Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Wired: Threat Level: A Scheme to Encrypt the Entire Web Is Actually Working

The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.

View Article


Image may be NSFW.
Clik here to view.

48Bits Blog: LaCon2k16 Call For Pulpos

We are proud to present the call for papers for Lacon 2016!, get your papers in now. We are accepting short talks of 30min and long talks of ~1h.[when]conf will be held from the 23rd to the 25th of...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Lee para vivir más y mejor preparado

No he sido mal estudiante, al menos siempre se me dieron bien las asignaturas de ciencias - y por supuesto las matemáticas -, pero ni mucho menos he sido o soy una mente privilegiada. He tenido que...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Charlas Dialogando + Carto Locations +...

El mes de Abril de este año me dio para muchas cosas y no puedo decir eso de "¿Quién me ha robado el mes de abril?", ya que lo puedo ver casi en vídeos y fotos. Viajes por muchos sitios, incluidos uno...

View Article

Image may be NSFW.
Clik here to view.

Infosec Events: Information Security Events For August

Here are information security events in North America this month: DFRWS USA 2017 : August 6 to 9 in Austin, TX, USA  Cyber Security Summit Chicago 2017 : August 8 in Chicago, IL, USA  EnergySec 2017 :...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: 2017, el año que "bypasseamos" UAC...

Esta semana también tendremos un Bypass de User Account Control en los sistemas Microsoft Windows de que hablar. En este caso trata de un bypass de UAC de mediados de mayo, pero he querido explicarlo...

View Article

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: CrackMapExec – Active Directory Post-Exploitation Tool

CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Built with stealth in mind, CME follows the concept of “Living off...

View Article

Image may be NSFW.
Clik here to view.

Wired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...

Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.

View Article


Image may be NSFW.
Clik here to view.

Wired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous

The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...

View Article


Image may be NSFW.
Clik here to view.

Wired: Threat Level: A Scheme to Encrypt the Entire Web Is Actually Working

The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Sur a Norte: Un viaje de tres semanas por...

El día 21 de Agosto comenzaré una gira que me va a tener de viaje por toda América al estilo de las viejas estrellas de principios del SigloXX. Con mi maleta a cuestas, pasando por una cantidad de...

View Article

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: US Voting Machines Hacked At DEF CON – Every One

US Voting Machines Hacked, some in minutes at this year’s DEF CON “Voting Village” – not something you want to hear really. Especially with the results of recent elections that the World is currently...

View Article

Image may be NSFW.
Clik here to view.

Wired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous

The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Nadie más que tú decide cuándo dejar de...

Me gusta comer bien. Cenar una mariscada con una botella de vino en buena compañía, o una buena carne con un buen Jumilla. Me gusta tomarme una copa en la sobremesa y hablar durante horas. Tomar Cava....

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: iPhone: Device Paired Tool para saber qué...

Ya por todos es conocido el riesgo que existe cuando un iPhone es conectado a un equipo. Desde el equipo pareado con el terminal iPhone se pueden hacer muchos ataques a iPhone para robarle datos,...

View Article


Image may be NSFW.
Clik here to view.

Darknet - The Darkside: Jack – Drag & Drop Clickjacking Tool For PoCs

Jack is a Drag and Drop web-based Clickjacking Tool for the assistance of development in PoCs made with static HTML and JavaScript. Jack is web based and requires either a web server to serve its HTML...

View Article

Image may be NSFW.
Clik here to view.

Wired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous

The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: WordPress: Role-Based Database Connection...

Una aplicación web, o un framework CMS como WordPress, utiliza un repositorio de datos en un motor de bases de datos, en concreto MySQL. Para eso, durante el proceso de instalación se crea un usuario...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Redención

Para hoy domingo os traigo un texto sencillo, con una pequeña reflexión sobre este hecho: La Redención. Define la Real Academia de la Lengua Española este término con varias acepciones, siendo la...

View Article

Image may be NSFW.
Clik here to view.

Wired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...

Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.

View Article
Browsing all 12054 articles
Browse latest View live