Liz Anjos, "1979" una versión especial para este domingo por la mañana
Aquí el clásico:
Er docu der finde: La historia del espionaje - Capítulo 1
El futuro según Microsoft
Visto en TheNextWeb.
Vídeos de la SECTOR 2011
Ya podemos acceder a los vídeos de la SECTOR 2011, conferencia sobre seguridad celebrada en Toronto, Canadá. Ésta se celebro el pasado 17-19 de Octubre. Las presentaciones, aunque faltan bastantes también están disponibles desde la web oficial.
- Trust_me-I_am_a_cloud_vendor-Bruce_Cowper.wmv
- Thinking_Differently-Bringing_the_Hacker_Mindset_to_the_Corporate_Environment-Joe_Grand.wmv
- Online Espionage - Mikko Hypponen.wmv
- TheBizarre_Business_of_Rogue_Internet_Pharmacies-Brian_Krebs.wmv
- Near Field Communications (NFC) mobile security for those with No F'ing Clue - Corey Benninger and Max Sobell.wmv
- FireShark - A Tool to Link the Malicious Web - Stephan Chenette.wmv
- Finding Evil in Live Memory - Michael J Graven.wmv
- What is an APT without a sensationalist name - Seth Hardy.wmv
- Time and Place - Finding Evil with Atemporal Time Line Analysis - Dave Hull.wmv
- A Replicant by Any Other Name - A Security Analysis of the BlackBerry PlayBook - Zach Lanier and Ben Nell.wmv
- I'm Your MAC(b)Daddy - Grayson Lenik.wmv
- HTTP Header Hunter - Looking for malicious behavior into your http header traffic - Rodrigo Montoro.wmv
- A Technical View on Cloud Security - How Not To Get Your Undies In A Bunch aka Please Don't Squeeze The Charmin - David Mortman.wmv
- Targeted and Opportunistic Botnet Building - Gunter Ollmann.wmv
- Malware FreakShow - Nicholas J Percoco and Jibran Ilyas.wmv
- Sniper Forensics v3.0 - Hunt - Chris Pogue.wmv
- Bust a Cap in an Android App - Patrick Szeto and Maxim Veytsman.wmv
- Wireless Hacking Techniques and Tips - Kent Woodruff.wmv
- FACEROUTE - Mapping and Harvesting Social Media Sites - Rob VandenBrink.wmv
- Security When Nanoseconds Count - James Arlen.wmv
- It's Not About the Warm Fuzzy – How to Plan for a Comprehensive Penetration Exercise - Kai Axford.wmv
- The Search for Intelligent Life - Ed Bellis.wmv
- Built What - Why The Bad Guys Do It Better - Sean Bodmer.wmv
- Change Happens - CISO Survival Through Adaptation - Jack Daniel, David Mortman, Gal Shpantzer, Michael Smith and Stacy Thayer.wmv
- Binary Risk Analysis - Ben Sapiro.wmv
- Cubical Warfare - The next Arms Race - Jason Kendall.wmv
- Incident Response Kung fu - Tree Style - Jason Kendall.wmv
- Disc Detainer Locks - Schuyler Towne.wmv
- Best Practices in Network Security Testing - Areg Alimian.wmv
- Walking on the Crocs back – when security measures fail - Travis Barlow.wmv
- Mapping The Penetration Tester's Mind – An introduction to a pentester's approach to security audits - Nicholas Donarski.wmv
- Detecting The Insider Threat – Finding The Needle in Stack of Needles - Omar Garcia.wmv
- Earth vs. The Giant Spider - Amazingly True Stories of Real Penetration Tests - Nick Percoco.wmv
- Be Ready for IPv6 Migration and Beyond - Cricket Liu.wmv
- Evolution of Digital Forensics - Jason Mical.wmv
- Anatomy of a Data Breach - Exploring the Current Threat Landscape - Paul Pinkney.wmv
- Think outside the enterprise security box - John Trollinger.wmv
- Information Security and Risk pertaining to smart phone and mobile devices - Nicholas Wetton.wmv
Macs de alquiler
Si necesitas usar un Mac de forma temporal para algún tipo de proyecto o tarea que de repente te viene a las manos y no tienes uno de estos sistemas y además no te quieres/puedes permitir el comprarte uno o quieres comprarte uno, pero primero quieres familiarizarte con él, o… o… , no te preocupes, ahora puedes alquilar uno… en la NUBE!
