SoftEther – VPN Multiprotocollo

Sono incappato nella tesi di laurea di tal Nobori, che non avendo di meglio da fare, ha sviluppato il software definitivo per le VPN. Sia in versione client che server.

Con l’opportuna disponibilità di una piccolo vps sperduto in una server farm nell’europa centrale (ogni riferimento a siti o persone è assolutamente volontario) si riesce a bucare praticamente qualsiasi firewall aziendale mantenendo la disponibilità di banda praticamente inalterata e garantendo allo stesso tempo un elevatissimo livello di privacy.

Anche con firewall con Deep Packet Inspection il traffico risulterebbe non differente da normali trasferimenti HTTPS.

SoftEther VPN is free open-source, cross-platform, multi-protocol VPN client and VPN server software, developed as part of Daiyuu Nobori’s master’s thesis research at the University of Tsukuba. VPN protocols such as SSL VPN, L2TP/IPsec, OpenVPN, and Microsoft Secure Socket Tunneling Protocol are provided in a single VPN server. It was released using the GPLv2 license on January 4, 2014.

SoftEther VPN supports NAT traversal, making it useful to run VPN servers on computers that are behind residential gateways, facility routers, and firewalls. Firewalls performing deep packet inspection are unable to detect SoftEther’s VPN transport packets as a VPN tunnel because HTTPS is used to camouflage the connection.

SoftEther VPN optimizes performance by using full Ethernet frame utilization, reducing memory copy operations, parallel transmission, and clustering. Together, these reduce latency normally associated with VPN connections while increasing throughput.

Weekend di corsi gratis su Code School

What is Free Weekend?

Free Weekend is a special event during which all of Code School’s interactive courses, projects and screencasts becomes available for free.

All you need to do in order to participate is to create a free account and you will be notified when the Free Weekend starts.

What is Code School?

Code School is an online learning destination for existing and aspiring developers that teaches through entertaining content. Each course is built around a creative theme and storyline so that it feels like you’re playing a game, not sitting in a classroom. We also have shorter Screencasts and Projects where you can build applications on your computer or on GitHub and let us check your work.

You can learn more about us on our About page.

Generare uno schema XSD a partire da un XML

Anche tu odi chi rilascia webservices senza una descrizione precisa della richiesta e della risposta? Ecco la soluzione.

Generates a XSD (XML Schema) from a XML file. Simply copy-paste OR upload your XML document and let the generator figure out the rest. The generator will try to use a ‘smart’ approach to figure out the data type (you can always refine it after).

Sorgente: Free Online XSD/XML Schema Generator –

WSO2 Microservices Framework for Java the Spring Way

Spring is a very popular framework among Java developers. Those who are familiar with the Spring framework tend to follow the same practice wherever possible and generally seek Spring integration support from other Java frameworks as well. The ability to use the Spring framework to develop MSF4J services and MSF4J extensions was one of the main objectives of the MSF4J 2.0.0 release.

Sorgente: [Article] WSO2 Microservices Framework for Java the Spring Way – Part 1

Superare i limiti della mente umana

Interessante articolo sui limiti della mente e su come ingannarli o aggirarli per sviluppare e mantenere programmi migliori

All but the simplest problems that we face in software development exceed the capacity of our minds. Our short-term memory can barely hold 7-8 items on a good day, and our computing capacity is almost non-measurable against computers.

Tutti, tranne i più semplici, i problemi che incontriamo nello sviluppo del software richiedono una capacità di elaborazione e di memoria superiore a quella della nostra mente. La nostra memoria a breve termine riesce a ricordare 7-8 oggetti al massimo, e la nostra capacità di elaborazione in relazione a quella dei computer è infinitesimale. – 1400 Miliardi di hash decifrati e ricercabili

Giusto per ricordare che MD5 e SHA1 sono da abbandonare come metodo di archiviazione delle password.

HashKiller’s purpose is to serve as a meeting place for computer hobbyists, security researchers and penetration testers. It serves as a central location to promote greater security on the internet by demonstrating the weakness of using hash based storage / authentication.

Sorgente:, Over 1.45387 trillion decrypted hashes in total, Free Hash Cracker, Online Hash Cracker