<?xml version="1.0" encoding="UTF-8"?>
<urlset
xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"  
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"  
xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9  
http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"> 
<url>
  <loc>https://blog.saverioriotto.it/</loc>  
</url>
<url>
  <loc>https://blog.saverioriotto.it/page/85/cookie-policy</loc>  
</url>
<url>
  <loc>https://blog.saverioriotto.it/page/71/about</loc> 
</url>
<url>
  <loc>https://blog.saverioriotto.it/blog/</loc>
</url><url><loc>https://blog.saverioriotto.it/blog/386/programmazione/perche-non-dovresti-copiare-il-codice-di-spring-boot-3-generato-dallia</loc><lastmod>2026-03-27T12:28:20+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/385/devops/minio-dice-addio-allopen-source-puro-cosa-sta-succedendo-e-quali-sono-i-rischi</loc><lastmod>2026-02-26T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/384/sicurezza-informatica/deepfake-e-social-engineering-perche-nel-2026-il-phishing-e-diventato-indistinguibile-dalla-realta</loc><lastmod>2026-02-16T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/250/programmazione/spring-vs-spring-boot-conosciamo-le-differenze</loc><lastmod>2025-11-11T19:10:42+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/383/intelligenza-artificiale/deepfake-di-massa-e-crisi-della-realta-sora-2-e-il-punto-di-non-ritorno</loc><lastmod>2025-10-24T17:13:09+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/382/sicurezza-informatica/oltre-la-password-come-lai-sta-rendendo-il-phishing-invisibile-e-le-nuove-difese</loc><lastmod>2025-10-13T10:32:37+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/381/intelligenza-artificiale/ollama-e-modelli-llm-differenze-usi-e-metodi-ottimali-per-le-applicazioni</loc><lastmod>2025-09-25T11:59:51+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/380/sicurezza-informatica/telecamere-hackerate-come-proteggere-la-tua-privacy-online</loc><lastmod>2025-09-09T12:11:44+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/379/sicurezza-informatica/il-dettaglio-nelle-tue-storie-che-regali-agli-hacker-senza-saperlo</loc><lastmod>2025-07-30T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/378/intelligenza-artificiale/llm-e-intelligenza-artificiale-guida-semplice-per-tutti</loc><lastmod>2025-07-10T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/377/programmazione/bytecode-manipulation-e-aop-estendere-il-comportamento-del-codice-senza-modificarlo</loc><lastmod>2025-07-07T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/376/devops/api-key-leak-nelle-pipeline-cicd-come-proteggere-i-tuoi-secret</loc><lastmod>2025-06-24T12:08:05+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/375/sicurezza-informatica/mitre-attck-cose-e-perche-e-fondamentale-per-la-sicurezza-informatica</loc><lastmod>2025-05-19T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/374/sicurezza-informatica/la-cyber-kill-chain-le-fasi-di-unintrusione-cibernetica</loc><lastmod>2025-05-14T13:10:45+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/372/sicurezza-informatica/data-carving-cose-e-come-funziona</loc><lastmod>2025-05-05T13:23:17+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/371/sicurezza-informatica/analisi-di-memorie-di-massa-il-ruolo-chiave-nella-cybersecurity-moderna</loc><lastmod>2025-04-28T12:01:26+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/370/programmazione/coding-assistito-da-ai-nel-2025-sfide-opportunita-e-best-practice</loc><lastmod>2025-04-23T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/373/sicurezza-informatica/la-nuova-truffa-online-che-sta-ingannando-migliaia-di-persone-ecco-come-riconoscerla</loc><lastmod>2025-04-06T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/369/programmazione/programmazione-reattiva-avanzata-con-akka-streams-guida-completa</loc><lastmod>2025-03-24T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/368/sicurezza-informatica/reverse-engineering-di-malware-moderni-tecniche-avanzate</loc><lastmod>2025-03-10T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/367/programmazione/rust-per-la-sicurezza-costruire-strumenti-di-pentesting-affidabili</loc><lastmod>2025-02-27T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/366/programmazione/webassembly-la-chiave-per-applicazioni-web-ultraveloci-nel-2025-guida-pratica-per-sviluppatori</loc><lastmod>2025-02-21T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/365/programmazione/come-funzionano-gli-algoritmi-di-backtracking-guida-completa-per-principianti-ed-esperti</loc><lastmod>2025-02-14T12:32:23+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/364/sicurezza-informatica/sharenting-proteggi-i-tuoi-bambini-e-la-tua-famiglia-dal-pericolo-online</loc><lastmod>2025-02-04T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/363/sicurezza-informatica/cyberbullismo-come-difendersi-e-combatterlo</loc><lastmod>2025-01-31T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/362/intelligenza-artificiale/turing-bots-rivoluzione-nello-sviluppo-del-software-e-nella-generazione-di-codice</loc><lastmod>2025-01-20T12:15:53+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/361/programmazione/continuare-con-rust-librerie-utili-e-progetti-open-source</loc><lastmod>2025-01-16T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/359/programmazione/progetto-pratico-in-rust-generatore-di-password-sicure</loc><lastmod>2025-01-15T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/358/programmazione/error-handling-in-rust-panics-option-e-result</loc><lastmod>2025-01-13T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/360/sicurezza-informatica/vpn-cose-come-funziona-e-perche-usarla-per-la-sicurezza-dei-dati</loc><lastmod>2025-01-13T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/357/programmazione/concurrency-in-rust-thread-canali-e-programmazione-asincrona</loc><lastmod>2025-01-10T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/355/programmazione/rust-e-programmazione-funzionale-closure-map-e-filter</loc><lastmod>2025-01-08T15:19:24+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/356/sicurezza-informatica/lintelligenza-artificiale-nella-cybersecurity-opportunita-e-rischi-del-2025</loc><lastmod>2025-01-08T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/354/programmazione/lavorare-con-collezioni-in-rust-vettori-array-e-iteratori</loc><lastmod>2024-12-23T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/353/programmazione/tipi-avanzati-in-rust-strutture-enum-e-pattern-matching</loc><lastmod>2024-12-20T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/352/programmazione/ownership-borrowing-e-lifetimes-come-rust-gestisce-la-memoria</loc><lastmod>2024-12-18T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/351/programmazione/funzioni-in-rust-scrivi-codice-ordinato-e-riutilizzabile</loc><lastmod>2024-12-16T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/350/programmazione/condizioni-e-cicli-in-rust-controlla-il-flusso-del-tuo-programma</loc><lastmod>2024-12-13T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/349/programmazione/rust-per-principianti-tipi-di-dati-variabili-e-mutabilita</loc><lastmod>2024-12-10T16:50:16+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/348/programmazione/corso-di-programmazione-in-rust-guida-completa-per-principianti</loc><lastmod>2024-12-06T11:18:57+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/346/sicurezza-informatica/zero-trust-architecture-implementazioni-avanzate-e-sfide-per-infrastrutture-complesse</loc><lastmod>2024-11-28T11:59:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/342/devops/migrazione-e-ottimizzazione-di-applicazioni-legacy-nel-cloud-guida-completa</loc><lastmod>2024-11-26T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/344/sicurezza-informatica/levoluzione-del-ransomware-e-lattacco-alla-supply-chain-di-solarwinds-e-kaseya-lezioni-e-strategie-di-difesa</loc><lastmod>2024-11-19T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/343/programmazione/guida-completa-alle-adr-nellarchitettura-software-cosa-sono-e-come-utilizzarle</loc><lastmod>2024-11-12T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/341/devops/metriche-dora-guida-completa-per-misurare-le-performance-devops</loc><lastmod>2024-11-05T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/340/programmazione/modelli-avanzati-di-cqrs-e-event-sourcing-in-applicazioni-su-architettura-a-microservizi</loc><lastmod>2024-10-29T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/339/sicurezza-informatica/attacchi-supply-chain-come-difendersi-e-prevenire-vulnerabilita-nella-filiera-del-software</loc><lastmod>2024-10-22T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/338/sicurezza-informatica/sicurezza-delle-api-autenticazione-e-autorizzazione-oltre-oauth2</loc><lastmod>2024-10-18T12:19:32+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/347/programmazione/i-diversi-metodi-di-crittografia-del-database-una-guida-completa-per-la-sicurezza-dei-dati</loc><lastmod>2024-06-22T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/337/intelligenza-artificiale/librerie-python-per-il-machine-learning-panoramica-dettagliata</loc><lastmod>2024-04-15T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/333/intelligenza-artificiale/introduzione-al-machine-learning-svelare-i-segreti-dellintelligenza-artificiale</loc><lastmod>2024-04-08T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/336/programmazione/integrazione-di-swagger-3-in-unapplicazione-rest-con-spring-boot</loc><lastmod>2024-04-05T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/335/programmazione/proteggere-le-api-rest-di-springboot-3-con-autenticazione-jwt-e-ruoli</loc><lastmod>2024-04-04T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/345/programmazione/cosa-non-ti-dicono-su-javascript-10-errori-che-devi-evitare</loc><lastmod>2024-04-04T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/332/sicurezza-informatica/cybersecurity-per-linternet-of-things-iot-e-lindustria-40-proteggere-il-futuro-connesso</loc><lastmod>2024-04-03T13:00:46+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/329/sicurezza-informatica/metasploit-esplorare-il-potere-del-pentesting-con-esempi-pratici-e-approfondimenti</loc><lastmod>2024-03-27T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/328/sicurezza-informatica/affrontare-le-vulnerabilita-del-software-limportanza-della-sicurezza-della-memoria</loc><lastmod>2024-03-22T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/327/programmazione/criteria-vs-specification-in-spring-boot-qual-e-la-scelta-migliore</loc><lastmod>2024-03-11T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/326/programmazione/crittografia-omomorfica-sicurezza-e-analisi-senza-decifrare</loc><lastmod>2024-03-05T15:39:20+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/313/sicurezza-informatica/sicurezza-e-privacy-bilanciare-sorveglianza-hacking-etico-e-responsabilita-dei-ricercatori</loc><lastmod>2024-01-08T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/312/programmazione/mtbf-mttf-mttr-e-mttd-nello-sviluppo-del-software</loc><lastmod>2023-12-18T22:14:11+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/311/tecnologia/blockchain-e-ai-combinazione-perfetta</loc><lastmod>2023-12-12T17:34:08+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/310/informatica-generale/kong-api-gateway-ottimizzazione-e-gestione-delle-comunicazioni-nellarchitettura-delle-app-moderne</loc><lastmod>2023-12-01T22:56:03+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/309/programmazione/three-tier-architecture-cose-larchitettura-a-tre-livelli</loc><lastmod>2023-10-10T06:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/308/programmazione/java-stream-api-funzioni-comunemente-utilizzate-con-esempi</loc><lastmod>2023-10-02T06:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/307/tutorial/creazione-di-un-job-di-elaborazione-dati-in-spring-batch-passo-dopo-passo</loc><lastmod>2023-09-25T06:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/305/programmazione/java-21-cosa-ce-di-nuovo</loc><lastmod>2023-09-20T21:13:34+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/304/devops/osservabilita-massimizzare-lefficienza-e-la-resilienza-dei-processi</loc><lastmod>2023-07-27T06:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/303/programmazione/entity-framework-core-il-dbcontext</loc><lastmod>2023-07-12T06:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/302/programmazione/application-logging-best-practice-per-un-sistema-efficiente-e-sicuro</loc><lastmod>2023-07-05T17:53:14+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/301/tutorial/entity-framework-core-creazione-dei-modelli-partendo-da-un-database-esistente</loc><lastmod>2023-06-30T06:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/300/tutorial/guida-completa-allutilizzo-del-protocollo-grpc-con-maven</loc><lastmod>2023-06-22T17:08:16+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