tag:blogger.com,1999:blog-28898931665571026322024-03-05T00:40:35.384-06:00Conocimiento libre para todos....yo picho...T.I., Gnu/Linux. Redes, Seguridad, Debian, Ubuntu,UTT,Hacking, etc...etc...LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.comBlogger44125tag:blogger.com,1999:blog-2889893166557102632.post-19182903052974512192011-07-25T14:02:00.000-05:002011-07-25T14:02:36.580-05:00Download Youtube Videos | Youtube Video Downloader<a href="http://downloadableyoutube.com/">Download Youtube Videos | Youtube Video Downloader</a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com10tag:blogger.com,1999:blog-2889893166557102632.post-43120632288080244112011-07-05T11:05:00.001-05:002011-07-05T11:07:04.967-05:00Cuidado con sus mascotas....Y mas con su informacion....JEJEJE<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi73WkAfDf35gmgu-oGJVbCOunjSowXrD9JVNoKti5W34he8w_DnpPv2AglHnrs4BAn5zc4H1ruNLrbFbFyWBTdTiJoj0t8MzcVrw2gjtx05bgHcdDkDoYLxkrBixMh-hpYj_Eml5pBKrKT/s1600/lettingthecatoutofthebag.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 242px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi73WkAfDf35gmgu-oGJVbCOunjSowXrD9JVNoKti5W34he8w_DnpPv2AglHnrs4BAn5zc4H1ruNLrbFbFyWBTdTiJoj0t8MzcVrw2gjtx05bgHcdDkDoYLxkrBixMh-hpYj_Eml5pBKrKT/s320/lettingthecatoutofthebag.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5625900392613429842" /></a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-64055088501599122552011-07-05T11:01:00.002-05:002011-07-05T11:04:00.559-05:00Repositorios para Debian y Ubuntu<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.apt-get.org/media/logo.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 468px; height: 110px;" src="http://www.apt-get.org/media/logo.png" border="0" alt="" /></a><br /><br />http://www.apt-get.org/<br /><br />http://www.apt-get.org/main/<br /><br />Disfrutenlo....LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-10028840456107008952011-07-05T10:57:00.002-05:002011-07-05T10:59:27.749-05:00Comandos comunes y necesarios<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.commandlinefu.com/images/header-logo.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 330px; height: 55px;" src="http://www.commandlinefu.com/images/header-logo.jpg" border="0" alt="" /></a><br />Para Gnu/Linux por supuesto.....<br /><br />http://www.commandlinefu.com/commands/browseLeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-68988041915928243782011-07-05T10:45:00.001-05:002011-07-05T10:47:41.680-05:005 Hacker de la Vieja escuela, Donde estan ahora????5 Old School Hackers: Where Are They Now<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://wikibon.org/blog/wp-content/uploads/2011/06/Screen-shot-2011-06-16-at-4.46.00-PM.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 248px; height: 414px;" src="http://wikibon.org/blog/wp-content/uploads/2011/06/Screen-shot-2011-06-16-at-4.46.00-PM.png" border="0" alt="" /></a><br /><br />1. Kevin MitnickLeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-724723461297417352011-07-05T10:38:00.001-05:002011-07-05T10:39:53.442-05:00Hacker Evolution - PC GameJuega a Ser Hacker....<br /><br />From the creators of a successful hacker games series (Digital Hazard, BS Hacker, etc) Hacker Evolution is a new hacking simulation game, featuring unparalleled graphics and features.<br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.exosyphen.com/xproduct-hackerevolution-untold/hacker-evolution-untold-flightzero.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 392px; height: 205px;" src="http://www.exosyphen.com/xproduct-hackerevolution-untold/hacker-evolution-untold-flightzero.png" border="0" alt="" /></a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-75643281248086836882011-07-04T13:42:00.000-05:002011-07-04T13:42:44.495-05:00What every graduate should know before entering the IT industry - Brainbox.com.auLo que un graduado en TI deberia saber antes de entrar en la industria de TI....