Iniziative sociali SOD Giacomo Lanzi

Secure Online Desktop Social Initiatives

2020 turned out to be a complicated year in many ways. Covid-19 has hit the whole world hard, with significant repercussions on companies which, as far as possible, have found themselves having to set up suitable infrastructures for remote work. Many social initiatives were born during the year and our field, IT and cyber security, is no different.

In this article, we want to communicate what are the initiatives we support to cope with the emergency. We remember how important it is for the whole community to respect the DPCM, social distancing and the use of masks.

ownCloud for companies: SOD’s social initiative

One of the main problems encountered is due to a lack of funds to support the remote work of its employees. In fact, it is not as simple as you might think to set up a consistent and secure system for sharing files and data for your employees. Through the use of insecure services, corporate data is placed in a dangerous situation.

We therefore decided to offer the professional version of our ownCloud service for free to help small businesses cope with this complicated period of teleworking. The social initiative is configured as a concrete help for the implementation of innovative solutions for companies.

How to access the offer

To access the professional version of ownCloud for free, just follow the steps below:

– Access the product page via the following link: https://cloud.cyberfero.com/?cmd=cart&action=add&id=310
– Click on “Promotional Code” on the right
– Use the promotional code: “COVID-19

More information on the offer

The offer is aimed at companies wishing to use it through the COVID-19 promotional code. No payment is required and for two months the service is available in the professional version. Following the promotional period, it is possible to decide in full freedom whether to subscribe to the service or discontinue it.

The social initiative also appears among those listed in the Smart Working section on the institutional portal of Digital Solidarity.

Folding@Home

The Folding@Home social initiative is a distributed computing project aimed at simulating the dynamics of proteins, in particular the folding process. Through the use of a particular software, it is possible to offer the computing power of a computer as an active resource for research.

The project is based on the concept of distributed computing. Basically, numerous computers interact / communicate with each other over the network in order to achieve a common goal. With this type of technology it is possible to achieve the objectives set in a relatively short time. Thanks to the subdivision of the main task into simpler sub-tasks that are distributed to the machines that are part of the project.

How does it work

Folding @ home is a project focused on disease research. The problems they solve while searching require a lot of computer calculations and need a lot of power to proceed. With the dedicated software it is possible to share with them the unused computing power, so that the project can proceed to seek potential cures.

Diseases such as Alzheimer’s disease, Huntington’s disease, cystic fibrosis, BSE (mad cow disease), an inherited form of emphysema, and many cancers are also believed to be the result of poor protein absorption. When proteins unfold incorrectly, they can clump together to form lumps. These can often gather in the brain, where they are thought to cause mad cow disease or Alzheimer’s disease symptoms. The software simulates the unfolding of proteins to study the consequences.

In the video presented here, an example of a protein deployment simulation.

Initiative for COVID-19

Folding @ Home, therefore, using a distributed computing model, has been working for research for some time. In this 2020, in which it is seriously important to speed up the time of research on Covid-19, they have decided to focus all available resources on that research. Their homepage reads:

“Together we have created the most powerful supercomputer on the planet and are using it to help understand SARS-CoV-2 / COVID-19 and develop new therapies. We need your help to continue promoting a powerful and license-free drug. Use your computer to help in the fight against Covid-19 “.

The aim is to discover and develop a free medicine (not bound by private patents) and effective in the fight against the disease. We at SOD promote this social initiative and want to give you a couple of tips on how to support research.

Using a VPS

To do your part with Folding @ Home, you need to install dedicated software on the machine you intend to use. Obviously it is also possible to do this through a virtual machine that you can set up with the SOD VPS service. By following the instructions you find on this page, you can set up the machine in a few minutes to use the dedicated software to share its computing power. The software is available as a template for all customers of the Cloud Server service.

By following the instructions you will contribute as part of our team, you can see the progress made by the team at this link: https://stats.foldingathome.org/team/259355

Installation on other machines

The software is available for any type of OS, downloadable from the main project page. We would also like to let you know that it is possible to join this social initiative with any computer, even the one you use daily.

The convenience of using a virtual machine is that it always remains on and does not require computing power to the machine you use to work, we think it is the best solution to support the project. For example you may want to assign free resources of your Cloud Server or Super Cloud service.

The launch video of the Folding @ Home campaign for COVID-19

Our support for territorial realities

Civil protection

Secure Online Desktop, however, was not limited to national initiatives. We care about the territorial realities and for this reason we have been offering some services free of charge to the Civil Protection of Albinea for years, for example:

– Web hosting
– Domain
– SEO services

We also offer them specific services that can be used in certain circumstances: communication campaign, technical assistance, file exchange system, etc. We would like to give our practical contribution to such important services in the area, to maintain an active link with local associations.

Agirecon

AGiReCoN is the Young Reggiani Association Against Neoplasms and we support them for what concerns the technical IT part, but not only. Together with them, some projects are planned that have the aim of developing a web app to facilitate communication between doctors and patients.

