Andres Alberto Gomez Acosta

20 Added | 6 Magazines | 3 Likes | 3 Followers | @andgomez98 | Keep up with Andres Alberto Gomez Acosta on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Andres Alberto Gomez Acosta”

Intentando saber que tipo de cifrado es

Me pueden apoyar para saber que tipo de cifrado tienen estos …

¿Qué es la Criptografía?

Buenas gente, como están? Les dejo un material que tengo sobre criptografía, en sí es un libro entero pero en presentaciones, les dejo el <b>enlace</b> para …

Criptografía con curvas elípticas

Hace tiempo que le doy vueltas a la idea de hacer un post sobre criptografía basada en curvas elípticas, pero hasta ahora me he resistido porque no …

Breve historia de la criptografía

Aunque el término <b>criptografía</b> nos suele hacer pensar en el mundo de los espías y en agencias como la NSA, realmente está muy presente en nuestro día …

What is a Digital Certificate?

In Security Knowledge by Steve on July 22, 2014 | Français, English, Deutsch<p><b>Have you ever heard the term digital certificate?</b> It’s another one of …

Realiza un análisis forense de tu PC con esta herramienta

Te presentamos OSForensics, un programa que sirve para realizar exámenes forenses en un ordenador.<p><b>OSForensics</b> es un software de análisis forense, me …

sqlmap v1.0.0.8#dev – Automatic SQL injection and database takeover tool. – Security List Network™

<b>Roadmap and changelog Version 1.0 (2016-02-27):</b><br>* Implemented support for automatic decoding of page content through detected charset.<br>* Implemented …

Compose's Little Bits #19 - Sleepy SQL injections, MySQL JSON, PostGIS and more

<i>Using SLEEP() in SQL Injections, using JSON in MySQL, sprinting for PostGIS features, the biggest SSDs yet, Rust's latest flakings, jQuery 3</i> …

Databases

Why cyber security is so important: 18 real-life hacks & cyber attacks that could disrupt your business

List: A look through Verizon’s Data Breach Digest and the different cyber scenarios that could threaten your business.<p>Verizon has released an in …

Preventing Cross

Cross-Site Request Forgery (CSRF) is an attack where a malicious site sends a request to a vulnerable site where the user is currently logged in<p>Here …

IT security

Chapter 12: Security

Introduction<p>This chapter addresses security-related topics for the Mileage Stats Reference Implementation (Mileage Stats) and is divided into three …

Software Development

Prevent Cross-Site Request Forgery (CSRF) using ASP.NET MVC’s AntiForgeryToken() helper

Cross-site scripting (XSS) is widely regarded as the number one security issue on the web. But since XSS gets all the limelight, few developers pay …

Ramping up ASP.NET session security

OWASP recently released their Top Ten 2013 list of web application vulnerabilities. If you compare the list to the 2010 version you’ll see that …

OWASP Top 10 for .NET developers part 9: Insufficient Transport Layer Protection

When it comes to website security, the most ubiquitous indication that the site is “secure” is the presence of transport layer protection. The …

Ransonware scam infects smartphones with child pornography

This is what it's like to be infected with the first 'ransomware' virus for Macs

Malware is a persistent problem on Windows machines — it has even shut down hospital networks— but this is the first time ransomware has made its way onto OS X.<p>The offending malware came bundled with an update to Transmission, a well-known program for downloading torrents. Unsuspecting users …

Ransomware