In this post we will summarize the resolution 161/2010 of the Criminal court number two of Salamanca where the absence of criminal liability is settled on a denial-of-service attack to a web server of the Cancer Research Center, that at…
In this post we will summarize the resolution 161/2010 of the Criminal court number two of Salamanca where the absence of criminal liability is settled on a denial-of-service attack to a web server of the Cancer Research Center, that at…
In previous posts we’ve talked about GCC options that make our executable safer , in this posts we present compilation options that generate reports, warning of errors in the code. AddressSanitizer (Asan) is an option for Clang (> = 3.1) and GCC (> =…
In the previous post we mentioned the potential of cloud computing thanks to the virtualization layer. For years we have been using Virtual Machines (VMs) to house multiple “copies” of the same service. This allows you to add or remove instances,…
We recognize it, we have sinned. We are playing Pokemon GO. We have decided to ignore the privacy issues, battery drain, DoS attacks to servers and we have taken the streets. It has also helped us to discover the sunlight, which…
In this series of posts on how to start researching in system security, we have seen the first steps on how to choose topic, director, as well ad doing the first workplan and how a scientific contribution is done in…
Given the wide case mix that make up the jurisprudential doctrine of this type of crimes, we thought it is appropriate to bring up curious and instructive cases. STC (2nd Penal Chamber) 7 November 2011, facts: The defendant gives brought his computer…