avatar  

I’m not very comfortable speaking about politics, And I won’t, as this is not the place to write about it. But I got very interested in the digital role of yesterday. Please! I completely discourage political comments, I’m just trying to create a technical analysis, and this is a technology blog!

For the ones who are lost in the context, I will shortly explain before starting the digital analysis:

Catalunya is legally part of Spain, but some of the inhabitants have expressed their desire of being independent. Our constitution states that such an act is not possible,...
  

avatar  

Security in computer science is a huge point every individual and company. Communications (either between humans or human-network or whichever online communication) are susceptible to be sniffed or manipulated.

For example, using http instead of https is insecure (sometimes even tagged by your browser as untrustful) as information that goes through it is not encrypted and someone is able to impersonate your accounts with the collected data. This is why https everywhere and privacy badger are recommended for secure browsing.

But when we say “encrypt”, what are we referring to?

Back in the days when computers weren’t a...

avatar  

This Saturday (September 16th) is Software Freedom Day, and for this special day I created a repo with a surprise, a printable pdf party hat. This is the image of the party hat:

The repo also includes in Spanish a very brief introduction to what is Software Freedom Day, what is GNU and what is GNU/Linux. Enjoy yourselves!

Originally written in: https://dev.to/terceranexus6/software-freedom-day-party-hat

avatar  

Last night I wrote a manifesto trying to sum up all my thoughts in my internet censorship investigation. As I made it completely out of the blue as a sketch it was in my mother tongue (spanish) but today I decided to translate it, just in case anyone who don’t speak spanish wanted to read it. The original is in this link. Please feel free to share your thoughts on this! I’d love to read them.


I’m only twenty-one, but still, since I can remember, Our routine has changed considerably. When I was a toddler, internet was...

avatar  

Recently I’ve been studying about Network Security. For a year, I’ve been using ettercap for pentesting and investigation, I even wrote a Lex app for it, but recently I’ve found a tool which is pretty similar but way better, logs are pretty organized and have better commands. I must say I will be using linux, there are options for network monitoring in Windows, but I’m not going to talk about them in this article.

First of all, network security monitoring allow us to detect and respond to intrusions. The range of the NSM data is:

  • Full content: all...