{"id":222,"date":"2017-05-08T16:08:55","date_gmt":"2017-05-08T14:08:55","guid":{"rendered":"http:\/\/www.steraptica.eu\/?page_id=222"},"modified":"2025-05-05T15:11:30","modified_gmt":"2025-05-05T13:11:30","slug":"mission","status":"publish","type":"page","link":"https:\/\/www.mc-data.it\/?page_id=222","title":{"rendered":"Mission"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-text-align-center\"><\/h1>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"465\" data-attachment-id=\"1012\" data-permalink=\"https:\/\/www.mc-data.it\/?attachment_id=1012\" data-orig-file=\"https:\/\/www.mc-data.it\/wp-content\/uploads\/2021\/08\/pexels-photo-3861969-edited-e1628852689508.jpeg\" data-orig-size=\"1430,650\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;Photo by ThisIsEngineering on &lt;a href=\\&quot;https:\/\/www.pexels.com\/photo\/photo-of-code-projected-over-woman-3861969\/\\&quot; rel=\\&quot;nofollow\\&quot;&gt;Pexels.com&lt;\/a&gt;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;photo of code projected over woman&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"pexels-photo-3861969\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Photo by ThisIsEngineering on &lt;a href=&quot;https:\/\/www.pexels.com\/photo\/photo-of-code-projected-over-woman-3861969\/&quot; rel=&quot;nofollow&quot;&gt;Pexels.com&lt;\/a&gt;&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/www.mc-data.it\/wp-content\/uploads\/2021\/08\/pexels-photo-3861969-edited-e1628852689508-300x136.jpeg\" data-large-file=\"https:\/\/www.mc-data.it\/wp-content\/uploads\/2021\/08\/pexels-photo-3861969-edited-e1628852689508-1024x465.jpeg\" src=\"https:\/\/www.mc-data.it\/wp-content\/uploads\/2021\/08\/pexels-photo-3861969-edited-e1628852689508-1024x465.jpeg\" alt=\"photo of code projected over woman\" class=\"wp-image-1012\" srcset=\"https:\/\/www.mc-data.it\/wp-content\/uploads\/2021\/08\/pexels-photo-3861969-edited-e1628852689508-1024x465.jpeg 1024w, https:\/\/www.mc-data.it\/wp-content\/uploads\/2021\/08\/pexels-photo-3861969-edited-e1628852689508-300x136.jpeg 300w, https:\/\/www.mc-data.it\/wp-content\/uploads\/2021\/08\/pexels-photo-3861969-edited-e1628852689508-768x349.jpeg 768w, https:\/\/www.mc-data.it\/wp-content\/uploads\/2021\/08\/pexels-photo-3861969-edited-e1628852689508.jpeg 1430w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Photo by ThisIsEngineering on <a href=\"https:\/\/www.pexels.com\/photo\/photo-of-code-projected-over-woman-3861969\/\" rel=\"nofollow\">Pexels.com<\/a><\/figcaption><\/figure>\n\n\n\n<p>Non importa quanto lontani siate dalla tecnologia o quanto possiate ritenervi non coinvolti. \u00e8 lei a seguirvi. E molto pi\u00f9 da vicino di quanto non crediate.<\/p>\n\n\n\n<p>Oggi possiamo dire che il virtuale non esiste pi\u00f9. Ormai ci\u00f2 che \u00e8 virtuale ha conseguenze reali; a volte molto pi\u00f9 reali della realt\u00e0 stessa (sar\u00e0 per questo che si parla di realt\u00e0 aumentata??).<\/p>\n\n\n\n<p>Dai crimini informatici, il Cyber attacchi, i Cryptolocker, il Cyber Bullismo, ma anche le Cryptovalute stanno a dimostrare che non c&#8217; quasi pi\u00f9 nulla di virtuale in questo mondo.<\/p>\n\n\n\n<p>Per questo esiste MCDATA<\/p>\n\n\n\n<p>McData \u00e8 stata fondata con l&#8217;obiettivo di diffondere una cultura Informatica a pi\u00f9 livelli.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Privati<\/li>\n\n\n\n<li>Professionisti<\/li>\n\n\n\n<li>Micro Imprese<\/li>\n\n\n\n<li>Piccole Imprese<\/li>\n\n\n\n<li>Pubbliche Amministrazioni<\/li>\n<\/ul>\n\n\n\n<p>L&#8217;offerta \u00e8 nebulizzata intorno ad un ventaglio di competenze in grado di supportare gli operatori fin nei pi\u00f9, apparentemente, piccoli e banali problemi, dalla configurazioni e gestione della Posta Elettronica, via via allargando il cerchio verso problematiche pi\u00f9 complesse: un Server che fa i capricci; attivit\u00e0 di Backup o recupero dati, fino ad arrivare a progettare complesse architetture di rete.<\/p>\n\n\n\n<p>A tal fine, nella sezione &#8220;<a href=\"http:\/\/www.steraptica.eu\/?page_id=194\">Assistenza Remota<\/a>&#8221; potete trovare l&#8217;agent di connessione remota. Un sistema semplice ed intuitivo, attraverso il quale richiedere di essere assistiti da remoto.