go run summer.GO

sunshineMinecraft

We recognize it, we have sinned. We are playing Pokemon GO. We have decided to ignore the privacy issues, battery drain, DoS attacks to servers and we have taken the streets. It has also helped us to discover the sunlight, which

Security Research (V) – 4 errors, 1 failure

errors_PhdComics

In this series of posts on how to start researching in system security, we have seen the first steps on how to choose topic, director, as well ad doing the first workplan and how  a scientific contribution is done in

Applications of cybercrime legal framework

reparacionEquipo

Given the wide case mix that make up the jurisprudential doctrine of this type of crimes, we thought it is appropriate to bring up curious and instructive cases. STC (2nd Penal Chamber) 7 November 2011, facts: The defendant gives brought his computer

Exploit kits, loved and hated in equal measure

exploit-kits

Exploit kits are the cause of a large percentage of malware infections that occur nowadays. Depending on the side where you are, you will consider exploit kits a godsend or a hellish curse. They are toolsets to automatically exploit vulnerabilities on the client

Hardening binaries (II): PIE

apple-pie

Following the classic compilation options of GCC to try to have more robust binary, in this post we will discuss the options and -fPIE -fpie that allows to compile executable as “Position Independent Executables” and makes their sections to be loaded in random

Autoscaling with Scryer from Netflix

scryer2

More and more companies decide to host their services in the cloud. The advantage of a cloud providers is the hability to use only the resources we need at all times, rather than paying the cost of a fixed number of

Security Research (IV) – Contributions

contribution2

In our previous posts of our series “Security Research” we saw how to make one of the first and most important step that both doctoral student and thesis director must carry out: the definition of the first general workplan. At this

Cybercrime and legal framework (IV)

courtLaw

Finally we address the 4th Section of Title XVIII, which is similarity to traditional crimes of documentary falsehoods in public/private documents (in its different variants). Equally we address those crimes that are committed in the exercise of the functions and duties of custody because

Cybercrime and legal framework (III)

computerCrime2

We continue analyzing technological crimes from a legal point of view. This time based on economic and intellectual/industrial property actions. In this section (TÍTULO XIII, Delitos contra el patrimonio y contra el orden socioeconómico) fit habitual behaviors such as phishing,

Underground memories

Amiga500System

Those, like me, who are old school people and lived the golden age of Spanish underground, we tend to miss those days when everything was much more fun than now. We used Windows 3.1  for groups work, we uprooted from

Categories