Pues eso, MacinCloud es un servicio de alquiler de Macs en la nube que te provee un Mac totalmente funcional. Además puedes acceder a él desde tu iPhone o iPad, aparte de tu ordenador de escritorio.
El catálogo de regalos de Apple en 1983 (retro)
No te pierdas esta selección de regalos de Apple de 1983, verás desde pegatinas hasta broches con la manzanita, tazas, camisetas, etc.
Yo creo que si lo sacan otra vez hoy día tal y como está, se vende todo como rosquillas … rectifico, si Apple SACA CUALQUIER COSA, se vende como rosquillas ;)
Genial vintage.
Visto en TheBlackHarbor.
Diablo III, Black Soulstone
Vídeos de la Defcon 19
Ya están disponibles los vídeos de la Defcon 19:
- Dark Tangent and LosTboY - Welcome and Making of the DEF CON Badge
- Panel - Network Security Podcast
- Panel - Meet The Federal Agent 2.0
- Abstrct - When Space Elephants Attack A DEFCON Challenge for Database Geeks
- Chema Alonso and Juan Garrido - Bosses Love Excel Hackers Too
- Chema Alonso and Juan Garrido - Dust Your Feed RSS Belongs To You! Avoid Censorship!
- Sterling Archer and Freaksworth - IP4 TRUTH The IPocalypse is a LIE
- James Myrcurial Arlen - Security When Nano Seconds Count
- Mike Arpaia and Ted Reed - Beat to 1337 Creating A Successful University Cyber Defense Organization
- Adam Baldwin - Pillaging DVCS Repos For Fun And Profit
- Barisani Laurie Franken and Bianco - Chip and PIN is Definitely Broken
- Bruce Grymoire Barnett - Deceptive Hacking How Misdirection Can Be Used To Steal Information Without Being Detected
- Olivier Bilodeau - Fingerbank Open DHCP Fingerprints Database
- Olivier Bilodeau - PacketFence The Open Source Nac What Weve Done In The Last Two Years
- Emmanuel Bouillon - Federation and Empire
- Sam Bowne - Three Generations of DoS Attacks
- David Bryan and Luiz Eduardo - Building The DEF CON Network Making A Sandbox For 10000 Hackers
- Jeff Bryner - Kinectasploit Metasploit Meets Kinect
- Jamie Butler - Physical Memory Forensics for Cache
- Carey Rude and Vandevanter - Metasploit vSploit Modules
- George Chamales - Lives On The Line Securing Crisis Maps In Libya Sudan And Pakistan
- Ming Chow - Abusing HTML5
- Mouse and Renderman - Familiarity Breeds Contempt
- Christopher Cleary - Operational Use of Offensive Cyber
- Tyler Cohen - Look At What My Car Can Do
- Kees Cook - Kernel Exploitation Via Uninitialized Stack
- Greg Conti - The Art and Science of Security Research
- Paul Craig - Internet Kiosk Terminals The Redux
- Adrian Crenshaw - Cipherspaces Darknets An Overview Of Attack Strategies
- Daniel Crowley - Speaking with Cryptographic Oracles
- Phil Cryer - Taking Your Ball And Going Home Building Your Own Secure Storage Space That Mirrors Dropbox Functionality
- Panel - PCI 2 Still Compromising Controls and Compromising Security
- Panel - Former Keynotes The Future
- datagram - Introduction to Tamper Evident Devices
- Ganesh Devarajan and Don LeBert - VDLDS All Your Voice Are Belong To Us
- Deviant Ollam - Safe to Armed in Seconds A Study of Epic Fails of Popular Gun Safes
- Whitfield Diffie and Moxie Marlinspike
- Artem Dinaburg - Bit-squatting DNS Hijacking Without Exploitation
- Alva Skip Duckwall - A Bridge Too Far Defeating Wired 8021x with a Transparent Bridge Using Linux
- Nelson Elhage - Virtualization Under Attack Breaking out of KVM
- Tim Elrod and Stefan Morris - I Am Not a Doctor but I Play One on Your Network