/299/programmazione/net-8-scopri-le-nuove-funzionalita</loc><lastmod>2023-06-19T19:05:39+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/298/programmazione/guida-completa-sullautomazione-dei-test</loc><lastmod>2023-05-26T18:23:31+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/297/sicurezza-informatica/cactus-il-ransomware-che-elude-gli-antivirus-e-sfrutta-i-difetti-della-vpn-fortinet</loc><lastmod>2023-05-11T22:49:16+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/296/tutorial/creare-una-web-app-in-tempo-reale-con-blazor-e-signalr</loc><lastmod>2023-05-09T18:40:45+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/295/programmazione/blazor-la-tecnologia-che-sta-rivoluzionando-lo-sviluppo-web-con-net</loc><lastmod>2023-05-05T22:25:29+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/294/informatica-generale/che-cose-lelaborazione-del-linguaggio-naturale-nlp</loc><lastmod>2023-04-27T23:03:46+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/293/programmazione/extreme-programming-i-vantaggi-di-una-metodologia-agile</loc><lastmod>2023-04-11T18:10:25+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/292/informatica-generale/cose-il-processo-decisionale-basato-sui-dati</loc><lastmod>2023-03-30T18:16:11+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/291/programmazione/introduzione-alle-specifiche-dei-requisiti-software-srs</loc><lastmod>2023-03-20T19:52:12+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/290/programmazione/come-migliorare-la-qualita-del-software-limportanza-del-testing-statico</loc><lastmod>2023-03-15T15:30:39+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/289/sicurezza-informatica/ecco-come-proteggere-la-tua-rete-dal-pericoloso-attacco-arp-poisoning</loc><lastmod>2023-03-02T22:49:41+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/288/informatica-generale/principi-fondamentali-del-machine-learning</loc><lastmod>2023-02-28T19:21:58+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/287/tutorial/creare-una-web-app-in-tempo-reale-con-react-e-firebase</loc><lastmod>2023-02-24T21:56:58+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/286/sicurezza-informatica/come-utilizzare-nmap-per-proteggere-la-tua-rete-dagli-attacchi-informatici</loc><lastmod>2023-02-16T23:31:21+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/285/sicurezza-informatica/come-proteggere-il-tuo-sito-web-da-attacchi-sql-injection</loc><lastmod>2023-02-06T17:54:37+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/284/programmazione/come-utilizzare-le-eccezioni-in-java</loc><lastmod>2023-01-30T17:59:27+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/283/programmazione/cose-il-behaviour-driven-development-bdd-e-cosa-lo-differenzia-dal-tdd</loc><lastmod>2023-01-23T06:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/282/tutorial/apache-maven-guida-rapida-allutilizzo</loc><lastmod>2023-01-13T22:34:54+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/281/programmazione/introduzione-a-maven-guida-per-principianti</loc><lastmod>2023-01-09T19:30:38+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/280/tecnologia/chat-gpt-cosa-rende-questa-ia-unica</loc><lastmod>2023-01-04T19:29:40+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/279/programmazione/scrivere-test-cases-di-successo</loc><lastmod>2022-12-15T21:13:15+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/278/programmazione/skills-essenziali-che-ogni-programmatore-java-deve-avere</loc><lastmod>2022-12-12T01:17:45+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/277/devops/networking-in-docker-e-comandi-piu-utilizzati-dai-sviluppatori</loc><lastmod>2022-12-03T22:32:09+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/276/tutorial/avviare-unapplicazione-spring-boot-su-container-docker</loc><lastmod>2022-11-03T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/275/tutorial/integrazione-di-swagger-20-in-unapplicazione-rest-con-spring-boot</loc><lastmod>2022-10-20T11:30:23+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/274/programmazione/10-anni-di-typescript-una-breve-panoramica</loc><lastmod>2022-10-03T15:27:58+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/273/informatica-generale/function-as-a-servicefaas-introduzione-dettagli-e-quando-utilizzarlo</loc><lastmod>2022-09-23T11:35:31+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/272/sicurezza-informatica/fuzzing-cosa-si-cela-dietro-questo-metodo-di-test-automatico</loc><lastmod>2022-09-20T16:50:29+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/271/programmazione/chaos-engineering-cose-e-a-cosa-serve</loc><lastmod>2022-09-05T13:09:55+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/270/programmazione/mock-server-cose-e-perche-utilizzarlo</loc><lastmod>2022-09-01T12:37:07+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/269/informatica-generale/tensorflow-scopriamolo-nel-dettaglio</loc><lastmod>2022-08-25T16:33:48+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/268/informatica-generale/grpc-panoramica-e-principali-differenze-con-il-servizio-rest</loc><lastmod>2022-08-09T13:28:55+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/267/programmazione/software-quality-assurance-sqa-quanto-e-importante-nello-sviluppo-del-software</loc><lastmod>2022-08-04T15:29:07+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/266/sicurezza-informatica/lockbit-30-dettagli-e-come-proteggersi</loc><lastmod>2022-07-26T13:04:03+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/265/tutorial/proteggere-le-api-rest-spring-boot-con-autenticazione-jwt-e-ruoli</loc><lastmod>2022-07-25T16:36:18+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/264/devops/infrastructure-as-code-dettagli-e-benefici</loc><lastmod>2022-07-19T16:04:27+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/263/tutorial/creare-un-servizio-rest-api-in-java-con-spring-boot</loc><lastmod>2022-06-24T16:56:47+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/262/sicurezza-informatica/helloxd-il-nuovo-ransomware-per-linux-e-windows</loc><lastmod>2022-06-16T16:26:22+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/261/informatica-generale/big-data-cosa-sono-e-perche-sono-importanti</loc><lastmod>2022-06-07T12:55:12+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/260/programmazione/dsdm-scopriamo-il-metodo-di-sviluppo-dinamico-dei-sistemi</loc><lastmod>2022-06-03T12:55:04+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/259/programmazione/principali-attributi-di-qualita-del-software</loc><lastmod>2022-05-31T16:12:18+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/258/programmazione/scrum-il-product-backlog</loc><lastmod>2022-05-25T10:30:07+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/257/sicurezza-informatica/vulnerability-assessment-va-che-cose-e-perche-e-importante</loc><lastmod>2022-05-17T17:31:09+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/256/programmazione/cose-il-test-driven-development-tdd</loc><lastmod>2022-05-11T11:45:25+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/255/programmazione/metodologia-scrum-cose-e-come-funziona</loc><lastmod>2022-05-05T13:30:14+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/253/sicurezza-informatica/attacco-syn-flood-cose-e-come-prevenirlo</loc><lastmod>2022-05-02T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/252/sicurezza-informatica/tools-essenziali-per-effettuare-penetration-test-pt</loc><lastmod>2022-04-27T14:36:08+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/251/sicurezza-informatica/cose-un-penetration-test-pt-e-come-funziona</loc><lastmod>2022-04-21T12:56:40+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/228/programmazione/principali-tendenze-di-sviluppo-software-del-2022</loc><lastmod>2022-04-20T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/241/programmazione/modelli-essenziali-per-larchitettura-del-software</loc><lastmod>2022-04-14T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/249/programmazione/step-essenziali-per-una-corretta-pianificazione-dello-sviluppo-del-software</loc><lastmod>2022-04-04T11:56:55+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/248/sicurezza-informatica/spring4shell-vulnerabilita-zero-day-nel-framework-spring-core-java</loc><lastmod>2022-03-31T17:28:05+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/244/programmazione/codice-legacy-sicurezza-in-ambienti-agile</loc><lastmod>2022-03-28T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/246/sicurezza-informatica/b1txor20-la-botnet-linux-che-utilizza-il-tunnel-dns-e-lexploit-log4j</loc><lastmod>2022-03-17T15:15:03+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/230/programmazione/limportanza-della-tracciabilita-nel-ciclo-di-vita-del-software</loc><lastmod>2022-03-16T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/226/sicurezza-informatica/malware-polimorfico-vs-metamorfico</loc><lastmod>2022-03-08T14:59:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/222/tutorial/utilizzo-sicuro-delle-api-di-docker</loc><lastmod>2022-02-23T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/223/devops/lavorare-su-piu-host-con-lutilizzo-dei-contesti-docker</loc><lastmod>2022-02-18T11:39:07+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/221/programmazione/opengitops-cose-e-i-vari-principi-che-lo-comprendono</loc><lastmod>2022-02-14T11:37:57+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/220/tutorial/come-eseguire-mysql-in-un-container-docker</loc><lastmod>2022-01-28T17:23:14+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/219/tutorial/ispezionare-il-contenuto-di-unimmagine-docker-senza-avviare-il-container</loc><lastmod>2022-01-19T10:55:13+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/218/sicurezza-informatica/sysjoker-il-nuovo-malware-backdoor-che-interessa-windows-macos-linux</loc><lastmod>2022-01-13T13:33:03+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/215/programmazione/sviluppo-cloud-native-cose-e-quali-sono-i-vantaggi</loc><lastmod>2022-01-11T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/214/informatica-generale/bug-y2k22-microsoft-corregge-un-grave-bug-su-exchange</loc><lastmod>2022-01-03T19:19:32+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/217/programmazione/c-10-cosa-ce-di-nuovo</loc><lastmod>2021-12-28T09:58:26+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/213/sicurezza-informatica/apache-log4j-scoperta-vulnerabilita-critica-nella-libreria</loc><lastmod>2021-12-13T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/212/programmazione/creare-un-servizio-api-rest-di-alta-qualita</loc><lastmod>2021-12-09T12:06:33+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/211/programmazione/test-funzionali-come-scegliere-il-miglior-strumento-per-i-tuoi-progetti</loc><lastmod>2021-12-01T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/210/programmazione/vantaggi-dellutilizzo-di-uml-nello-sviluppo-agile</loc><lastmod>2021-11-26T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/204/sicurezza-informatica/sviluppare-applicazioni-web-sicure</loc><lastmod>2021-11-18T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/205/devops/docker-compose-che-cose-e-come-si-usa</loc><lastmod>2021-11-17T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/209/devops/cosa-sono-i-volumi-docker-e-come-utilizzarli</loc><lastmod>2021-11-12T11:24:22+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/208/tutorial/come-montare-una-directory-host-in-un-contentainer-docker</loc><lastmod>2021-11-12T11:16:12+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/207/tutorial/come-aggiornare-i-container-docker-per-applicare-gli-aggiornamenti-delle-immagini</loc><lastmod>2021-11-12T11:12:17+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/206/tutorial/passaggio-delle-variabili-di-ambiente-ai-contenitori-docker</loc><lastmod>2021-11-11T17:43:52+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/203/programmazione/il-ruolo-della-programmazione-nella-scienza-dei-dati</loc><lastmod>2021-11-08T11:59:06+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/202/programmazione/principi-solid-introduzione-allarchitettura-e-al-design-del-software</loc><lastmod>2021-10-12T15:18:39+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/201/sicurezza-informatica/apache-risolve-importanti-vulnerabilita-zero-day-nel-server-http</loc><lastmod>2021-10-08T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/200/programmazione/riutilizzo-del-codice-cose-e-principali-vantaggi-per-i-programmatori</loc><lastmod>2021-10-07T12:07:59+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/199/programmazione/che-cose-lingegneria-dellaffidabilita-del-sito-sre</loc><lastmod>2021-10-06T12:22:34+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/197/programmazione/git-flow-il-flusso-di-lavoro-per-la-gestione-dei-rilasci</loc><lastmod>2021-09-30T16:13:53+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/193/programmazione/circleci-vs-