Con una formación basada en la enseñanza y con la firme ideología de “Entre más conocimiento tengo, más responsabilidad tengo en compartirlo”; Se ha creado un BLOG destinado para las áreas de GNU/Linux y las Tecnologías de la Información.

Hacer de este un espacio de desarrollo del conocimiento para todos los ámbitos.

Esto se hará realidad, cuando la conciencia humana se de cuenta que el conocimiento adquirido, pero resguardado y celosamente cautivo por su dueño, será atrofeado, no actualizable y no retroalimentado, por lo cual no será util por mucho tiempo, sin embargo, cuando este conocimiento es es dinámico, expuesto para ser criticable, comparado y evaluado, se obtiene un beneficio común por la retroalimentación que obtiene que lo crece y lo enriquece. Esto permitira al individuo que accede a esta información o conocimiento, como al que lo otorga un desarrollo satisfactorio al saber que es util y que ha sido parte del crecimiento economico-social para su comunidad.

jueves, 30 de junio de 2011

Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes


Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes




Despite countless WikiLeaks copycats popping up since the secret-spilling site first dumped its cache of State Department cables last year, the new generation of leaking sites has produced few WikiLeaks-sized scoops. So instead of waiting for insider whistleblowers, the hacker movement Anonymous hopes that a few outside intruders might start the leaks flowing.

miércoles, 29 de junio de 2011

7 Hottest Hacker Chicks in Internet History

Pa que entienda la raza "Las 7 Mamis mas chidas hackers en la historia de la Internet"

Kristina Svechinskaya

Before these chicks THIS was the hottest hacker we all knew and loved.

Kristina Svechinskaya is a New York University student who was arrested on November 2, 2010 for defrauding US and British banks out of millions of dollars -- and you thought your ex was insane.


7 Hottest Hacker Chicks in Internet History,

Hacking Videos from Shmoocon - good coders code, great reuse

Hacking Videos from Shmoocon - good coders code, great reuse

Here are the videos from Shmoocon 2006:

Behavioral Malware Analysis Using Sandnets by Joe Stewart
Asterisk: VoIP for the Masses by Damin [presentation]
Black Ops Of TCP/IP 2005.5 by Dan Kaminsky
Breaking LanMan Forever by Dan Moniz and Patrick Stach
Covert Crawling: a wolf among lambs by Acidus
The Church of Wi-Fi presents: An Evil Bastard, A Rainbow and a Great Dane! by Renderman, Thorn, Dutch, and Joshua Wright [presentation and coWPAtty tool]
Network Policy Enforcement / Network Quarantine - Latest Security Gimmick or Good Idea? by Steve Manzuik

martes, 28 de junio de 2011

Astalavista.com – the IT News & Security community

Astalavista.com – the IT News & Security community

Social engineering (security)

Computer security
Secure operating systems
Security architecture
Security by design
Secure coding
Computer insecurity
VulnerabilitySocial engineering
Eavesdropping
ExploitsTrojans
Viruses and worms
Denial of service
PayloadsBackdoors
Rootkits
Keyloggers
v · d · e

Social engineering is the art of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.[1] While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. In the United Kingdom, social engineering using impersonation (e.g. to gain information over the phone, or to gate-crash an event) is known informally as blagging. In addition to criminal purposes, social engineering has also been employed by debt collectors,skiptracers, private investigators, bounty hunters and tabloid journalists.

"Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals.[2]

A study by Google researchers analyzing fake AV distribution found that up to 90% of all domains involved in distributing fake antivirus software used social engineering techniques.[3]


http://en.wikipedia.org/wiki/Social_engineering_%28security%29

TEST

test

PRUEBA 2

PRUEBA 2

HOLA MUNDO

Prueba para ligar mi blogger con el twitter en el portal de TIC