- Patrick Engebretson and Josh Pauli - Mamma Dont Let Your Babies Grow Up to be Pen Testers
- eskimo - Steganography and Cryptography 101
- Eston Abraham and Johnson - Dont Drop the SOAP Real World Web Service Testing for Web Hackers
- Ben Feinstein and Jeff Jarmoc - Get Off of My Cloud Cloud Credential Compromise and Exposure
- Foofus - Handicapping the US Supreme Court Can We Get Rich by Forceful Browsing
- Gus Fritschie and Mike Wright - Getting F***** On the River
- Eric Fulton - Cellular Privacy A Forensic Analysis of Android Network Traffic
- Daniel Garcia - UPnP Mapping
- Andrew Gavin - Gone in 60 Minutes Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP
- Kenneth Geers - Strategic Cyber Security An Evaluation of Nation-State Cyber Attack Mitigation Strategies
- Ramon Gomez - Bulletproofing The Cloud Are We Any Closer To Security
- Vlad Gostom and Joshua Marpet - Smile for the Grenade Camera Go Bang
- Panel - Represent Defcon Groups Hackerspaces and You
- Panel - Smartfuzzing the Web Carpe Vestra Foramina
- Rob Havelt and Wendel Guglielmetti Henrique - Earth vs The Giant Spider Amazingly True Stories of Real Penetration Tests
- Deral Heiland - From Printer To Pwnd Leveraging Multifunction Printers During Penetration Testing
- Thomas Holt and Max Kilger - Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict
- Rick Howard - An Insiders Look at International Cyber Security Threats and Trends
- Hubris and a5h3r4h - Anonymous Cyber War
- Mikko Hypponen - The History and the Evolution of Computer Viruses
- Hackajar - Economics of Password Cracking in the GPU Era
- Aseem Jakhar - Jugaad Linux Thread Injection Kit
- Matt Joyce - The Art of Trolling
- Dan Kaminsky - Black Ops of TCPIP 2011
- Dave Kennedy - Hacking Your Victims Over Power Lines
- Brian Kennish - Tracking the Trackers How Our Browsing History Is Leaking into the Cloud
- Alexander Kornbrust - Hacking and Securing DB2 LUW Databases
- Itzik Kotler and Iftach Ian Amit - Sounds Like Botnet
- Matt Krick - DCFluX in License to Transmit
- Lai Wu Chiu PK - Balancing The Pwn Trade Deficit APT Secrets in Asia
- Lawson Potter and Deviant Ollam - And Thats How I Lost My Eye Exploring Emergency Data Destruction
- Grayson Lenik - Im Your MACbDaddy
- Katy Levinson - Dont Fix It In Software
- Steven Levy - We Owe it All to the Hackers
- Ryan Linn - PIG Finding Truffles Without Leaving A Trace
- David Litchfield - Hacking and Forensicating an Oracle Database Server
- Johnny Long - Johnny Long and Hackers for Charity
- William Manning - Pervasive Cloaking
- Joey Maresca - Were Here To Help A Look At How FIPS 140 Helps And Hurts Security
- Moxie Marlinspike - SSL And The Future Of Authenticity
- Jon McCoy - Hacking Net Applications The Black Arts
- Wesley McGrew - Covert Post-Exploitation Forensics With Metasploit
- John McNabb - Vulnerabilities of Wireless Water Meter Networks
- Charlie Miller - Battery Firmware Hacking
- Panel - DEF CON Comedy Jam IV A New Hope For The Fail Whale
- Steve Ocepek - Blinkie Lights Network Monitoring with Arduino
- Panel - Ask EFF The Year in Digital Civil Liberties
- Kyle Osborn and Matt Johanson - Hacking Google Chrome OS
- Jason Ostrom - VoIP Hopping the Hotel Attacking the Crown Jewels through VoIP
- Nicole Ozer - Big Brother on the Big Screen
- Nicholas Percoco and Paul Kehrer - Getting SSLizzard
- Nicholas Percoco and Jibran Ilyas - Malware Freak Show 3 Theyre pwning erbody out there
