Print blog.uptime 365 days

During these time, we talked about privacy operators; we interviewed fantastic professionals as David Barroso; Joxean Koret or Txipi. We surfed the Deep Web, tried to guess if a person could survive the Titanic, hunted trolls, analyzed applications to protect

The marketing behind zero-day vulnerabilities

In recent times, the landscape of zero-day vulnerabilities has been modified by a curious phenomenon, the marketing. And I am not referring to the technique used by hackers and security researchers to sell them, but to the system used for

Analyzing IIS logs with Pandas

Data analysis is a key point in the field of servers . There are many tools to perform this analysis, but we will use the tools that allowed us to guess whether a traveler of the Titanic would survive or

WEKA, from data to information (Part II)

To start, let’s download a new dataset with features wine production: wine.arff. To view the content, we can open it directly and select Weka as the default tool or within the Explorer section. If we look at the attributes of the

Xprivacy, a proper firewall for Android

Allows to block the apps installed and permits the use of default templates for each new installed app, using fictitious values, locking requests from apps “on the fly” and storing and share settings. The app is free, but also has a

Bloom Filter, an algorithm like an Hasbro game

00If you ever used Cassandra, you know that is well known at being extremely fast in writes and reads, and that is due in part to a data structure called Bloom Filter. Bloom Filter is an extremely efficient way of