We must protect the system somehow. We have spoken before of how to protect web applications, configure a router or directly IoT systems. Today what we see is how to protect as much as possible communications with all these devices, using…
Carlos Laorden
We must protect the system somehow. We have spoken before of how to protect web applications, configure a router or directly IoT systems. Today what we see is how to protect as much as possible communications with all these devices, using…
Today we will play with a web vulnerabilities search tool with which we can check very easily the safety of our web applications. The tool in question is Vega, an Open Source platform web auditing can help us identify and…
Internet of things, smart appliances and, now, the connected car. The technology seeps into every corner to make life easier, but, as with everything, offers new possibilities for other people to do bad things. Here we tend to talk about…
We return with a new article on WEKA. Following the introduction on how to prepare the environment and how use some basic functions, and the second part in which we tried to dig a little deeper into this tool, now it…
To start, let’s download a new dataset with features wine production: wine.arff. To view the content, we can open it directly and select Weka as the default tool or within the Explorer section. If we look at the attributes of the…
We start with the basics, installation and familiarization with the tool, and a simple example to see its possibilities. First, we download WEKA from the website of the University of Waikato in New Zealand. Within its download section, find the version…