- Nicholas Percoco and Sean Schulte - This is REALLY not the droid youre looking for
- Josh Phillips - Hacking MMORPGs for Fun and Mostly Profit
- Gregory Pickett - Port Scanning Without Sending Packets
- Jason Pittman - My password is FullOfFail The Core Problem with Authentication and How We Can Overcome It
- Mahmud Ab Rahman - Sneaky PDF
- Rezchikov Wang and Engelman - Why Airport Security Cant Be Done FAST
- Panel - Whoever Fights Monsters Aaron Barr Anonymous and Ourselves
- Michael Robinson - What Time Are You Anyway
- The Dark Tangent and Russ Rogers - DEF CON Awards
- Dan Rosenberg - Owned Over Amateur Radio Remote Kernel Exploitation in 2011
- Michael Scarito - Build your own Synthetic Aperture Radar
- Panel - Net Neutrality Panel
- Michael theprez98 Schearer - WTF Happened to the Constitution The Right to Privacy in the Digital Age
- Jason Scott - Archive Team A Distributed Preservation of Service Attack
- Justin Searle - Attacking and Defending the Smart Grid
- Jimmy Shah - Mobile App Moolah Profit taking with Mobile Malware
- Shrdlu - Are You In Yet The CISOs View of Pentesting
- Skunkworks - Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin
- Reeves Smith - How Haunters Void Warranties
- Panel - SCADA and PLCs in Correctional Facilities: The Nightmare Before Christmas
- Jayson E Street - Steal Everything Kill Everyone Cause Total Financial Ruin
- Sumner alien and alison b - Weaponizing Cyberpsychology and Subverting Cybervetting for Fun Profit and Subterfuge
- Bruce Sutherland - How To Get Your Message Out When Your Government Turns Off The Internet
- Martin Holst Swende and Patrik Karlsson - Web Application Analysis With Owasp Hatkit
- Mike Tassey and Rich Perkins - Wireless Aerial Surveillance Platform
- Richard Thieme - Staring into the Abyss The Dark Side of Crime-fighting Security and Professional Intelligence
- Tobias Fiddler and Bluzmanis - Insecurity An Analysis Of Current Commercial And Government Security Lock Designs
- Schuyler Towne - DIY Non-Destructive Entry
- Marketa Trimble - The Future of Cybertravel Legal Implications of the Evasion of Geolocation
- Shawn Webb - Runtime Process Insemination
- Matt scriptjunkie Weeks - Network Nightmare Ruling The Nightlife Between Shutdown And Boot With Pxesploit
- Yekaterina Tsipenyuk ONeil and Erika Chin - Seven Ways to Hang Yourself with Google Android
- Jos Weyers - Key Impressioning
- Thomas Wilhelm - Staying Connected during a Revolution or Disaster
- Andrew Wilson and Michael Brooks - Traps of Gold
- Brad Woodberg - Network Application Firewalls Exploits and Defense
- Joey Zhu - Phishing and Online Scam in China
- Zoz and Andrea Bianchi - Vanquishing Voyeurs Secure Ways To Authenticate Insecurely
- Panel - Is it 0-day or 0-care
Adiós al padre la Inteligencia Artificial moderna, John McCarthy
Este mes de Octubre no será fácil de olvidar para los informáticos y los amantes de la tecnología. Ahora ha fallecido John McCarthy (a los 84 años) , padre del lenguaje LISP (uno de los más antiguos que aún es utilizado) y ganador en 1972 del famoso premio Turing.
La premisa de McCarthy era hacer la IA interactiva y esos algoritmos son lo que ha permitido desarrollar programas como Eliza ó el más reciente Siri. Una de sus premisas fundamentales era que la IA pudiera pasar el Test de Turing (lógico viendo su intención de humanizar a las máquinas).


