<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
>

<channel>
	<title>Hackers Tribe</title>
	<atom:link href="https://hackerstribe.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://hackerstribe.com</link>
	<description>Programmazione, hacking e sicurezza informatica!</description>
	<lastBuildDate>Sat, 13 May 2023 10:13:58 +0000</lastBuildDate>
	<language>it-IT</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.8</generator>
<site xmlns="com-wordpress:feed-additions:1">86281937</site>	<item>
		<title>Hacking alla portata di tutti con Flipper Zero</title>
		<link>https://hackerstribe.com/2023/hacking-alla-portata-di-tutti-con-flipper-zero/</link>
		<comments>https://hackerstribe.com/2023/hacking-alla-portata-di-tutti-con-flipper-zero/#respond</comments>
		<pubDate>Tue, 25 Apr 2023 13:22:54 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Flipper Zero]]></category>
		<category><![CDATA[badusb]]></category>
		<category><![CDATA[dispositivo hacker]]></category>
		<category><![CDATA[flipper zero]]></category>
		<category><![CDATA[replay attack]]></category>

		<guid isPermaLink="false">https://hackerstribe.com/?p=5710</guid>
		<description><![CDATA[Il Flipper Zero, è un dispositivo di piccole dimensioni simile a un tama-gotchi inizialmente promosso su una campagna Kickstarter.
&#160;

E’ possibile definirlo come un multitool per appassionati di tecnologia e hacking. Flipper 0 supporta diverse frequenze RFID, Bluetooth, radio sub-1GHz, pin GPIO per  [...]]]></description>
		<wfw:commentRss>https://hackerstribe.com/2023/hacking-alla-portata-di-tutti-con-flipper-zero/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">5710</post-id>	</item>
		<item>
		<title>Quali tipologie di wallet per criptovalute esistono?</title>
		<link>https://hackerstribe.com/2022/quali-tipologie-di-wallet-per-criptovalute-esistono/</link>
		<comments>https://hackerstribe.com/2022/quali-tipologie-di-wallet-per-criptovalute-esistono/#respond</comments>
		<pubDate>Sat, 22 Oct 2022 09:51:31 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Crypto e blockchain]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[criptovalute]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[hardware wallet]]></category>
		<category><![CDATA[wallet]]></category>

		<guid isPermaLink="false">https://hackerstribe.com/?p=5638</guid>
		<description><![CDATA[&#160;
&#160;
La parola “wallet” in inglese significa “portafoglio” e, proprio come il portafoglio che teniamo in tasca, i crypto wallet servono a tenere sott’occhio e gestire le nostre criptovalute. Allo stesso tempo, la stragrande maggioranza dei wallet permette anche di scambiare le valute virtuali con  [...]]]></description>
		<wfw:commentRss>https://hackerstribe.com/2022/quali-tipologie-di-wallet-per-criptovalute-esistono/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">5638</post-id>	</item>
		<item>
		<title>Perché proteggere il tuo PC è importante nel 2022?</title>
		<link>https://hackerstribe.com/2022/perche-proteggere-il-tuo-pc-e-importante-nel-2022/</link>
		<comments>https://hackerstribe.com/2022/perche-proteggere-il-tuo-pc-e-importante-nel-2022/#respond</comments>
		<pubDate>Sat, 19 Mar 2022 00:25:40 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Crittografia]]></category>
		<category><![CDATA[digital banking]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[sicurezza informatica]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[VPN]]></category>

		<guid isPermaLink="false">https://hackerstribe.com/?p=5630</guid>
		<description><![CDATA[Troppo spesso ci accorgiamo di quanto la sicurezza informatica sia importante quando il danno è già stato fatto! Eppure le tattiche per difendersi ci sono e il più delle volte non richiedono competenze da maghi dell’informatica. 
Come si fa? Facciamo il punto della situazione, analizzando possibili  [...]]]></description>
		<wfw:commentRss>https://hackerstribe.com/2022/perche-proteggere-il-tuo-pc-e-importante-nel-2022/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">5630</post-id>	</item>
		<item>
		<title>Utilizzare le criptovalute in sicurezza</title>
		<link>https://hackerstribe.com/2019/utilizzare-le-criptovalute-in-sicurezza/</link>
		<comments>https://hackerstribe.com/2019/utilizzare-le-criptovalute-in-sicurezza/#respond</comments>
		<pubDate>Wed, 01 May 2019 12:16:38 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Crypto e blockchain]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[criptovalute]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[fondi]]></category>
		<category><![CDATA[rete]]></category>
		<category><![CDATA[sicurezza]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[wallet]]></category>

