Merry ʎʇıʌɐɹƃ be with you

This year we decided to be multi-cultural and not just stick to one of the many parties celebrated around the winter solstice. So: Happy Mithra, Happy Hanukkah, Merry Christmas, Merry Christmas, Happy Saturnalia But above all, as scientists: Happy Day

Applications of cybercrime legal framework (IV)

The stalking offense is born to give a punishable legal response to those behaviors that, although they have no legal reserve in the criminal type of harassment or threat, but nonetheless, are completely illegitimate behaviors, in In any case, since

Hardening binaries (V) – UBSan

The indefinite behavior in C / C ++ is caused when there are no restrictions on the program behavior; which means, when the standard does not specify what the implementation should do, it is free to do what it seems,

Portable experiments (II) – “Recipes” for VMs

In the previous post we talked about Vagrant, a tool that can help us manage the creation of virtual machines. In this post we will focus on another tool called Ansible. It is based on the concept of roles: on

Research in USA and in Spain

It is not a secret that in the United States of America   (usually) more and better research than in the rest of the world is done. But why? What happens in Computer Science and System Security? And what is

Applications of cybercrime legal framework (III)

In this post we will summarize the resolution 238/2014 of the criminal court No. 4 Alcalá de Henares where the Prosecutor launches the accusation in the following terms:Discovery of secrets (article 197-2 of the Criminal Code.)Between 17 and 28 August