<br /><br /><a href="http://www.brainbox.com.au/brainbox/home.nsf/link/18042004-What-every-graduate-should-know-before-entering-the-IT-industry">What every graduate should know before entering the IT industry - Brainbox.com.au</a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-26073163391474995362011-07-04T10:37:00.001-05:002011-07-04T10:38:36.614-05:00CCNA Certification - Wikibooks, open books for an open worldInformacion complementaria para la certificacion de CCNA, Conceptos minimon a dominar<br /><br />Introduction<br /><br />CCNA certification is a cornerstone of many IT careers. This book is a comprehensive study guide for the CCNA Intro, CCNA ICND and CCNA Certification exams. Its target audience is a high school student, a first year community college or any adult wanting to understand networking better.<br /><br /><a href="http://en.wikibooks.org/wiki/CCNA_Certification">CCNA Certification - Wikibooks, open books for an open world</a><br /><br />Guia de estudio CCNA<br /><br /><a href="http://www.unixlead.com/CCNA-GUIDE.htm"></a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-51713241405252344792011-07-04T10:23:00.002-05:002011-07-04T10:30:01.509-05:00Advanced Nmap - NMAP avanzadoWelcome to SA. We’re about cool sh*t… mostly related to offsec.<br /><br />Pagina con info de Seguridad y sofware de testeo....<br /><br /><a href="http://www.securityaegis.com/"></a><br /><br />Uso del Nmap y otras mas..<br /><br />href="http://www.securityaegis.com/advanced-nmap/"><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.securityaegis.com/wp-content/uploads/2011/04/nmapcookbook-150x150.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 150px; height: 150px;" src="http://www.securityaegis.com/wp-content/uploads/2011/04/nmapcookbook-150x150.png" border="0" alt="" /></a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-4264700847080689492011-07-04T09:45:00.000-05:002011-07-04T09:45:09.963-05:0013 Sites to Download Free eBooks<a href="http://itmanagersinbox.com/1875/13-sites-to-download-free-ebooks/">13 Sites to Download Free eBooks</a><br /><br /><br />Los eBooks, han sido muy populares con los dispositivos como el Kindle y el nuevo iPad. Tu puedes obtener aplicaciones para tu SmartPhone para leer tus archivos PDF desde los sitios mas popular de libros. hay una larga seleccion de eBooks y muchos son libres.....Disfruta este link......LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-57925591553299281612011-06-30T14:10:00.001-05:002011-06-30T14:12:02.072-05:00Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blogs-images.forbes.com/andygreenberg/files/2011/06/hackerleaks-300x190.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 300px; height: 190px;" src="http://blogs-images.forbes.com/andygreenberg/files/2011/06/hackerleaks-300x190.png" border="0" alt="" /></a><br /><a href="http://blogs.forbes.com/andygreenberg/2011/06/30/anonymous-launches-a-wikileaks-for-hackers-hackerleaks/">Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes</a><br /><br /><br /><br /><br />Despite countless WikiLeaks copycats popping up since the secret-spilling site first dumped its cache of State Department cables last year, the new generation of leaking sites has produced few WikiLeaks-sized scoops. So instead of waiting for insider whistleblowers, the hacker movement Anonymous hopes that a few outside intruders might start the leaks flowing.LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-75917913573190488042011-06-29T09:32:00.002-05:002011-06-29T09:49:29.386-05:007 Hottest Hacker Chicks in Internet HistoryPa que entienda la raza "Las 7 Mamis mas chidas hackers en la historia de la Internet"<br /><br />Kristina Svechinskaya<br /> <br />Before these chicks THIS was the hottest hacker we all knew and loved.<br /><br />Kristina Svechinskaya is a New York University student who was arrested on November 2, 2010 for defrauding US and British banks out of millions of dollars -- and you thought your ex was insane. <br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://img2.ranker.com/user_node_img/6396/1000109012/300/kristina-svechinskaya-person-photo-u1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 300px; height: 300px;" src="http://img2.ranker.com/user_node_img/6396/1000109012/300/kristina-svechinskaya-person-photo-u1.jpg" border="0" alt="" /></a><br /><a href="http://www.ranker.com/list/7-hottest-hacker-chicks-in-internet-history/greg">7 Hottest Hacker Chicks in Internet