The shield of the world

Security, games and music

10 be or not 10 be

¿Quién soy?

Mi nombre es David, soy de una ciudad costera y estoy apunto de terminar mi carrera en Ingeniería en Tecnologías Electrónicas. Esta es una de mis clases finales y optativas.

This blog was idea of my profesor for this class, TC2027 I know, not everybody knows what this mean, this class name is Computer and Information Security so this will be the main topic, but I probably will share something else with you guys.

Continue reading “10 be or not 10 be”

Featured post

Is not my fault!

So we all know that friend who have been so closed to kill his PC, without even knowing. And this is the topic for today, unintentional security issues. This is so common that you probably have already thought about some examples of yourself.

Continue reading “Is not my fault!”

User is no joke! User is important!

So imagine your connection to your bank is not assured… I will be pretty mad and you? Hope you too, but there are some things web pages could do to help us trust in their web site. You may hear the phrase “Is like taking a candy from a baby” or something like that… I know the phrase in Spanish. But we are the baby in this big world called Internet. And we need some protection dude!

Continue reading “User is no joke! User is important!”

Let me in! I´m nice dressed

So in one of the first post we talked about WiFi and the magic sensation when the WiFi is open! And I hope you remember we said that was one of the more easiest way to lose your information. Well, technically you exchange your data for free WiFi.

Continue reading “Let me in! I´m nice dressed”

¡Gracias por ser cómo eres!

Este es el post acerca de mi opinión sobre la clase. La verdad, el buscar que los alumnos aprendan investigando es algo que aprecio mucho a causa de que en el ámbito laboral si no sabes algo, posiblemente acabes preguntando inicialmente al internet.

Continue reading “¡Gracias por ser cómo eres!”

Papelito habla!

So there are a lot of options to actually certificate yourself as an computer security. Why is important to have a certificate? To actually prove that you have a good amount of knowledge and that you are worth to be hired. Is like the certificates in the web pages. A prove that you can actually trust in something.

Continue reading “Papelito habla!”

Is not about you…is about me

So when we talk about Computer Security there is a topic that some of us really think about. How to ensure the ethical and legal responsibilities, why this? Because when someone has the knowledge about this topic is easy to go from white to black hat in a matter of seconds.

Continue reading “Is not about you…is about me”

C C C Combo breaker!

As you can imagine we are talking something related to computer security. This time is countermeasures, which is an action, device, procedure, technique or anything that can reduce a thread, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting so a corrective action can be taken.

Continue reading “C C C Combo breaker!”

Working after dark!

So…I have a business but, how do I protect it? This is where the Security policy play its game. A security policy is a document that states in writing how a company plans to protect the company’s physical and information technology assets. It defines the goals and elements of an organization’s computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical implementation defines whether a computer system is secure or insecure. The policies can be categorized into the 3 security principles.

Continue reading “Working after dark!”

We don’t need no network control!

So, today we are going to talk about Network Security. Network security is the process of taking the physical and software preventive measures to protect the networking infrastructure from unauthorized access, malfunction, modification, destruction or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions in a safe environment.

Continue reading “We don’t need no network control!”

Blog at

Up ↑