jenkins</loc><lastmod>2021-09-28T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/188/programmazione/come-garantire-la-sicurezza-devops-in-ambienti-cicd</loc><lastmod>2021-09-22T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/196/programmazione/java-vs-javascript-le-differenze-piu-importanti-che-devi-conoscere</loc><lastmod>2021-09-21T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/195/programmazione/java-17-disponibile-la-nuova-versione-con-supporto-a-lungo-termine</loc><lastmod>2021-09-17T16:56:47+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/194/sicurezza-informatica/cryptojacking-cose-e-come-difendersi</loc><lastmod>2021-09-16T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/192/programmazione/php-vs-nodejs-conosciamo-le-differenze</loc><lastmod>2021-09-15T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/191/informatica-generale/strategia-cloud-italia-nuovo-impulso-per-la-digitalizzazione-della-pa</loc><lastmod>2021-09-13T16:49:38+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/189/programmazione/quando-utilizzare-nodejs-lato-back-end</loc><lastmod>2021-09-09T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/187/programmazione/cose-il-low-code-development</loc><lastmod>2021-09-01T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/185/programmazione/cose-il-ciclo-di-vita-dello-sviluppo-del-software-sdlc</loc><lastmod>2021-08-12T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/186/programmazione/container-e-microservizi-qual-e-la-differenza</loc><lastmod>2021-08-09T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/183/programmazione/devops-in-cloud-best-practice</loc><lastmod>2021-08-06T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/182/programmazione/devops-vs-agile-conosciamo-le-differenze</loc><lastmod>2021-08-03T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/181/programmazione/comprensione-e-gestione-del-rischio-nello-sviluppo-del-software</loc><lastmod>2021-07-29T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/175/tutorial/come-memorizzare-correttamente-le-password-in-un-database</loc><lastmod>2021-07-28T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/178/sicurezza-informatica/trickbot-cosa-ce-da-sapere</loc><lastmod>2021-07-27T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/180/programmazione/come-scrivere-codice-di-qualita</loc><lastmod>2021-07-26T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/179/programmazione/quali-framework-sono-i-piu-promettenti-nello-sviluppo-di-app-aziendali</loc><lastmod>2021-07-21T16:37:40+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/174/programmazione/che-cose-jenkins-caratteristiche-e-architettura</loc><lastmod>2021-07-21T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/177/informatica-generale/cbl-mariner-la-nuova-distribuzione-linux-di-microsoft</loc><lastmod>2021-07-19T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/173/programmazione/containers-vs-vms-conosciamo-le-differenze</loc><lastmod>2021-07-15T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/172/sicurezza-informatica/printnightmare-vulnerabilita-critica-dello-spooler-di-stampa-di-windows</loc><lastmod>2021-07-12T16:41:20+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/171/programmazione/firebase-cose-e-come-funziona</loc><lastmod>2021-07-12T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/170/sicurezza-informatica/in-che-modo-tls-protegge-le-tue-attivita-sul-web</loc><lastmod>2021-07-05T15:51:47+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/169/programmazione/junit-framework-di-test-java</loc><lastmod>2021-07-01T17:06:02+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/168/informatica-generale/quic-il-nuovo-protocollo-basato-su-udp-sviluppato-da-google</loc><lastmod>2021-06-24T15:24:55+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/167/programmazione/che-cose-una-pipeline-cicd</loc><lastmod>2021-06-16T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/166/programmazione/implementazione-canary-vs-blue-green</loc><lastmod>2021-06-13T12:40:34+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/162/programmazione/continuous-integration-continuous-delivery-cicd</loc><lastmod>2021-06-08T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/165/informatica-generale/microsoft-annuncia-la-fine-ufficiale-di-internet-explorer</loc><lastmod>2021-05-21T12:35:45+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/164/programmazione/xamarinforms-fine-del-supporto</loc><lastmod>2021-05-17T11:43:04+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/163/programmazione/jaxb-marshalling-e-unmarshalling</loc><lastmod>2021-05-10T17:27:10+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/161/programmazione/soap-vs-rest-conosciamo-le-differenze</loc><lastmod>2021-02-05T12:11:14+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/159/sicurezza-informatica/cose-un-data-breach</loc><lastmod>2020-10-15T18:04:48+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/158/sicurezza-informatica/le-app-infette-da-malware-joker-ancora-una-volta-ignorano-la-sicurezza-di-google-per-diffondersi-tramite-play-store</loc><lastmod>2020-09-29T17:18:14+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/157/tutorial/deploy-di-un-war-su-tomcat-in-docker</loc><lastmod>2020-09-23T17:47:59+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/156/tutorial/come-usare-docker</loc><lastmod>2020-09-23T13:13:21+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/155/tutorial/-come-installare-docker-su-centos</loc><lastmod>2020-09-22T18:04:30+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/154/tecnologia/il-datacenter-sottomarino-di-microsoft-torna-in-superficie</loc><lastmod>2020-09-16T14:48:03+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/153/programmazione/github-lancia-il-suo-container-registry</loc><lastmod>2020-09-16T12:22:30+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/152/programmazione/amazon-corretto-la-distribuzione-openjdk-di-amazon</loc><lastmod>2020-09-11T15:03:22+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/150/sicurezza-informatica/gang-evil-corp-colpisce-ancora-con-il-nuovo-ransomware-wastedlocker-</loc><lastmod>2020-06-25T11:55:20+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/148/programmazione/che-cose-lapi-differenza-tra-rest-e-graphql</loc><lastmod>2020-06-09T10:38:02+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/147/sicurezza-informatica/aws-distribuisce-il-detective