T.I., Gnu/Linux. Redes, Seguridad, Debian, Ubuntu,UTT,Hacking, etc...etc...
Hacer de este un espacio de desarrollo del conocimiento para todos los ámbitos.
Esto se hará realidad, cuando la conciencia humana se de cuenta que el conocimiento adquirido, pero resguardado y celosamente cautivo por su dueño, será atrofeado, no actualizable y no retroalimentado, por lo cual no será util por mucho tiempo, sin embargo, cuando este conocimiento es es dinámico, expuesto para ser criticable, comparado y evaluado, se obtiene un beneficio común por la retroalimentación que obtiene que lo crece y lo enriquece. Esto permitira al individuo que accede a esta información o conocimiento, como al que lo otorga un desarrollo satisfactorio al saber que es util y que ha sido parte del crecimiento economico-social para su comunidad.
lunes, 25 de julio de 2011
martes, 5 de julio de 2011
Hacker Evolution - PC Game
lunes, 4 de julio de 2011
What every graduate should know before entering the IT industry - Brainbox.com.au
What every graduate should know before entering the IT industry - Brainbox.com.au
CCNA Certification - Wikibooks, open books for an open world
Introduction
CCNA certification is a cornerstone of many IT careers. This book is a comprehensive study guide for the CCNA Intro, CCNA ICND and CCNA Certification exams. Its target audience is a high school student, a first year community college or any adult wanting to understand networking better.
CCNA Certification - Wikibooks, open books for an open world
Guia de estudio CCNA
Advanced Nmap - NMAP avanzado
13 Sites to Download Free eBooks
Los eBooks, han sido muy populares con los dispositivos como el Kindle y el nuevo iPad. Tu puedes obtener aplicaciones para tu SmartPhone para leer tus archivos PDF desde los sitios mas popular de libros. hay una larga seleccion de eBooks y muchos son libres.....Disfruta este link......
jueves, 30 de junio de 2011
Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes

Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes
Despite countless WikiLeaks copycats popping up since the secret-spilling site first dumped its cache of State Department cables last year, the new generation of leaking sites has produced few WikiLeaks-sized scoops. So instead of waiting for insider whistleblowers, the hacker movement Anonymous hopes that a few outside intruders might start the leaks flowing.
miércoles, 29 de junio de 2011
7 Hottest Hacker Chicks in Internet History
Kristina Svechinskaya
Before these chicks THIS was the hottest hacker we all knew and loved.
Kristina Svechinskaya is a New York University student who was arrested on November 2, 2010 for defrauding US and British banks out of millions of dollars -- and you thought your ex was insane.

7 Hottest Hacker Chicks in Internet History,
Hacking Videos from Shmoocon - good coders code, great reuse
Here are the videos from Shmoocon 2006:
Behavioral Malware Analysis Using Sandnets by Joe Stewart
Asterisk: VoIP for the Masses by Damin [presentation]
Black Ops Of TCP/IP 2005.5 by Dan Kaminsky
Breaking LanMan Forever by Dan Moniz and Patrick Stach
Covert Crawling: a wolf among lambs by Acidus
The Church of Wi-Fi presents: An Evil Bastard, A Rainbow and a Great Dane! by Renderman, Thorn, Dutch, and Joshua Wright [presentation and coWPAtty tool]
Network Policy Enforcement / Network Quarantine - Latest Security Gimmick or Good Idea? by Steve Manzuik
martes, 28 de junio de 2011
Social engineering (security)
Social engineering is the art of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.[1] While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. In the United Kingdom, social engineering using impersonation (e.g. to gain information over the phone, or to gate-crash an event) is known informally as blagging. In addition to criminal purposes, social engineering has also been employed by debt collectors,skiptracers, private investigators, bounty hunters and tabloid journalists.
"Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals.[2]
A study by Google researchers analyzing fake AV distribution found that up to 90% of all domains involved in distributing fake antivirus software used social engineering techniques.[3]