		<guid isPermaLink="false">https://hackerstribe.com/?p=5265</guid>
		<description><![CDATA[
Il mondo delle criptovalute si sta decisamente ampliando e oltre alle ormai classiche monete digitali, come Bitcoin che ha recentemente compiuto i dieci anni, abbiamo a disposizione molte altre possibilità per fare investimenti online o semplicemente per effettuare dei pagamenti  [...]]]></description>
		<wfw:commentRss>https://hackerstribe.com/2019/utilizzare-le-criptovalute-in-sicurezza/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">5265</post-id>	</item>
		<item>
		<title>Ho dato 300 dollari a un cacciatore di taglie. E così ha localizzato il nostro telefono.</title>
		<link>https://hackerstribe.com/2019/ho-dato-300-dollari-a-un-cacciatore-di-taglie-e-cosi-ha-localizzato-il-nostro-telefono/</link>
		<comments>https://hackerstribe.com/2019/ho-dato-300-dollari-a-un-cacciatore-di-taglie-e-cosi-ha-localizzato-il-nostro-telefono/#respond</comments>
		<pubDate>Wed, 30 Jan 2019 15:54:13 +0000</pubDate>
		<dc:creator><![CDATA[mhack]]></dc:creator>
				<category><![CDATA[Geolocalizzazione]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[geolocalizzare]]></category>
		<category><![CDATA[geolocalizzazione]]></category>
		<category><![CDATA[google maps]]></category>
		<category><![CDATA[localizzare telefono]]></category>
		<category><![CDATA[mobile tracking]]></category>
		<category><![CDATA[phone tracking]]></category>
		<category><![CDATA[stalker]]></category>
		<category><![CDATA[telefono]]></category>

		<guid isPermaLink="false">https://hackerstribe.com/?p=5174</guid>
		<description><![CDATA[T-Mobile, Sprint, eAT &#38; T stanno vendendo l'accesso ai dati di posizione dei loro clienti, e questi dati stanno finendo nelle mani dei cacciatori di taglie e altre persone non autorizzate, che riescono in questo modo a rintracciare la maggior parte dei telefoni del paese.]]></description>
		<wfw:commentRss>https://hackerstribe.com/2019/ho-dato-300-dollari-a-un-cacciatore-di-taglie-e-cosi-ha-localizzato-il-nostro-telefono/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">5174</post-id>	</item>
		<item>
		<title>5 Modi per proteggere il tuo Business online dagli attacchi hacker</title>
		<link>https://hackerstribe.com/2019/5-modi-per-proteggere-il-tuo-business-online-dagli-attacchi-hacker/</link>
		<comments>https://hackerstribe.com/2019/5-modi-per-proteggere-il-tuo-business-online-dagli-attacchi-hacker/#respond</comments>
		<pubDate>Sun, 27 Jan 2019 15:58:27 +0000</pubDate>
		<dc:creator><![CDATA[mhack]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[attacco hacker]]></category>
		<category><![CDATA[business online]]></category>
		<category><![CDATA[carta di credito]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[frode]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[linkedin]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[SEO]]></category>
		<category><![CDATA[wordpress]]></category>

		<guid isPermaLink="false">https://hackerstribe.com/?p=5164</guid>
		<description><![CDATA[Se hai un business online e desideri metterlo al sicuro da possibili attacchi hacker, ecco 5 dritte che puoi seguire. ]]></description>
		<wfw:commentRss>https://hackerstribe.com/2019/5-modi-per-proteggere-il-tuo-business-online-dagli-attacchi-hacker/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">5164</post-id>	</item>
		<item>
		<title>Progetti con ESP8266: stazione meteo Wi-Fi con Display TFT a colori</title>
		<link>https://hackerstribe.com/2019/progetti-con-esp8266-stazione-metereologica-wi-fi-con-display-tft-a-colori/</link>
		<comments>https://hackerstribe.com/2019/progetti-con-esp8266-stazione-metereologica-wi-fi-con-display-tft-a-colori/#respond</comments>
		<pubDate>Fri, 25 Jan 2019 17:23:10 +0000</pubDate>
		<dc:creator><![CDATA[mhack]]></dc:creator>
				<category><![CDATA[Nuovi prodotti]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[esp8266]]></category>
		<category><![CDATA[tutorial]]></category>
		<category><![CDATA[wifi]]></category>

