#1: IP The IP is basically the unique and unrepeatable address or number that identifies a computer. We have 2 types of IPs: public and private. Public IPs are provided by your internet provider. Private IPs are networks within your public IP. They are generally used for local networks such as your home or office […]
Category Archives: Cybersecurity
When a device positions itself in the middle of a connection and acts as a mediator. It is a proxy if the device in the middle can inspect the traffic packets. Without the ability to inspect, it would not be a proxy but a gateway. Proxies almost always operate at layer 7 of the OSI […]
Virtual Private Network. Its purpose is to make the user feel as if they are connected to a different network. There are 3 types of VPNs Site-To-Site VPN Both the client and the server are network devices Commonly these are network devices like routers or firewalls Its common use is to connect company networks over […]
The way connections and nodes in a network are organized and connected to each other. The network configuration or topology is crucial to determine its performance. They are characterized as physical or logical topologies. Logical Topology refers to understanding how and why a network is organized the way it is and how data moves across […]
Summary: git init git status git add . git status git commit -m “version 1.0” git status git log *If you delete some files and need to go back in time, just type git checkout Detailed Explanation: Git is version control software. Mainly, as a programmer, it gives you two big benefits which allow you […]
Previously, access to office information did not leave the company where the services were active. Nowadays, with so many cell phones or devices with internet access, security focused on the back end of the perimeter is necessary, that is, on any device. In a post-perimeter world, organizations must focus on and trust endpoint detection and […]
Did you know that Mexico, behind Brazil, is the 2nd country with the most cyberattacks on companies in Latin America? If you think your free or pirated antivirus will save you from WannaCry or Ransomware, you are more mistaken than those who think the Earth is flat… There is no antivirus provider or cybersecurity team […]
Use of Video Surveillance: Retail Business Intelligence Points of Sale (POS) Traffic and Vehicle Control System: For example, if someone in a shopping mall wants to show their customers the number of people entering through a certain entrance of the mall. This is possible with thermal cameras. Also, supermarkets can use thermal cameras to see […]
The first thing we have to do is change the router password. Important: set a SECURE password, as I explain in this other blog: LINK RECOMMENDED PASSWORDS The second thing we have to do is replace our encryption with WPA2/PSK After changing the NETWORK key, we must change the name to something like ” ” […]
In this tutorial, I will teach you how to install and use SSH on Linux, we will: Configure your local computer with SSH Configure the remote computer with SSH Check if the SSH port is open Transfer files between computers with SSH To create SSH connections you have to run the following command in the […]