Posts in category

security


La piratería digital hace referencia a la distribución de manera ilegal de material o servicios sujetos a derechos de autor, por ejemplo, cuando descargas gratis ese juego nuevo en tu computadora que cuesta 60 dólares de manera oficial desde la página juegos100%legales.com, pero ¿esto es realmente malo? En términos generales, sí, por los siguientes motivos. …

No es ninguna nueva noticia qué muchos hackers obtengan tu información por medio de un correo electrónico que contenga links o archivos infectados, pero no te preocupes, es este post te daremos algunos tips para que tu correo electrónico y/o información confidencial no se vea comprometido antes este tipo de personas. Antes de empezar, cabe …

Iptables is a command line utility for configuring the Linux kernel firewall. The term iptables is also commonly used to refer to such a kernel firewall. It can be configured directly with iptables, or using one of the many existing console and graphics frontend. THE MOST COMMON IPTABLES ARE: BLOCK A PORT:…

Genaro Delgado Montalvo is a co-founder of Cyberwag and Maker Center, in addition to being a specialist in cybersecurity, technology business development, and passionate about sharing his knowledge through mentoring and collaborations with high-impact companies. He is currently a resident of the Aguascalientes Information Technology Cluster: InnovaTIA, period 2019-2021, and ...

Spoofing is the use of phishing techniques, generally for malicious purposes. Spoofing is known as the creation of TCP / IP frames using a spoofed IP address; The idea of this attack - at least the idea - is very simple: from his computer, a pirate simulates the identity of another ...

Phishing occurs when a third party, usually a malicious hacker or website, uses a company's brand identity to corner a user and expose private information. There are two types of email phishing: Phishing messages coming to you Phishing messages coming from you…