We believe that small non-profit organizations like this one deserve to be supported, especially by local companies. Associations such as AGiReCoN sensitize the area in a concrete way. They are able to communicate effectively with a good number of people thanks to their nature of small associations, typically welcomed more warmly than international ones.

We are honored to be able to give our small contribution to AGiReCoN and to the Civil Protection of Albinea.

Agirecon

In conclusion

This year has brought many personal and professional challenges. Especially small and medium-sized enterprises have been hit and have had to run for cover to try not to close. We hope that the ownCloud promotional offer can help some small businesses manage their work remotely and we are sure that the Folding@Home initiative is the best way to actively intervene in research, donating some computing power.

We also invite, as far as possible, the support of the realities present in your territory. Much can be done just by offering concrete and practical rather than economic help.

Useful links:

 Help Folding@home project with Secure Online Desktop 

Contact us

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version June 10, 2025
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Jun 09SEC Consult Vulnerability Lab Security Advisory < 20250604-0 > ======================================================================= title: Local Privilege Escalation and Default Credentials product: INDAMED - MEDICAL OFFICE (Medical practice management) Demo version vulnerable version: Revision 18544 (II/2024) fixed version: Q2/2025 (Privilege Escalation, Default Password)...
  • Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain → Secure Enclave Key Theft, Wormable RCE, Crypto Theft June 10, 2025
    Posted by josephgoyd via Fulldisclosure on Jun 09Hello Full Disclosure, This is a strategic public disclosure of a zero-click iMessage exploit chain that was discovered live on iOS 18.2 and remained unpatched through iOS 18.4. It enabled Secure Enclave key theft, wormable remote code execution, and undetectable crypto wallet exfiltration. Despite responsible disclosure, the research […]
  • Defense in depth -- the Microsoft way (part 89): user group policies don't deserve tamper protection June 3, 2025
    Posted by Stefan Kanthak on Jun 03Hi @ll, user group policies are stored in DACL-protected registry keys [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies] respectively [HKEY_CURRENT_USER\Software\Policies] and below, where only the SYSTEM account and members of the "Administrators" user group are granted write access. At logon the user&apos;s registry hive "%USERPROFILE%\ntuser.dat" is loaded with exclusive (read, write and...
  • CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0 June 3, 2025
    Posted by Sanjay Singh on Jun 03Hello Full Disclosure list, I am sharing details of a newly assigned CVE affecting an open-source educational software project: ------------------------------------------------------------------------ CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0 ------------------------------------------------------------------------ Product: CloudClassroom PHP Project Vendor:...
  • ERPNext v15.53.1 Stored XSS in bio Field Allows Arbitrary Script Execution in Profile Page June 3, 2025
    Posted by Ron E on Jun 03An authenticated attacker can inject JavaScript into the bio field of their user profile. When the profile is viewed by another user, the injected script executes. *Proof of Concept:* POST /api/method/frappe.desk.page.user_profile.user_profile.update_profile_info HTTP/2 Host: --host-- profile_info={"bio":"\">"}
  • ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path June 3, 2025
    Posted by Ron E on Jun 03An authenticated user can inject malicious JavaScript into the user_image field of the profile page using an XSS payload within the file path or HTML context. This field is rendered without sufficient sanitization, allowing stored script execution in the context of other authenticated users. *Proof of Concept:*POST /api/method/frappe.desk.page.user_profile.user_profile.update_profile_info HTTP/2 […]
  • Local information disclosure in apport and systemd-coredump June 3, 2025
    Posted by Qualys Security Advisory via Fulldisclosure on Jun 03Qualys Security Advisory Local information disclosure in apport and systemd-coredump (CVE-2025-5054 and CVE-2025-4598) ======================================================================== Contents ======================================================================== Summary Mitigation Local information disclosure in apport (CVE-2025-5054) - Background - Analysis - Proof of concept Local information disclosure in systemd-coredump...
  • Stored XSS via File Upload - adaptcmsv3.0.3 June 3, 2025
    Posted by Andrey Stoykov on Jun 03# Exploit Title: Stored XSS via File Upload - adaptcmsv3.0.3 # Date: 06/2025 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Stored XSS via File Upload #1: Steps to Reproduce: 1. Login with low privilege user and visit "Profile" > "Edit […]
  • IDOR "Change Password" Functionality - adaptcmsv3.0.3 June 3, 2025
    Posted by Andrey Stoykov on Jun 03# Exploit Title: IDOR "Change Password" Functionality - adaptcmsv3.0.3 # Date: 06/2025 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ IDOR "Change Password" Functionality #1: Steps to Reproduce: 1. Login as user with low privilege and visit profile page 2. Select […]
  • Stored XSS "Send Message" Functionality - adaptcmsv3.0.3 June 3, 2025
    Posted by Andrey Stoykov on Jun 03# Exploit Title: Stored XSS "Send Message" Functionality - adaptcmsv3.0.3 # Date: 06/2025 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Stored XSS "Send Message" Functionality #1: Steps to Reproduce: 1. Login as normal user and visit "Profile" > "Message" > […]

Customers

Newsletter

{subscription_form_1}