History,</a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-48855843936166928052011-06-29T09:24:00.000-05:002011-06-29T09:24:48.367-05:00Hacking Videos from Shmoocon - good coders code, great reuse<a href="http://www.catonmat.net/blog/shmoocon-hacking-videos/">Hacking Videos from Shmoocon - good coders code, great reuse</a><br /><br />Here are the videos from Shmoocon 2006:<br /><br />Behavioral Malware Analysis Using Sandnets by Joe Stewart<br />Asterisk: VoIP for the Masses by Damin [presentation]<br />Black Ops Of TCP/IP 2005.5 by Dan Kaminsky<br />Breaking LanMan Forever by Dan Moniz and Patrick Stach<br />Covert Crawling: a wolf among lambs by Acidus<br />The Church of Wi-Fi presents: An Evil Bastard, A Rainbow and a Great Dane! by Renderman, Thorn, Dutch, and Joshua Wright [presentation and coWPAtty tool]<br />Network Policy Enforcement / Network Quarantine - Latest Security Gimmick or Good Idea? by Steve ManzuikLeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-85038512318000242532011-06-28T17:03:00.000-05:002011-06-28T17:03:41.701-05:00Astalavista.com – the IT News & Security community<a href="http://www.astalavista.com/">Astalavista.com – the IT News & Security community</a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-64853724279922029132011-06-28T16:52:00.000-05:002011-06-28T16:57:22.829-05:00Social engineering (security)<meta equiv="content-type" content="text/html; charset=utf-8"><div><meta equiv="content-type" content="text/html; charset=utf-8"><span class="Apple-style-span" style="font-size: 13px; line-height: 19px; font-family: sans-serif; "><div class="dablink" style="font-style: italic; padding-left: 2em; margin-bottom: 0.5em; ">This article is about manipulation of individuals. For social engineering in terms of influencing popular behavior, see <a href="http://en.wikipedia.org/wiki/Social_engineering_(political_science)" title="Social engineering (political science)" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Social engineering (political science)</a>.</div><table class="infobox" cellspacing="5" style="font-size: 11px; border-top-width: 1px; border-right-width: 1px; border-bottom-width: 1px; border-left-width: 1px; border-top-style: solid; border-right-style: solid; border-bottom-style: solid; border-left-style: solid; border-top-color: rgb(170, 170, 170); border-right-color: rgb(170, 170, 170); border-bottom-color: rgb(170, 170, 170); border-left-color: rgb(170, 170, 170); background-color: rgb(249, 249, 249); color: black; margin-top: 0.5em; margin-right: 0px; margin-bottom: 0.5em; margin-left: 1em; padding-top: 0.2em; padding-right: 0.2em; padding-bottom: 0.2em; padding-left: 0.2em; float: right; clear: right; text-align: left; line-height: 1.5em; width: 22em; "><tbody><tr><th colspan="2" class="" style="vertical-align: top; text-align: center; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: rgb(255, 192, 192); font-size: larger; background-position: initial initial; background-repeat: initial initial; "><a href="http://en.wikipedia.org/wiki/Computer_security" title="Computer security" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Computer security</a></th></tr><tr class=""><td colspan="2" class="" style="vertical-align: top; text-align: center; "><a href="http://en.wikipedia.org/wiki/Secure_operating_systems" title="Secure operating systems" class="mw-redirect" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Secure operating systems</a></td></tr><tr class=""><td colspan="2" class="" style="vertical-align: top; text-align: center; "><a href="http://en.wikipedia.org/wiki/Security_architecture" title="Security architecture" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Security architecture</a></td></tr><tr class=""><td colspan="2" class="" style="vertical-align: top; text-align: center; "><a href="http://en.wikipedia.org/wiki/Security_by_design" title="Security by design" class="mw-redirect" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Security by design</a></td></tr><tr class=""><td colspan="2" class="" style="vertical-align: top; text-align: center; "><a href="http://en.wikipedia.org/wiki/Secure_coding" title="Secure coding" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Secure coding</a></td></tr><tr><th