--Originally published at Blog | Cesar Arturo Gonzalez
Tag: Technology
Elections Analyzer 2018 – Week 3 Postmortem
--Originally published at Blog | Cesar Arturo Gonzalez
Continue reading "Elections Analyzer 2018 – Week 3 Postmortem"
Elections Analyzer 2018 – Week 3 Premortem
--Originally published at Blog | Cesar Arturo Gonzalez
Continue reading "Elections Analyzer 2018 – Week 3 Premortem"
Hacking adventures (Story 2)
--Originally published at Computer and Information Security
Yo, reader! I’m glad you keep an eye in my blog. Today’s story, is about the new GeForce Now service from Nvidia, which is only available currently for mac users since it is in beta. In this service you can log in to one of their virtual computers on the cloud, to be able to play video games through your steam account.
I tested this new gaming service and I can say that this is a pretty good way to play. Before Nvidia launched this, there was another one called OnLive, the Netflix for gaming, you were able to rent a game for a certain amount of time or even buy it, but it was a copy of the game and it was never yours. It used their self-made interface, it means that I couldn’t see anything but just what they allowed me to see with their own design. Which was identical to the windows tablet or phone theme, like squares or windows. A long time ago I tested this service, I was most of the time logged in and playing games since I couldn’t afford a gaming PC and when they closed it, like around 3 years ago, I got really sad. Anyways, when I heard about Geforce Now I remembered the old times in OnLive, but this time it was different, the gaming process was through your steam account and not by renting or buying the game through a custom menu, it was actually a windows 10 virtual machine. As you know, I’m a pretty curious person, therefore I decided to click anywhere to check if I could get into the desktop menu, but as you already know, everything was locked up. But I never gave up, actually I managed to install chrome, through the internet explorer
Continue reading "Hacking adventures (Story 2)"Risk Management Framework
--Originally published at Blog | Cesar Arturo Gonzalez
Security Architecture and Policies
--Originally published at Blog | Cesar Arturo Gonzalez
Cryptography and Network Security
--Originally published at Blog | Cesar Arturo Gonzalez
Web Security
--Originally published at Blog | Cesar Arturo Gonzalez
Security for Operating Systems
--Originally published at Blog | Cesar Arturo Gonzalez
WT… is Denial of Service?
--Originally published at Computer and Information Security
Hi reader! I hope you are enjoying my posts, this time I am going to talk about DoS (Denial of Service). So, in simple words, this is a common and most used technique by hackers and people that want to see the world burn, it occurs when an attacker takes action that prevents legitimate users from accessing targeted computer systems, devices or other network resources.
This type of attacks usually send a lot of information, data or traffic to a server, through a bunch of other helpers called zombies, in order to staturate the network in that server or victim resources and make it impossible for the victim to use the service properly.
Some characteriztics of this attack are:
- Degradation in network performance, especially when attempting to open files stored on the network or accessing websites.
- Inability to reach a particular website.
- Difficulty in accessing any website.
- A higher than usual volume of spam e-mail.
- Hard to play a videogame since there is a lot of lag or traffic from the nework.
To restore the normal use of the service in those cases, a reboot of the system fixes the DoS attack, but there are a lot of different types of this attack that can more difficult to recover from:
- Buffer overflow attack: Is a catchall description most commonly applied to DoS attacks that send more traffic to a network resource than was ever anticipated by the developers who designed the resource. One example of such an attack sent, as email attachments, files that have 256-character file names to recipients using Netscape or Microsoft email clients; the longer-than-anticipated file names were sufficient to crash those applications.
- DDoS attack: The attacker may use computers or other network-connected devices that have been infected by malware and made part of a botnet. Distributed denial-of-service attacks, especially those using botnets, use command-and-control (C&C) Continue reading "WT… is Denial of Service?"