Con una formación basada en la enseñanza y con la firme ideología de “Entre más conocimiento tengo, más responsabilidad tengo en compartirlo”; Se ha creado un BLOG destinado para las áreas de GNU/Linux y las Tecnologías de la Información.

Hacer de este un espacio de desarrollo del conocimiento para todos los ámbitos.

Esto se hará realidad, cuando la conciencia humana se de cuenta que el conocimiento adquirido, pero resguardado y celosamente cautivo por su dueño, será atrofeado, no actualizable y no retroalimentado, por lo cual no será util por mucho tiempo, sin embargo, cuando este conocimiento es es dinámico, expuesto para ser criticable, comparado y evaluado, se obtiene un beneficio común por la retroalimentación que obtiene que lo crece y lo enriquece. Esto permitira al individuo que accede a esta información o conocimiento, como al que lo otorga un desarrollo satisfactorio al saber que es util y que ha sido parte del crecimiento economico-social para su comunidad.

martes, 5 de julio de 2011

Cuidado con sus mascotas....

Y mas con su informacion....JEJEJE

Repositorios para Debian y Ubuntu



http://www.apt-get.org/

http://www.apt-get.org/main/

Disfrutenlo....

Comandos comunes y necesarios


Para Gnu/Linux por supuesto.....

http://www.commandlinefu.com/commands/browse

5 Hacker de la Vieja escuela, Donde estan ahora????

5 Old School Hackers: Where Are They Now



1. Kevin Mitnick

Hacker Evolution - PC Game

Juega a Ser Hacker....

From the creators of a successful hacker games series (Digital Hazard, BS Hacker, etc) Hacker Evolution is a new hacking simulation game, featuring unparalleled graphics and features.


lunes, 4 de julio de 2011

What every graduate should know before entering the IT industry - Brainbox.com.au

Lo que un graduado en TI deberia saber antes de entrar en la industria de TI....

What every graduate should know before entering the IT industry - Brainbox.com.au

CCNA Certification - Wikibooks, open books for an open world

Informacion complementaria para la certificacion de CCNA, Conceptos minimon a dominar

Introduction

CCNA certification is a cornerstone of many IT careers. This book is a comprehensive study guide for the CCNA Intro, CCNA ICND and CCNA Certification exams. Its target audience is a high school student, a first year community college or any adult wanting to understand networking better.

CCNA Certification - Wikibooks, open books for an open world

Guia de estudio CCNA

Advanced Nmap - NMAP avanzado

Welcome to SA. We’re about cool sh*t… mostly related to offsec.

Pagina con info de Seguridad y sofware de testeo....



Uso del Nmap y otras mas..

href="http://www.securityaegis.com/advanced-nmap/">

13 Sites to Download Free eBooks

13 Sites to Download Free eBooks


Los eBooks, han sido muy populares con los dispositivos como el Kindle y el nuevo iPad. Tu puedes obtener aplicaciones para tu SmartPhone para leer tus archivos PDF desde los sitios mas popular de libros. hay una larga seleccion de eBooks y muchos son libres.....Disfruta este link......

jueves, 30 de junio de 2011

Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes


Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes




Despite countless WikiLeaks copycats popping up since the secret-spilling site first dumped its cache of State Department cables last year, the new generation of leaking sites has produced few WikiLeaks-sized scoops. So instead of waiting for insider whistleblowers, the hacker movement Anonymous hopes that a few outside intruders might start the leaks flowing.

miércoles, 29 de junio de 2011

7 Hottest Hacker Chicks in Internet History

Pa que entienda la raza "Las 7 Mamis mas chidas hackers en la historia de la Internet"

Kristina Svechinskaya

Before these chicks THIS was the hottest hacker we all knew and loved.

Kristina Svechinskaya is a New York University student who was arrested on November 2, 2010 for defrauding US and British banks out of millions of dollars -- and you thought your ex was insane.


7 Hottest Hacker Chicks in Internet History,

Hacking Videos from Shmoocon - good coders code, great reuse

Hacking Videos from Shmoocon - good coders code, great reuse

Here are the videos from Shmoocon 2006:

Behavioral Malware Analysis Using Sandnets by Joe Stewart
Asterisk: VoIP for the Masses by Damin [presentation]
Black Ops Of TCP/IP 2005.5 by Dan Kaminsky
Breaking LanMan Forever by Dan Moniz and Patrick Stach
Covert Crawling: a wolf among lambs by Acidus
The Church of Wi-Fi presents: An Evil Bastard, A Rainbow and a Great Dane! by Renderman, Thorn, Dutch, and Joshua Wright [presentation and coWPAtty tool]
Network Policy Enforcement / Network Quarantine - Latest Security Gimmick or Good Idea? by Steve Manzuik

martes, 28 de junio de 2011

Astalavista.com – the IT News & Security community

Astalavista.com – the IT News & Security community

Social engineering (security)

Computer security
Secure operating systems
Security architecture
Security by design
Secure coding
Computer insecurity
VulnerabilitySocial engineering
Eavesdropping
ExploitsTrojans
Viruses and worms
Denial of service
PayloadsBackdoors
Rootkits
Keyloggers
v · d · e

Social engineering is the art of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.[1] While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. In the United Kingdom, social engineering using impersonation (e.g. to gain information over the phone, or to gate-crash an event) is known informally as blagging. In addition to criminal purposes, social engineering has also been employed by debt collectors,skiptracers, private investigators, bounty hunters and tabloid journalists.

"Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals.[2]

A study by Google researchers analyzing fake AV distribution found that up to 90% of all domains involved in distributing fake antivirus software used social engineering techniques.[3]


http://en.wikipedia.org/wiki/Social_engineering_%28security%29

PRUEBA 2

PRUEBA 2

HOLA MUNDO

Prueba para ligar mi blogger con el twitter en el portal de TIC