colspan="2" class="" style="vertical-align: top; text-align: center; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: rgb(255, 192, 192); font-size: larger; background-position: initial initial; background-repeat: initial initial; "><a href="http://en.wikipedia.org/wiki/Computer_insecurity" title="Computer insecurity" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Computer insecurity</a></th></tr><tr class=""><th scope="row" style="vertical-align: top; text-align: left; "><a href="http://en.wikipedia.org/wiki/Vulnerability_(computing)" title="Vulnerability (computing)" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Vulnerability</a></th><td class="" style="vertical-align: top; "><strong class="selflink">Social engineering</strong>
<br /><a href="http://en.wikipedia.org/wiki/Eavesdropping" title="Eavesdropping" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Eavesdropping</a></td></tr><tr class=""><th scope="row" style="vertical-align: top; text-align: left; "><a href="http://en.wikipedia.org/wiki/Exploit_(computer_security)" title="Exploit (computer security)" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Exploits</a></th><td class="" style="vertical-align: top; "><a href="http://en.wikipedia.org/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Trojans</a>
<br /><a href="http://en.wikipedia.org/wiki/Computer_virus" title="Computer virus" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Viruses</a> and <a href="http://en.wikipedia.org/wiki/Computer_worm" title="Computer worm" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">worms</a>
<br /><a href="http://en.wikipedia.org/wiki/Denial_of_service" title="Denial of service" class="mw-redirect" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Denial of service</a></td></tr><tr class=""><th scope="row" style="vertical-align: top; text-align: left; "><a href="http://en.wikipedia.org/wiki/Payload_(software)" title="Payload (software)" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Payloads</a></th><td class="" style="vertical-align: top; "><a href="http://en.wikipedia.org/wiki/Backdoor_(computing)" title="Backdoor (computing)" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Backdoors</a>
<br /><a href="http://en.wikipedia.org/wiki/Rootkit" title="Rootkit" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Rootkits</a>
<br /><a href="http://en.wikipedia.org/wiki/Keylogger" title="Keylogger" class="mw-redirect" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Keyloggers</a></td></tr><tr><td colspan="2" style="vertical-align: top; text-align: right; "><span class="noprint plainlinks navbar" style="font-size: 10px; font-weight: normal; "><span style="white-space: nowrap; word-spacing: -0.12em; "><a href="http://en.wikipedia.org/wiki/Template:Computer_security" title="Template:Computer security" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none !important; background-attachment: initial !important; background-origin: initial !important; background-clip: initial !important; background-color: initial !important; padding-top: 0px !important; padding-right: 0px !important; padding-bottom: 0px !important; padding-left: 0px !important; background-position: initial initial !important; background-repeat: initial initial !important; "><span title="View this template">v</span></a> <span><b>·</b></span> <a href="http://en.wikipedia.org/wiki/Template_talk:Computer_security" title="Template talk:Computer security" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none !important; background-attachment: initial !important; background-origin: initial !important; background-clip: initial !important; background-color: initial !important; padding-top: 0px !important; padding-right: 0px !important; padding-bottom: 0px !important; padding-left: 0px !important; background-position: initial initial !important; background-repeat: initial initial !important; "><span title="Discuss this template">d</span></a> <span><b>·</b></span> <a href="http://en.wikipedia.org/w/index.php?title=Template:Computer_security&action=edit" class="external text" rel="nofollow" style="text-decoration: none; color: rgb(51, 102, 187); background-image: