Deep in the machine learning

Artificial intelligence is fashionable. From more apocalyptic visions to the emergence of new frameworks that make it easier for developers to make various applications in the field. Today he are goging to talk about one of these frameworks: TensorFlow. In

Future directions of research on systems security

The computing scenario has changed a lot over the years, provoking an explosion of new technologies, interaction scenarios and. most importantly, a democratization of technology usage. In the fascinating research area of Systems Security the goal has been always to

Honeypots, attracting hackers with vulnerabilities

There is very useful technique to know who wants to enter your network and which are his intentions. Simply leave a pot of vulnerabilities in the middle of the woods and wait for the bees to approach. Most times they

Nomination in process

Reviewing the folders that have on the server, we have noticed that the awards  folder of the blog is empty (keep a folder for these purposes when you start a blog is always recommended), so we decided to seek for

Looking for security holes in my webs

Today we will play with a web vulnerabilities  search tool with which we can check  very easily the safety of our web applications. The tool in question is Vega, an Open Source platform web auditing can help us identify and

Optimizing the installation of a router

Making the installation of a new wireless router at home, although at first glance seems simple, something always aindicated by operators, it is not at all. If it is true that to start using it is just connect, look for the wireless