Carlos Laorden

HTTPS and Let’s Encrypt, protect your communications!

We must protect the system somehow. We have spoken before of how to protect web applications, configure a router or directly IoT systems. Today what we see is how to protect as much as possible communications with all these devices, using

Looking for security holes in my webs

Today we will play with a web vulnerabilities  search tool with which we can check  very easily the safety of our web applications. The tool in question is Vega, an Open Source platform web auditing can help us identify and

A connected car or a horse-drawn carriage

Internet of things, smart appliances and, now, the connected car. The technology seeps into every corner to make life easier, but, as with everything, offers new possibilities for other people to do bad things. Here we tend to talk about

WEKA, from data to information (Part III)

We return with a new article on WEKA. Following the introduction on how to prepare the environment and how use some basic functions, and the second part in which we tried to dig a little deeper into this tool, now it

WEKA, from data to information (Part II)

To start, let’s download a new dataset with features wine production: wine.arff. To view the content, we can open it directly and select Weka as the default tool or within the Explorer section. If we look at the attributes of the

WEKA, from data to information (Part I)

We start with the basics, installation and familiarization with the tool, and a simple example to see its possibilities. First, we download WEKA from the website of the University of Waikato in New Zealand. Within its download section, find the version