Presentaciones de Black Hat Europe 2013
- March 15, 2013
- tuxotron
- A Perfect CRIME? Only TIME Will Tell White Paper Presentation
- Advanced Heap Manipulation in Windows 8 Presentation
- Building a Defensive Framework for Medical Device Security
- The Deputies Are Still Confused White Paper Presentation
- DropSmack: How Cloud Synchronization Services Render Your Corporate Firewall Worthless White Paper Presentation File File
- Floating Car Data from Smartphones: What Google and Waze Know About You and How Hackers Can Control Traffic White Paper Presentation
- Hacking Appliances: Ironic exploitation of security products White Paper Presentation
- Hacking Video Conferencing Systems White Paper Presentation
- Hardening Windows 8 apps for the Windows Store White Paper
- Harnessing GP²Us - Building Better Browser Based Botnets Presentation
- Honeypot That Can Bite: Reverse Penetration White Paper Presentation
- Hybrid Defense: How to Protect Yourself From Polymorphic 0-days White Paper Presentation File
- Invisibility Purge – Unmasking the Dormant Events of Invisible Web Controls – Advanced Hacking Methods for Asp.Net, Mono and RIA Presentation File File File File
- Let's Play - Applanting White Paper Presentation
- Mesh Stalkings-Penetration Testing with Small Networked Devices White Paper Presentation
- Multiplayer Online Games Insecurity White Paper Presentation
- Off Grid communications with Android - Meshing the mobile world White Paper Presentation
- Practical Attacks Against MDM Solutions White Paper Presentation
- Power Analysis Attacks for Cheapskates White Paper Presentation File
- Practical Exploitation Using A Malicious Service Set Identifier (SSID) White Paper Presentation
- The Sandbox Roulette - Are You Ready For The Gamble? Presentation
- XML Out-of-Band Data Retrieval White Paper Presentation
- Who's Really Attacking Your ICS Devices? White Paper Presentation
- Advanced iOS Application Pentesting Presentation
- Application Development Secure Coding Workshop Presentation
- Assessing BYOD with the Smartphone Pentest Framework White Paper Presentation
- PowerShell for Penetration Testers Presentation
- Vehicle Networks Workshop Presentation
Ya tenemos disponible para descarga las presentaciones de la Black Hat 2013 Europe:
Tutorial de UNIX para principiantes
- March 15, 2013
- tuxotron
- Listing files and directories
- Making Directories
- Changing to a different Directory
- The directories . and ..
- Pathnames
- More about home directories and pathnames
- Copying Files
- Moving Files
- Removing Files and directories
- Displaying the contents of a file on the screen
- Searching the contents of a file
- Redirection
- Redirecting the Output
- Redirecting the Input
- Pipes
- Wildcards
- Filename Conventions
- Getting Help
- File system security (access rights)
- Changing access rights
- Processes and Jobs
- Listing suspended and background processes
- Killing a process
- Other Useful UNIX commands
- Compiling UNIX software packages
- Download source code
- Extracting source code
- Configuring and creating the Makefile
- Building the package
- Running the software
- Stripping unnecessary code
- UNIX variables
- Environment variables
- Shell variables
- Using and setting variables
La importancia que tuvo y tiene UNIX en el lado del servidor es indudable, pero a menos que trabajes como administrador de sistemas en alguna empresa, posiblemente no tendrás la oportunidad de tocar uno de estos sistemas. Por suerte y gracias a sistemas como BSD y GNU/Linux podemos tener una versión para PCs de este gigante.
De cualquier manera, para el que tenga que lidiar con UNIX o el curioso, aquí os dejo un buen tutorial de iniciación a éste.
Typographical Conventions
Introduction to The UNIX operating system
Tutorial One
Tutorial Two
Tutorial Three
Tutorial Four
Tutorial Five
Tutorial Six
Tutorial Seven
Tutorial Eight
PD: si eres de los curiosos y quieres saber sobre ciertos detalles del nacimiento de UNIX no te puedes perder el libro de Microhistorias!!
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec



