'interesse di partito, mentre il PD, inspiegabilmente, se li tiene stretti.
Meloni sarà pure opportunista e votata all'autoconservazione, ma il PD brilla per la sua incredibile determinazione a demolire la propria credibilità e, soprattutto, a umiliare costantemente la credulità dei propri elettori. Poi c'è chi si chiede perché i fasci resistano
reshared this
Politica interna, europea e internazionale reshared this.
Politica interna, europea e internazionale reshared this.
Pocket computers like Sharp’s 8-bit computing marvels were a big part of the 1980s, providing super-portable processing power to anyone who wanted a bit more than what something like a scientific calculator could provide at the time. These days they are mostly just a collector’s item for retrocomputing enthusiasts, which also means that a lot of the knowledge about how to program the CPUs in them is at risk of being lost.
This is why [gikonekos] decided to combine as much knowledge they can glean from official documentation into a reference project on GitHub for the SC62015 equipped Sharp pocket computers like the PC-E550.
Generally you’d program in Sharp’s dialect of BASIC on these computers, such as the ‘PLAY3’ program that [gikonekos] recently unearthed from a November 1993 copy of ‘Pocket Computer Journal’ using which you can create polyphonic tunes. This only unlocks a small part of what the hardware can do, of course, so having a full opcode reference like this is important.
While still a work in progress, it’ll eventually contain the full opcode and register tables, addressing modes, instruction summaries and of course a full accounting of how all of this was reconstructed. As the original Sharp documentation wasn’t released to the public, providing these scans is also not a goal, especially not under any kind of free license.
A cursory search reveals an instruction table for the PC-E500 from 1995 by [Andrew Woods], so documenting this is not a new thing, although at the time these Sharp pocket PCs didn’t count as ‘retro systems’ yet.
@Informatica (Italy e non Italy)
Google ha integrato Gemini in Google Threat Intelligence per monitorare automaticamente il Dark Web: fino a 10 milioni di post al giorno analizzati con una precisione dichiarata del 98%. Un salto tecnologico reale che pone domande scomode su cosa significhi
Auster likes this.
reshared this
Fine del ChatControl: il Parlamento UE ferma la sorveglianza di massa delle chat con una maggioranza risicatissima di un solo voto
Dopo che il Parlamento Europeo aveva già respinto il #chatcontrol indiscriminato e generalizzato da parte delle aziende tecnologiche statunitensi il 13 marzo, ieri le forze conservatrici hanno tentato una manovra per imporre comunque una nuova votazione e prorogare la legge.
marcosbox.com/2026/03/26/fine-…
La controversa sorveglianza di massa dei messaggi privati in Europa sta per giungere al termine. Dopo che il Parlamento Europeo aveva già respinto il Chat Control indiscriminato e generalizzato da parte delle aziende tecnologiche statunitensi il 13 m…Marco Giannini (Marco's Box)
reshared this
Privacy Pride reshared this.
e speriamo che sia davvero finita. Orgoglioso di aver lanciato con @ufficiozero e @BoostMediaAPS la campagna Mail Day che comunque proseguirà per scrupolo con un'ultima giornata, quella del 7 Aprile.
Mai abbassare la guardia 💪
reshared this
Elastic's security team has come across "a data dump containing source code, compiled binaries, and deployment scripts for the kernel rootkit components of VoidLink, a cloud-native Linux malware framework first documented by Check Point Research in January 2026."
elastic.co/security-labs/illum…
Elastic Security Labs analyzes VoidLink, a sophisticated Linux malware framework that combines traditional Loadable Kernel Modules with eBPF to maintain persistence.Ruben Groenewoud (Elastic Security Labs)
reshared this
Got a cool ActivityPub or ATProtocol project that can be demo'd? We are always looking to showcase what the Open Social Web can do when smart people create great software, in our speed demo track at FediForum. A few projects have been recommended for the end of April event by our community already.
If you think you have such a cool open social web demo, get in touch!
reshared this
Alessandro
Unknown parent • • •