Archive
- 2024 (2):
28 February 2024 » Playing videogames with WINE on Gentoo
12 January 2024 » Welkom 2024!
- 2023 (1):
12 August 2023 » Three years later
- 2020 (1):
06 April 2020 » Breve storia della cultura hacker
- 2019 (1):
06 March 2019 » Dconf 2019
- 2018 (3):
26 October 2018 » eLearning in the age of Social Networks, the EduHack Platform
27 July 2018 » Un articolo per r/italyinformatica
27 March 2018 » Addio Reddit
- 2017 (5):
02 October 2017 » Minidox, a guide for the Europeans and the Scrooges
09 May 2017 » Cyber-utopia and vaporwave
07 May 2017 » Late Stage Capitalism meets FOSS
20 March 2017 » Some shallow thoughts from my tiny virtual space
07 March 2017 » Breve riflessione dal mio piccolo mondo virtuale
- 2016 (15):
15 November 2016 » Capire il Machine Learning (parte 3)
11 November 2016 » Capire il Machine Learning (parte 2)
10 November 2016 » Capire il Machine Learning (parte 1)
07 July 2016 » A short talk about cryptography at the Berkman Klein Center
06 July 2016 » Phone messaging apps comparison
05 July 2016 » Arduino Uno as HID keyboard
16 May 2016 » Lifehacks (2)
15 May 2016 » Interpolation using a genetic algorithm
03 May 2016 » Why Wright's proof is a fake
17 April 2016 » Kyuss Music Player
17 April 2016 » #JeSuisSatoshiNakamoto
10 April 2016 » Lifehacks
10 April 2016 » Bright Father
02 April 2016 » How I migrated to a static blog
02 April 2016 » The Buridan's donkey in python
- 2015 (34):
20 September 2015 » The Buridan’s donkey paradox
11 September 2015 » About Perl packages in Gentoo
31 August 2015 » 56 secondi di celebrita`
25 August 2015 » Addio Blogspot
21 July 2015 » A pochi metri da Stallman
21 July 2015 » Può un sottomarino nuotare? Deep learning e intelligenze artificiali
07 July 2015 » Dodici brevi domande sul mondo del giornalismo nell’era digitale
07 July 2015 » La Rivoluzione Digitale nella Professione dell’Avvocato
30 June 2015 » Script per il bulk download da Archive.org
13 June 2015 » L’FBI contro la crittografia
12 June 2015 » Nativi digitali: oltre il recinto della Generazione Google
06 June 2015 » Aerei FBI: pericolo per la privacy o sicurezza per i cittadini?
01 June 2015 » Guida pratica a LUKS
01 June 2015 » La taglia unica del Web 2.0
22 May 2015 » Defend yourself: crittografia e “plausible deniability”
18 May 2015 » Rischiare il carcere per TOR
08 May 2015 » NSA e le intercettazioni telefoniche
08 May 2015 » Google afferma di essere pronta a dare agli utenti android più controllo sulla privacy
08 May 2015 » La prima volta non si scorda mai!
08 May 2015 » La Rete e’ neutrale
04 May 2015 » Trinita`
29 April 2015 » Ancora nessuna visita dalla Cina
23 April 2015 » Javascript attacca la cache del processore
19 April 2015 » Suicide Linux
19 April 2015 » Boneless, l’uomo senza identità che derubò HackBB
15 April 2015 » Non abbiamo nulla da nascondere
13 April 2015 » Facciamo luce sui profili ombra
13 April 2015 » Anonymous: we are legion
12 April 2015 » L’anonimato violato di TOR
12 April 2015 » Tempo di elezioni
09 April 2015 » Bitwhisper, dove anche la rete non arriva
05 April 2015 » Il Big Bang dei Big Data
04 April 2015 » Ci presentiamo
31 March 2015 » Chiave PGP