Because on the network, no one can hear you scream

The network can be a Universe of its own. Vast, full of things that are or can be unknown. And just like in Sci-Fi movies, it is plagued with dangers. Hackers, malware, etc. Everything is there. As like in some movies, you need to learn to protect yourself.  If not, you might be just like…

Fix it Felix Jr.! Security network edition!

Wrecking stuff have always been Ralph’s thing. Ever since his tree stump was moved to the dumpster, he had dedicated himself to wreck the building that was built in his old place. But, whenever Wrack starts wrecking, Felix Jr. has always been there to fix things, thankfully. With his useful hammer, he always fixes the…

Fashion Security Runway: Architecture Models

Today, coming down our runway are the security architectures, showing us their models. Show your enthusiasm and let’s begin! *cue sassy music in*   The first model is State Machine. It is using states to verify the security of a system, capturing all the current permissions and instances of subjects accessing objects. Getting the job…

Administrando el peligro

En el sector público y privado se tienen diferentes usos para la información y las nuevas tecnologías, como ya hemos visto eso conlleva a tener presentes una serie muy grande de peligros y vulnerabilidades latentes. Las diferentes compañías y empleados que generan las nuevas tecnologías deben no sólo ser capaces de reaccionar ante estas vulnerabilidades,…

Type your username and password here

Originalmente publicado en Diego's Password:
Please, input your username and password to read this post: ?         Username:         Password: … You didn’t fall under our little trap/joke right? (Really, hopefully you didn’t). ? ? Anyways, jokes aside, this kind of things that many pages like Facebook or…

No time for panic

Imagine you own a very important company, constantly attacked or under possible attacks from spies. You are vulnerable, you are at risk. But what can you do know? You might start to panic thinking nothing can save you. Ah, but there is something you could do. No, don’t look at us with those big, hopeful…

Policies in Wonderland

Let’s play, let’s play, with allegories and fantasies. Let’s play, let’s learn, about security policies. The company becomes a kingdom, The CEO becomes the queen. But being who I am, But being who you are It can’t be any kingdom And now you are in Wonderland. “Off with the head!” “Off with the head!” Yells…

Code 404! We are under attack!

Have you ever gone in to a web page you usually go into, but that day you simply can’t. You might be getting the (in)famous error: 404 page not found. But why?! You check your Internet connection, might even open other tabs and see it just fine. So it must only be happening to this…

Things that are and are not fiction

Okay, I think I should start by saying that this post on whole is my opinions about the movie NERVE and that it contains some SPOILERS of the film, so I must warn you if you haven’t seen it and wish to do so, close this post or tab right now. If you just don’t care…

The three “knights” of Computer Security

Come children and listen to this story. Once there was a kingdom. All kingdoms have something that  makes them special. Some have a fair princess, other brave knights, or others are cursed by an evil witch. What made this kingdom special, was the amount of information it had about the world in it’s huge library….

Let’s get down to business

The moment you arrived to this blog and learned I’m here to talk about computing security, you might have thought “why do I want to read about that”. But wait, don´t push that exit button just yet! The security of your own computer is very important to you! Or at least, it should be! That’s…

Hello there!

Hi! Welcome to my [newly made] blog and thank you for passing by! Let me introduce myself. My pen-name is Audray, but you can call me Ray for short. I’m new in this of blogging, so this will probably result on being an interesting ordeal. At this point you might be asking: -Why do you…