<\/p>\n\n\n\n<p>Ma per completare la Mission MCDATA sta raccogliendo ed aggiornando costantemente la proprie esperienze con problematiche &#8220;note&#8221; all&#8217;interno della sezione &#8220;<a href=\"https:\/\/www.mc-data.it\/?cat=3\">articoli<\/a>&#8220;. Una vasta Agor\u00e0 dove vengono archiviate ed indicizzate esperienze e soluzioni. Non un semplice Blog, ma piuttosto un Wiki arricchito, per quanto possibile, da video esplicativi.<\/p>\n\n\n\n<p>Il motto MCDATA \u00e8: semplice e comprensibile.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ultimi Attacchi Ransomware in Italia<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n\n\n<ul class=\"has-dates has-excerpts wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='http:\/\/www.ransomfeed.it\/index.php?page=post_details&#038;id_post=31387'>tremcarcom<\/a><\/div><time datetime=\"2026-04-14T13:52:51+02:00\" class=\"wp-block-rss__item-publish-date\">14 Aprile 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Ransomware group called dragonforce claims attack for tremcarcom. We identify this attack with following hash code: 59f43c6f23c5826682c6a11499c9635bcf8f544a1f8cf26470dede03e7420a39Target victim website: N\/D<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='http:\/\/www.ransomfeed.it\/index.php?page=post_details&#038;id_post=31388'>imadesigncom<\/a><\/div><time datetime=\"2026-04-14T13:52:50+02:00\" class=\"wp-block-rss__item-publish-date\">14 Aprile 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Ransomware group called dragonforce claims attack for imadesigncom. We identify this attack with following hash code: a469011751187f2fa10257e8cfbeb157fe30d85c858e86ba2be1511af7de2055Target victim website: N\/D<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='http:\/\/www.ransomfeed.it\/index.php?page=post_details&#038;id_post=31389'>advprogramscom<\/a><\/div><time datetime=\"2026-04-14T13:52:49+02:00\" class=\"wp-block-rss__item-publish-date\">14 Aprile 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Ransomware group called dragonforce claims attack for advprogramscom. We identify this attack with following hash code: 0a5f8091446e6651db29a5a850ad0f4f14ec4c052d3be9601d7951f41c239370Target victim website: N\/D<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='http:\/\/www.ransomfeed.it\/index.php?page=post_details&#038;id_post=31390'>novafpcom<\/a><\/div><time datetime=\"2026-04-14T13:52:48+02:00\" class=\"wp-block-rss__item-publish-date\">14 Aprile 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Ransomware group called dragonforce claims attack for novafpcom. We identify this attack with following hash code: 7319390202bd5920e9ca8af34094636c814c23cf9fdf68fcd435cddbd79fb69fTarget victim website: N\/D<\/div><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p class=\"qua-blog-post-description\">Non importa quanto lontani siate dalla tecnologia o quanto possiate ritenervi non coinvolti. \u00e8 lei a seguirvi. E molto pi\u00f9 da vicino di quanto non crediate. Oggi possiamo dire che il virtuale non esiste pi\u00f9. Ormai ci\u00f2 che \u00e8 virtuale ha conseguenze reali; a volte molto pi\u00f9 reali della realt\u00e0 stessa (sar\u00e0 per questo che [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-222","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P9p8lv-3A","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.mc-data.it\/index.php?rest_route=\/wp\/v2\/pages\/222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mc-data.it\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.mc-data.it\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.mc-data.it\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mc-data.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=222"}],"version-history":[{"count":19,"href":"https:\/\/www.mc-data.it\/index.php?rest_route=\/wp\/v2\/pages\/222\/revisions"}],"predecessor-version":[{"id":4980,"href":"https:\/\/www.mc-data.it\/index.php?rest_route=\/wp\/v2\/pages\/222\/revisions\/4980"}],"wp:attachment":[{"href":"https:\/\/www.mc-data.it\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}