Dashboard » Cristian Jose Acuña Ramirez » Mis artículos
Cristian Jose Acuña Ramirez
@user-1543237612
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T061346Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=be94eb7bbe78666564db5440d3af994ecb861f372fbcbd6217a6bbc4b1c651ab)
Cristian Jose Acuña Ramirez
@user-1543237612
Cybersecurity Specialyst Teacher
Escribe artículos para la comunidad
¿Una nueva amenaza latente en Internet? Xwo
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T061346Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b38754ca4a7afad3ce4a36cc1156828ed96bb5cc9cdf6caa66899e7f2a394113)
Hoy en la era digital todos los negocios quieren tener presencia ..
Auditoría de infrastructura de red con Flightsim
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T061346Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b38754ca4a7afad3ce4a36cc1156828ed96bb5cc9cdf6caa66899e7f2a394113)
Es importante para un especialista de seguridad TI, auditar const..
¿Qué es el Cryptojacking?
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T061346Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b38754ca4a7afad3ce4a36cc1156828ed96bb5cc9cdf6caa66899e7f2a394113)
Pretendemos con este artículo dar a conocer una forma de malware ..
Consejos para evitar amenazas y explotación de vulnerabilidades
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T061346Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b38754ca4a7afad3ce4a36cc1156828ed96bb5cc9cdf6caa66899e7f2a394113)
Esta vez pretendemos hablar en Backtrack Academy de los pasos a s..
Las 5 herramientas mas utilizadas de código abierto para Pentesting
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T061347Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=2ada5a67605e313305dc70c7dca3d301bfa62a979c3d5f990ee883c0f14b92b7)
Te has preguntado porque usamos un sistema operativo de codigo ab..