-di-amazon-per-prevenire-i-problemi-di-sicurezza-del-cloud</loc><lastmod>2020-06-04T16:39:37+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/146/programmazione/novita-di-mariadb-104</loc><lastmod>2020-05-25T11:02:52+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/145/lo-sapevi-che/alcune-cose-che-non-conosci-dei-programmatori</loc><lastmod>2020-05-21T11:49:36+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/144/sicurezza-informatica/ramsay-il-nuovo-malware-che-puo-rubare-documenti-sensibili-da-reti-air-gapped</loc><lastmod>2020-05-18T13:19:11+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/143/sicurezza-informatica/kaiji-il-nuovo-malware-che-attacca-i-dispositivi-iot</loc><lastmod>2020-05-11T10:21:55+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/142/programmazione/top-migliori-linguaggi-di-programmazione-futuri</loc><lastmod>2020-05-03T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/141/sicurezza-informatica/ios-falla-di-sicurezza-consente-agli-hacker-di-attaccare-i-dispositivi-tramite-email</loc><lastmod>2020-04-27T17:49:08+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/140/sicurezza-informatica/zoom-i-malintenzionati-sfruttano-la-popolarita-di-zoom-per-effettuare-campagne-di-phishing</loc><lastmod>2020-04-23T12:54:27+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/139/programmazione/che-cose-docker</loc><lastmod>2020-04-16T18:16:45+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/138/programmazione/kubernetes-cosa-fa-effettivamente-e-perche-si-usa</loc><lastmod>2020-04-16T18:09:04+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/137/programmazione/che-cose-helm-e-perche-e-importante-per-le-implementazioni-di-kubernetes</loc><lastmod>2020-04-16T18:00:47+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/131/sicurezza-informatica/ssl-vs-tls-qual-e-la-differenza</loc><lastmod>2020-04-16T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/136/sicurezza-informatica/monitorminor-il-nuovo-super-stalkerware-che-spia-gli-utenti</loc><lastmod>2020-03-23T17:21:56+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/135/sicurezza-informatica/necurs-botnet-microsoft-ha-smantellato-la-piu-grande-botnet-del-mondo</loc><lastmod>2020-03-12T10:38:50+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/134/sicurezza-informatica/coronavirus-attenti-alle-truffe-informatiche</loc><lastmod>2020-03-10T16:05:25+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/133/sicurezza-informatica/surfingattack-attacco-hacker-tramite-onde-ultrasoniche</loc><lastmod>2020-03-05T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/132/sicurezza-informatica/kr00k-vulnerabilita-wifi-per-miliardi-di-device</loc><lastmod>2020-03-02T12:01:27+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/130/tecnologia/utilizzo-di-suoni-e-luci-per-generare-trasferimenti-di-dati-ultraveloci</loc><lastmod>2020-02-21T12:44:51+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/129/sicurezza-informatica/dos-e-ddos-cosa-sono-e-quali-sono-le-differenze</loc><lastmod>2020-02-10T11:54:47+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/128/sicurezza-informatica/pharming-cose-e-come-difendersi</loc><lastmod>2020-01-31T12:20:36+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/127/tecnologia/xagent-malware-russo-che-colpisce-i-mac</loc><lastmod>2020-01-27T12:28:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/126/tecnologia/perche-un-computer-non-puo-mai-essere-veramente-cosciente</loc><lastmod>2020-01-24T13:29:26+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/125/sicurezza-informatica/wordpress-falle-gravi-per-tre-plugin</loc><lastmod>2020-01-21T15:00:43+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/124/informatica-generale/windows-7-microsoft-dichiara-la-fine-del-supporto-tecnico</loc><lastmod>2020-01-20T15:50:48+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/123/sicurezza-informatica/gli-hacker-di-trickbot-creano-nuove-backdoor-furtive-per-obiettivi-di-alto-valore</loc><lastmod>2020-01-13T12:46:20+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/121/programmazione/java-12-cosa-ce-di-nuovo</loc><lastmod>2020-01-08T11:32:45+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/120/sicurezza-informatica/facebook-esposti-online-i-dati-di-267-millioni-di-utenti</loc><lastmod>2019-12-20T17:42:01+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/117/sicurezza-informatica/attacco-forkbomb-cose-e-come-difendersi</loc><lastmod>2019-12-13T16:01:48+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/116/tecnologia/primo-test-italiano-di-crittografia-quantistica</loc><lastmod>2019-12-10T12:49:33+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/115/sicurezza-informatica/vulnerabilita-di-linux-consente-agli-aggressori-di-dirottare-le-connessioni-vpn</loc><lastmod>2019-12-09T09:58:25+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/114/sicurezza-informatica/kaspersky-ha-scoperto-un-nuovo-ransomware-destinato-ai-nas</loc><lastmod>2019-12-03T10:01:34+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/113/sicurezza-informatica/-il-bug-spoofing-di-android-aiuta-a-colpire-i-conti-bancari</loc><lastmod>2019-12-02T13:30:59+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/111/sicurezza-informatica/comprendere-i-rischi-per-la-sicurezza-su-internet-del-protocollo-di-desktop-remoto</loc><lastmod>2019-12-02T12:14:57+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/112/sicurezza-informatica/le-differenze-tra-crittografia-simmetrica-e-asimmetrica</loc><lastmod>2019-12-02T00:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/110/sicurezza-informatica/la-nuova-tecnica-del-file-system-microsoft-puo-rendere-il-ransomware-ldquoinvisibilerdquo</loc><lastmod>2019-11-28T10:50:51+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/109/sicurezza-informatica/esperti-non-riavviare-il-computer-dopo-essere-stato-infettato-da-ransomware</loc><lastmod>2019-11-27T17:01:28+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/108/sicurezza-informatica/vittima-di-hakbit-ransomware-adesso-puoi-recuperare-i-dati</loc><lastmod>2019-11-26T14:52:42+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/107/sicurezza-informatica/-il-difetto-dellapp-della-fotocamera-di-google-ha-messo-in-pericolo-milioni-di-dispositivi</loc><lastmod>2019-11-22T13:03:17+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/106/sicurezza-informatica/windows-update-falso-installa-cyborg-ransomware</loc><lastmod>2019-11-21T15:10:20+