url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAoAAAAKCAYAAACNMs+9AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAAFZJREFUeF59z4EJADEIQ1F36k7u5E7ZKXeUQPACJ3wK7UNokVxVk9kHnQH7bY9hbDyDhNXgjpRLqFlo4M2GgfyJHhjq8V4agfrgPQX3JtJQGbofmCHgA/nAKks+JAjFAAAAAElFTkSuQmCC); background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; padding-top: 0px !important; padding-right: 13px; padding-bottom: 0px !important; padding-left: 0px !important; background-position: 0% 0%; background-repeat: no-repeat no-repeat; "><span title="Edit this template">e</span></a></span></span></td></tr></tbody></table><p style="margin-top: 0.4em; margin-right: 0px; margin-bottom: 0.5em; margin-left: 0px; line-height: 1.5em; "><b>Social engineering</b> is the art of <a href="http://en.wikipedia.org/wiki/Psychological_manipulation" title="Psychological manipulation" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">manipulating</a> people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.<sup id="cite_ref-0" class="reference" style="line-height: 1em; font-weight: normal; font-style: normal; "><a href="http://en.wikipedia.org/wiki/Social_engineering_%28security%29#cite_note-0" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; white-space: nowrap; background-position: initial initial; background-repeat: initial initial; "><span>[</span>1<span>]</span></a></sup> While similar to a <a href="http://en.wikipedia.org/wiki/Confidence_trick" title="Confidence trick" style="text-decoration: underline; color: rgb(250, 167, 0); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">confidence trick</a> or simple <a href="http://en.wikipedia.org/wiki/Fraud" title="Fraud" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">fraud</a>, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the <a href="http://en.wikipedia.org/wiki/Attack_(computer)" title="Attack (computer)" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">attacker</a> never comes face-to-face with the victim. In the United Kingdom, social engineering using impersonation (e.g. to gain information over the phone, or to <a href="http://en.wikipedia.org/wiki/Gate-crashing" title="Gate-crashing" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">gate-crash</a> an event) is known informally as <b>blagging</b>. In addition to criminal purposes, social engineering has also been employed by debt collectors,<a href="http://en.wikipedia.org/wiki/Skiptrace" title="Skiptrace" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">skiptracers</a>, private investigators, bounty hunters and tabloid journalists.</p><p style="margin-top: 0.4em; margin-right: 0px; margin-bottom: 0.5em; margin-left: 0px; line-height: 1.5em; ">"Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant <a href="http://en.wikipedia.org/wiki/Kevin_Mitnick" title="Kevin Mitnick" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; background-position: initial initial; background-repeat: initial initial; ">Kevin Mitnick</a>. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals.<sup id="cite_ref-1" class="reference" style="line-height: 1em; font-weight: normal; font-style: normal; "><a href="http://en.wikipedia.org/wiki/Social_engineering_%28security%29#cite_note-1" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; white-space: nowrap; background-position: initial initial; background-repeat: initial initial; "><span>[</span>2<span>]</span></a></sup></p><p style="margin-top: 0.4em; margin-right: 0px; margin-bottom: 0.5em; margin-left: 0px; line-height: 1.5em; ">A study by Google researchers analyzing fake AV distribution found that up to 90% of all domains involved in distributing fake antivirus software used social engineering techniques.<sup id="cite_ref-2" class="reference" style="line-height: 1em; font-weight: normal; font-style: normal; "><a href="http://en.wikipedia.org/wiki/Social_engineering_%28security%29#cite_note-2" style="text-decoration: none; color: rgb(6, 69, 173); background-image: none; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: initial; white-space: nowrap; background-position: initial initial; background-repeat: initial initial; "><span>[</span>3<span>]</span></a></sup></p></span></div><div>
<br /></div><a href="http://en.wikipedia.org/wiki/Social_engineering_%28security%29">http://en.wikipedia.org/wiki/Social_engineering_%28security%29</a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-56977367786309092562011-06-28T16:41:00.001-05:002011-06-28T16:41:54.512-05:00PRUEBA 2PRUEBA 2LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-68779915935182506082011-06-28T14:15:00.003-05:002011-06-28T14:17:03.560-05:00HOLA MUNDOPrueba para ligar mi blogger con el twitter en el portal de TICLeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-89676987648655703532010-07-13T08:15:00.000-05:002010-07-13T08:15:53.245-05:00Grape-DR: El superordenador más verde<a href="http://www.neoteo.com/grape-dr-el-superordenador-mas-verde.neo?sms_ss=blogger">Grape-DR: El superordenador más verde</a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-3544388000362303232010-06-18T09:08:00.001-05:002010-06-18T09:09:57.434-05:00Juan Carlos Rodríguez Ibarra, Entrega Premios de Internet II, Senado el diadeinternet 2010Acuantos años luz estamos de esto?....gracias Rive magnifico aporte en el Buzz<br /><br /><br /><object width="480" height="385"><param name="movie" value="http://www.youtube.com/v/wzu7KvGBlZ0&hl=en_US&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/wzu7KvGBlZ0&hl=en_US&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="480" height="385"></embed></object>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-27194711466788479332010-06-07T08:16:00.002-05:002010-06-07T08:24:08.226-05:00Aburrido(a), checa este videoEs de Sep del '09, pero las paginas en su mayoria si no es que todas estan activas, check it out!<br /><br /><object width="640" height="385"><param name="movie" value="http://www.youtube.com/v/BWEcxUCKTyo&hl=en_US&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/BWEcxUCKTyo&hl=en_US&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="640" height="385"></embed></object>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-6870075353382693572010-03-10T20:01:00.002-06:002010-03-10T20:04:06.973-06:00Cisco Introduces Foundation for Next-Generation Internet: The Cisco CRS-3 Carrier Routing System -> Cisco NewsCisco presenta nuevo router: 322 Terabits por segundo<br />Por: Lisandro Pardo <br /><br />¿Qué tan rápida puede volverse Internet en el futuro? Mucho, si aparece hardware como el que presentó recientemente Cisco. El nuevo juguete es conocido como CRS-3, y su capacidad triplica a la del modelo anterior creado por la empresa. Se espera que este nuevo modelo se convierta en un pilar fundamental para la Internet del futuro, ya que el aumento de la demanda de ancho de banda será considerable de aquí a unos pocos años, algo que incluso hoy ya puede percibirse.<br /><br /><br /><a href=http://newsroom.cisco.com/dlls/2010/prod_030910.html>Cisco Introduces Foundation for Next-Generation Internet: The Cisco CRS-3 Carrier Routing System -> Cisco News</a><br /><br />Posted using <a href="http://sharethis.com">ShareThis</a><br /><br />www.neoteo.comLeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-79305567594305480422010-02-21T00:08:00.002-06:002010-02-21T00:13:31.322-06:00Proyecto LULA<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOW90m8hy4kMHGPzn04H_rOwQeoQNMBBMW9pgqs_UT5of9AExeftRaEt0RqS0KQg_Ikmw1K9ADnsVWBRYWnk8eI3GipzRHVuO6nlrHuwCNVxdIpcHThWtZ2F_MBtPhr7v3e5Nit3O3__lg/s1600-h/lulabanner.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 32px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOW90m8hy4kMHGPzn04H_rOwQeoQNMBBMW9pgqs_UT5of9AExeftRaEt0RqS0KQg_Ikmw1K9ADnsVWBRYWnk8eI3GipzRHVuO6nlrHuwCNVxdIpcHThWtZ2F_MBtPhr7v3e5Nit3O3__lg/s320/lulabanner.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5440575955420799602" /></a><br /><br /><br /><br />Este proyecto es llevado a cabo por varias universidades de Latinoamerica, en la cual crearon una distro con el contenido en software necesario para estar en los centros de computo de cualquier universidad, ya baje la distro es un DVD, el que lo quiera se lo quemo (solo La Comarca Lagunera).<br /><br />Chequen la pagina:<br /><br /><a href="http://lula.unex.es/"><br />http://lula.unex.es/</a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com1tag:blogger.com,1999:blog-2889893166557102632.post-3925083181574423892010-02-21T00:02:00.001-06:002010-02-21T00:08:44.759-06:00Computer System EngineeringAqui les dejo un conjunto de capitulos que comprenden una materia "engineering of computer software and hardware systems" del MIT, totalmente libre. <br /><br />Estudienla, practiquela y compartan.