Leyendo documentación sobre seguridad y tratando de entender como se ponen en práctica los conceptos de OSINT, encontré un vídeo sencillo de como usar EO-Ripper.py para rastrear correos electrónicos y sus contraseñas: Me pareció curioso probarlo, de manera que encontré un hueco días más tarde. Los pasos que di esta vez han sido: Instalar python 3.6. He … Read more
This is a 1 hour video, that talks about life, being professional, and security. I enjoyed it a lot, and I would like to save the link,
Nice visual way to analyze the situation of malware, vulnerabilities, web virus, spam, botnet activities… Interesting, at the time I’m checking the data the list of countries with more attacks are: Vietnam Russia India Germany USA.
I suffered this virus in one of my computers, and I was able to fix it with this command on MS-DOS: Attrib /d /s -r -h -s *.* I need to review my anti-virus….
I am not a security expert, and by this reason to read about security aspects is something complex, specially when you want to gain perspective of the area of security it’s being talked. The SANS Institute is a cooperative research and education organization which contains programs for security professionals around the world. They have the … Read more
Awareness about security is always something challenging, and have good habits in this area is important. Mail encryption was always a technical complex issue, but now it seems to be easy for users. The answer is this German company Whiteout.io Installation Once you install it, you enter your user and generate a PGP key, the … Read more
Some basis I’ve learned about this issue. OpenSSL is an open-source implementation of SSL. It is not the only implementation of SSL, and is not even the primary implementation of SSL. Most vendors have their own implementation of SSL and TLS, which is directly related. OpenSSL is available as an installed package, or as a … Read more
The security on mobile applications continues being a big question for me, mainly due to the lack of security. I found Confide, which lemma is: Spoken words disappear after they’re heard. But what you say online remains forever. With confidential messages that self-destruct, Confide takes you off the record.
The industry of security on IT continues evolving and increasing the amount of activities. More new created needs due to a continuous growth of the security issues and the need to protect intellectual property. So many markets are created through legislation that turn into more and more complex compliance activities. OMB: Agencies must implement continuous … Read more