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/105/sicurezza-informatica/scoperta-vulnerabilita-legata-allesecuzione-di-codice-in-teamviewer</loc><lastmod>2019-11-20T17:50:11+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/104/tecnologia/onde-sonore-per-i-display-in-3d-del-futuro</loc><lastmod>2019-11-20T13:30:16+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/103/sicurezza-informatica/</loc><lastmod>2019-11-19T10:17:35+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/102/sicurezza-informatica/facebook-bug-accende-la-fotocamera-delliphone-in-background-mentre-si-scorre-il-feed</loc><lastmod>2019-11-14T10:35:48+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/101/sicurezza-informatica/</loc><lastmod>2019-11-13T11:46:37+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/100/sicurezza-informatica/fireeye-threat-monitoring-difende-le-aziende-dal-dark-open-web</loc><lastmod>2019-11-11T15:27:33+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/99/sicurezza-informatica/</loc><lastmod>2019-11-10T12:57:38+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/98/programmazione/</loc><lastmod>2019-11-07T15:21:10+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/97/programmazione/librerie-java-piu-utili-per-i-programmatori</loc><lastmod>2019-11-07T09:49:05+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/96/programmazione/6-utili-strumenti-da-riga-di-comando-che-ogni-sviluppatore-java-dovrebbe-conoscere</loc><lastmod>2019-11-06T17:17:17+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/95/sicurezza-informatica/</loc><lastmod>2019-11-06T17:00:16+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/94/sicurezza-informatica/</loc><lastmod>2019-11-05T12:40:22+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/93/sicurezza-informatica/</loc><lastmod>2019-11-05T10:31:41+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/92/sicurezza-informatica/il-nuovo-malware-xhelper-irremovibile-ha-infettato-45000-dispositivi-android</loc><lastmod>2019-10-30T10:10:01+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/91/sicurezza-informatica/attacco-hacker-a-unicredit-trafugati-i-dati-dei-clienti</loc><lastmod>2019-10-29T17:00:37+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/90/sicurezza-informatica/apple-rimuove-le-app-ios-dannose-infette-da-trojan-clicker</loc><lastmod>2019-10-28T15:08:22+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/89/sicurezza-informatica/microsoft-sql-server-11-e-12-sotto-attacco-da-un-nuovo-malware</loc><lastmod>2019-10-24T12:39:51+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/88/sicurezza-informatica/gli-hacker-hanno-implementato-plugin-falsi-updraftplus-con-backdoor-per-infettare-i-siti-web-wordpress</loc><lastmod>2019-10-23T16:46:10+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/87/sicurezza-informatica/hackerata-una-delle-piu-famose-vpn</loc><lastmod>2019-10-22T11:16:24+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/86/sicurezza-informatica/-facebook-ora-paga-gli-hacker-per-aver-segnalato-bug-di-sicurezza-nelle-app-di-terze-parti</loc><lastmod>2019-10-21T10:48:42+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/85/sicurezza-informatica/una-vulnerabilita-in-instagram-espone-informazioni-personali-degli-utenti</loc><lastmod>2019-10-17T15:30:55+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/84/sicurezza-informatica/piccola-guida-ai-cyberattacchi</loc><lastmod>2019-10-16T11:58:33+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/83/sicurezza-informatica/italia-sotto-attacco-informatico-il-rischio-emotet-e-come-difendersi</loc><lastmod>2019-10-11T13:18:10+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/82/sicurezza-informatica/un-trojan-ti-ruba-tutti-i-dati-mentre-guardi-i-video-youtube</loc><lastmod>2019-10-10T17:02:24+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/81/sicurezza-informatica/google-password-checkup-per-password-piu-sicure</loc><lastmod>2019-10-09T13:03:56+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/80/sicurezza-informatica/qual-e-la-differenza-tra-data-breach-e-data-leak</loc><lastmod>2019-10-08T15:07:03+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/79/tecnologia/fenotipizzazione-digitale-social-e-smartphone-spiano-la-nostra-salute</loc><lastmod>2019-10-07T11:19:50+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/78/sicurezza-informatica/perche-e-meglio-aggiornare-whatsapp-allultima-versione</loc><lastmod>2019-10-05T15:29:49+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/77/sicurezza-informatica/nuova-backdoor-in-grado-di-manipolare-i-file</loc><lastmod>2019-10-03T15:28:02+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/76/tecnologia/che-cose-la-memoria-dellacqua</loc><lastmod>2019-09-30T10:57:16+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/75/tecnologia/la-supremazia-quantistica-di-google-sarebbe-la-rivoluzione-tecnologica-del-secolo</loc><lastmod>2019-09-27T17:54:04+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/73/tecnologia/ufficiale-una-cometa-aliena-e-entrata-allinterno-del-nostro-sistema-solare</loc><lastmod>2019-09-26T16:05:14+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/72/tecnologia/facebook-compra-la-startup-che-controlla-i-dispositivi-con-il-pensiero</loc><lastmod>2019-09-25T15:05:09+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/71/tecnologia/google-potrebbe-aver-raggiunto-la-supremazia-quantistica</loc><lastmod>2019-09-23T11:14:35+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/70/sicurezza-informatica/whatsapp-rubati-dati-e-password-a-tutti-gli-utenti-in-questo-modo</loc><lastmod>2019-09-19T16:04:20+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/69/tecnologia/intelligenza-artificiale-piu-smart-grazie-a-un-vecchio-teorema-matematico</loc><lastmod>2019-09-16T15:19:24+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/68/sicurezza-informatica/allarme-simjacker-il-virus-che-trasforma-la-sim-in-microspia-a-rischio-un-miliardo-di-telefoni-cellulari</loc><lastmod>2019-09-16T13:27:06+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/67/tecnologia/particelle-di-suono-per-calcoli-piu-veloci</loc><lastmod>2019-09-12T13:08:11+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/66/tecnologia/computer-quantistici-generato-uno-stato-altamente-intrecciato-di-20-qubits</loc><lastmod>2019-09-04T13:15:23+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/60/matematica/ritarda-a-lezione-george-dantzigs-passa-alla-storia</loc><lastmod>2019-08-29T12:57:46+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/59/matematica/una-crittografia-che-non-si-puo-hackerare</loc><lastmod>2019-08-27T10:42:14+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/58/matematica/perche-lincognita-si-indica-con-la-lettera-x</loc><lastmod>2019-08-02T12:49:01+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/57/tecnologia/una-scoperta-matematica-grazie-a-the-big-bang-theory</loc><lastmod>2019-08-01T13:08:06+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/56/tecnologia/teletrasportare-i-qubit-e-possibile-grazie-allintelligenza-artificiale</loc><lastmod>2019-07-17T11:38:46+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/55/tecnologia/la-corsa-alla-supremazia-dei-computer-quantistici</loc><lastmod>2019-07-15T12:00:41+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/54/tecnologia/io-penso-e-il-computer-parla-per-me</loc><lastmod>2019-07-04T20:03:20+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/53/sicurezza-informatica/pochi-aggiornano-e-i-pirati-continuano-a-sfruttare-la-falla-in-windows</loc><lastmod>2019-06-12T10:41:08+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/52/tecnologia/lintelligenza-artificiale-alla-prova-dei-videogiochi-multiplayer</loc><lastmod>2019-06-01T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/51/tecnologia/il-senso-spontaneo-dei-numeri-di-unintelligenza-artificiale</loc><lastmod>2019-05-31T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/50/smartphone/huawei-e-google-che-cosa-ce-da-sapere</loc><lastmod>2019-05-29T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/49/tecnologia/space-x-ha-lanciato-i-primi-60-satelliti-di-oltre-4000-per-portare-internet-ovunque</loc><lastmod>2019-05-27T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/48/tecnologia/xprize-chi-sa-costruire-un-robot-che-replichi-vista-udito-e-tatto</loc><lastmod>2018-03-15T17:17:55+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/47/tecnologia/</loc><lastmod>2017-12-15T16:30:19+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/46/tecnologia/</loc><lastmod>2017-11-20T16:14:12+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/45/tecnologia/</loc><lastmod>2017-11-09T11:18:30+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/44/tecnologia/</loc><lastmod>2017-10-26T16:58:21+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/43/smartphone/</loc><lastmod>2017-10-25T15:17:45+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/42/tecnologia/</loc><lastmod>2017-10-23T12:40:34+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/41/sicurezza-informatica/</loc><lastmod>2017-10-18T10:13:39+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/40/sicurezza-informatica/</loc><lastmod>2017-10-17T11:48:34+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/39/tecnologia/</loc><lastmod>2017-10-16T11:43:52+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/37/tecnologia/cosa-ce-da-sapere-sullasteroide-che-sta-per-sfiorare-la-terra</loc><lastmod>2017-10-11T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/36/tecnologia/project-loon-i-palloni-aerostatici-di-google-in-soccorso-di-porto-rico</loc><lastmod>2017-10-09T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/35/tecnologia/perche-il-nobel-per-la-fisica-e-andato-alle-onde-gravitazionali</loc><lastmod>2017-10-06T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/33/tecnologia/una-tempesta-solare-da-record-su-marte</loc><lastmod>2017-10-05T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/34/informatica-generale/ludwig-il-motore-di-ricerca-delle-frasi-che-ti-aiuta-a-scrivere-in-inglese</loc><lastmod>2017-10-05T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/32/tecnologia/ce-la-nasa-a-milano</loc><lastmod>2017-10-02T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/31/tecnologia/</loc><lastmod>2017-09-28T09:16:22+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/30/informatica-generale/</loc><lastmod>2017-09-27T16:35:48+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/29/tecnologia/</loc><lastmod>2017-09-21T13:27:41+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/28/sicurezza-informatica/</loc><lastmod>2017-09-19T11:46:55+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/27/sicurezza-informatica/schneier-chi-sta-provando-a-spegnere-internet</loc><lastmod>2017-09-12T09:37:38+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/26/tecnologia/</loc><lastmod>2017-09-12T09:27:32+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/25/tecnologia/ci-sono-15-segnali-misteriosi-che-arrivano-dallo-spazio</loc><lastmod>2017-09-06T00:00:00+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/24/informatica-generale/google-mostrera-avvisi-sulle-emergenze-in-tempo-reale</loc><lastmod>2017-08-31T10:01:30+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/23/smartphone/le-novita-di-android-oreo</loc><lastmod>2017-08-30T10:12:53+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/22/sicurezza-informatica/hacking-genetico-la-nuova-frontiera-dellinsicurezza-informatica</loc><lastmod>2017-08-29T16:38:21+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/21/tecnologia/</loc><lastmod>2017-08-28T13:17:27+02:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/20/tecnologia/la-scoperta-dei-7-esopianeti-di-trappist-1-a-domande-e-risposte</loc><lastmod>2017-02-22T23:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/18/tecnologia/lormone-cerebrale-che-fa-bruciare-grasso</loc><lastmod>2017-01-30T23:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/19/tecnologia/gli-hacker-e-i-rischi-sulle-prenotazioni-aeree</loc><lastmod>2017-01-30T23:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/17/tecnologia/le-nuove-immagini-del-drone-in-volo-sul-campus-2-la-futura-astronave-di-apple</loc><lastmod>2017-01-17T23:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/16/tecnologia/velocita-della-luce-perche-non-e-possibile-superarla-in-nessun-caso</loc><lastmod>2016-12-06T23:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/15/tecnologia/exomars-puo-continuare-stanziati-i-finanziamenti</loc><lastmod>2016-12-05T23:00:00+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/13/tecnologia/ora-puoi-guardare-la-terra-con-gli-occhi-di-un-astronauta</loc><lastmod>2016-11-26T14:52:39+01:00</lastmod></url><url><loc>https://blog.saverioriotto.it/blog/12/tecnologia/intelligenza-artificiale-in-un-computer-quantistico</loc><lastmod>2016-11-25T23:00:00+01:00</lastmod></url></urlset>