Performing a dynamic analysis of a malware sample is quick and can bring large amounts of data to perform a more complete and complex manual analysis. There are many sandboxes (controlled environments) that analyze a binary to know what exactly…
Performing a dynamic analysis of a malware sample is quick and can bring large amounts of data to perform a more complete and complex manual analysis. There are many sandboxes (controlled environments) that analyze a binary to know what exactly…
In the last chapter of “Anti-troll tools and techniques”, we described a series of methods for detecting and filtering the so maddening troll users: (i) knowledge discovery, (ii) data mining and (iii) text mining. Here, we present a new batch…
We tried to hit the lottery jackpot with Machine Learning, and we have also tried to hack the drums. But the number of variables is too big and we are more from digital world. So we retreated to reflect, we…
We must protect the system somehow. We have spoken before of how to protect web applications, configure a router or directly IoT systems. Today what we see is how to protect as much as possible communications with all these devices, using…
We return with a new post about movies. As mentioned above, more and more Hollywood blockbusters use the latest technology and devices to detect a kidnapping or to hack the highest government system. As a film buff that I am, I…
The console is, for some who know what it is, a black screen that only understand a few “geeks” . Others, however, know not exist without it. It is your tool for all your Swiss Army knife, entering anything. In Windows,…