<br /><a href="http://academicearth.org/courses/computer-system-engineering"><br />http://academicearth.org/courses/computer-system-engineering</a><br /><br />Y si le buscan encontraran mas.<br /><br />(Acaso será la proxima expoción de mis alumnos???).LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-91494598565126838132010-02-20T23:22:00.007-06:002010-02-20T23:37:34.092-06:00Lo mejor de los muppet...ni hablar...Se q este video no es parte de este tipo de contenido, pero ya a eso de las 12:00 a.m. pos guste de poner algo de buena musica y sentimiento. DISFRUTENLA¡¡¡¡¡<br /><br />Habanera:<br /><br /><object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/jXKUb5A1auM&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/jXKUb5A1auM&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="425" height="344"></embed></object><br /><br />Algo de Queen:<br /><br />Somebody to love<br /><br /><object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/xsFObuWNp4w&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/xsFObuWNp4w&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="425" height="344"></embed></object><br /><br />Bohemian Rhapsody<br /><br /><object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/tgbNymZ7vqY&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/tgbNymZ7vqY&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="425" height="344"></embed></object><br /><br />Beaker's Ballad<br /><br /><object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/EAtBki0PsC0&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/EAtBki0PsC0&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="425" height="344"></embed></object><br /><br />Y para finalizar un Super Clasico....<br /><br />Hchicha Mahna Yal Mahna (me recuerda al M77)<br /><br /><object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/HdUeVAkzEas&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/HdUeVAkzEas&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="425" height="344"></embed></object><br /><br />Enjoy¡¡¡¡¡ :)LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0tag:blogger.com,1999:blog-2889893166557102632.post-3044963744596587442010-02-20T15:04:00.004-06:002010-02-20T15:18:08.779-06:00Cobro de peaje por buscar en internet????Telefónica de españa se siente usada por los navegadores como Google y Yahoo, lo cual dijo en una presentación ante los medios ya hace varios dias, en el cual indica que podria cobrarles a los navegadores por el uso de su infraestructura de telecomunicaciones.<br /><br />Por que se dice que de toda la lana que ganan Google y Yahoo por la publicidad, y por el uso de su infraestructura, ellos no obtienen nada, y que es por ellos que estas busquedas y navegacion es posible; la venta, la infraestructura, el costo de ventas, etc....etc... lo hacen ellos y los de mas se aprovechan, de igual forma Vodafone quiere unirse a la lucha por sus "Derechos"...<br /><br />Les dejo el video y las referencias por si quieren leer mas sobre ello.<br /><br /><object height="344" width="425"><param name="movie" value="http://www.youtube.com/v/wUcyNs8Eays&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1"><param name="allowFullScreen" value="true"><param name="allowScriptAccess" value="always"><embed src="http://www.youtube.com/v/wUcyNs8Eays&color1=0xb1b1b1&color2=0xcfcfcf&hl=en_US&feature=player_embedded&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" height="344" width="425"></embed></object><br /><br /><a href="http://www.elpais.com/articulo/sociedad/Telefonica/abre/veda/cobrar/Google/uso/red/elpepusoc/20100208elpepisoc_3/Tes">http://www.elpais.com/articulo/sociedad/Telefonica/abre/veda/cobrar/Google/uso/red/elpepusoc/20100208elpepisoc_3/Tes</a><br /><br /><a href="http://www.publico.es/ciencias/295014/vodafone/suma/voces/piden/google/comparta/negocio"><br />http://www.publico.es/ciencias/295014/vodafone/suma/voces/piden/google/comparta/negocio</a>LeoNeohttp://www.blogger.com/profile/16996157634449084067noreply@blogger.com0