		<guid isPermaLink="false">https://hackerstribe.com/?p=5148</guid>
		<description><![CDATA[In questo progetto, impareremo a fare una stazione meteo Wi-Fi fai da te con un ESP8266 e un display touchscreen da 2.4 " Tft.]]></description>
		<wfw:commentRss>https://hackerstribe.com/2019/progetti-con-esp8266-stazione-metereologica-wi-fi-con-display-tft-a-colori/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">5148</post-id>	</item>
		<item>
		<title>Fortnite, giovani hacker guadagnano migliaia di euro a settimana</title>
		<link>https://hackerstribe.com/2019/fortnite-giovani-hacker-guadagnano-migliaia-di-euro-a-settimana/</link>
		<comments>https://hackerstribe.com/2019/fortnite-giovani-hacker-guadagnano-migliaia-di-euro-a-settimana/#respond</comments>
		<pubDate>Tue, 22 Jan 2019 20:28:59 +0000</pubDate>
		<dc:creator><![CDATA[mhack]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[fortnite]]></category>
		<category><![CDATA[gaming]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">https://hackerstribe.com/?p=5141</guid>
		<description><![CDATA[La notizia arriva direttamente dalla BBC: migliaia di adolescenti stanno guadagnano migliaia di euro a settimana rubando account di Fortnite e rivendendoli ad altri utenti]]></description>
		<wfw:commentRss>https://hackerstribe.com/2019/fortnite-giovani-hacker-guadagnano-migliaia-di-euro-a-settimana/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">5141</post-id>	</item>
		<item>
		<title>Come Hackerare una Password Mac Senza Cambiarla</title>
		<link>https://hackerstribe.com/2019/come-hackerare-una-password-mac-senza-cambiarla/</link>
		<comments>https://hackerstribe.com/2019/come-hackerare-una-password-mac-senza-cambiarla/#respond</comments>
		<pubDate>Sat, 19 Jan 2019 09:00:07 +0000</pubDate>
		<dc:creator><![CDATA[ihack]]></dc:creator>
				<category><![CDATA[Fake Login]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[Password Cracking]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[attacchi]]></category>
		<category><![CDATA[attacchi hacking]]></category>
		<category><![CDATA[craccare]]></category>
		<category><![CDATA[crack]]></category>
		<category><![CDATA[cracking]]></category>
		<category><![CDATA[Directory]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hash]]></category>
		<category><![CDATA[hashing]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[Mac OS]]></category>
		<category><![CDATA[macbook]]></category>
		<category><![CDATA[Mojave]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[password cracking]]></category>
		<category><![CDATA[pc e mac]]></category>
		<category><![CDATA[Plist]]></category>
		<category><![CDATA[recovery]]></category>
		<category><![CDATA[SIP]]></category>

		<guid isPermaLink="false">https://hackerstribe.com/?p=5085</guid>
		<description><![CDATA[Un MacBook spento può essere compromesso in meno di tre minuti. Con pochi comandi, un hacker può estrarre l’hash della password di una vittima e decifrarla a sua insaputa.
L&#8217;obiettivo in questo articolo è quello di acquisire il file .plist di una vittima che contiene l’hash della sua password.  [...]]]></description>
		<wfw:commentRss>https://hackerstribe.com/2019/come-hackerare-una-password-mac-senza-cambiarla/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">5085</post-id>	</item>
		<item>
		<title>Exodus: un wallet anonimo e sicuro per conservare le criptovalute</title>
		<link>https://hackerstribe.com/2019/exodus-wallet-anonimo-e-sicuro/</link>
		<comments>https://hackerstribe.com/2019/exodus-wallet-anonimo-e-sicuro/#respond</comments>
		<pubDate>Fri, 18 Jan 2019 11:15:57 +0000</pubDate>
		<dc:creator><![CDATA[mhack]]></dc:creator>
				<category><![CDATA[Crypto e blockchain]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[criptovalute]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[exodus]]></category>
		<category><![CDATA[wallet]]></category>

		<guid isPermaLink="false">https://hackerstribe.com/?p=5117</guid>
		<description><![CDATA[Exodus è uno dei wallet multi-valuta più utilizzati per la conservazione di criptovalute. Il vantaggio di Exodus è quello di essere offline, ovvero anonimo e sicuro rispetto ad altre tipologie di Wallet.]]></description>
		<wfw:commentRss>https://hackerstribe.com/2019/exodus-wallet-anonimo-e-sicuro/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">5117</post-id>	</item>
	</channel>
</rss>
