Open in app

Sign In

Write

Sign In

David E Lares S
David E Lares S

63 Followers

Home

About

Published in Nerd For Tech

·Mar 26, 2022

Kernels and Logging in Linux

The booting process in a Linux system is quite a complete journey, it has a bunch of stages that accomplish certain tasks just to tune up your workstation or server in an efficient way. The whole idea is to write a very compact overview on how kernels are triggered and…

Linux

7 min read

Linux

7 min read


Published in Nerd For Tech

·Jan 21, 2022

Malware Sandboxing and Reverse engineering overview

Sandboxing is a technique used to allow malware to execute in a contained and controlled environment. …

Malware

3 min read

Malware

3 min read


Published in Nerd For Tech

·Jan 11, 2022

IoC and IoA overview

IoC or Indicator of compromise is a mechanism for detecting signature-based malware. This indicator is used for known malware and for investigating intrusions in a system. You can see this as a knowledge base for investigators. The IoC allows a particular threat to be documented in a consistent fashion and…

Infosec

2 min read

Infosec

2 min read


Published in System Weakness

·Jan 3, 2022

Malware fundamentals overview

Malware is a type of software that is designed to perform unwanted functionality, and you may be contradicting me here, but the fact is that it’s 50/50 because is unintended to the eyes of who’s perceiving the consequences. One of the most common malware found on the Internet is the…

Security

9 min read

Security

9 min read


Published in Level Up Coding

·Dec 22, 2021

The IPSec Framework overview

The Internet Protocol is used to address and route datagrams sent between connected machines to a network. This protocol has no guarantees at all and is extremely used in modern computing, specifically in the network spectrum. Since there are no guarantees, a “new” approach came up to fix that, and…

Networking

3 min read

The IPSec Framework overview
The IPSec Framework overview
Networking

3 min read


Published in System Weakness

·Dec 15, 2021

Data-link layer attacks

The following is intended to be a simple overview of the most common data link layer attacks based on the OSI model. I’ll not cover most of the fundamental concepts because there are a lot of resources for that, but the necessary ones for a smooth understanding. The data link…

Data Link Layer

7 min read

Data Link Layer

7 min read


Published in Nerd For Tech

·Dec 15, 2021

Physical layer attacks

In the OSI model, the physical layer is the most elemental one, is responsible for relating software logic with physical devices or mediums that can transmit signals in any form. This is the lowest component of the model, and for that, attacking actions requires physical access in a certain way…

Osi Model

3 min read

Osi Model

3 min read


Published in System Weakness

·Dec 9, 2021

Common TCP/IP OSI layer attacks

The OSI model is the foundation for all the communications in telematic networks. In a non-techie POV, this establishes and enables the information-sharing capability between devices. When you click a link on a website or doing something inside a Desktop-based program, an event is triggered, many times and depending on…

Network

7 min read

Network

7 min read


Published in Nerd For Tech

·Dec 2, 2021

DNS analysis in a nutshell

The DNS or the Domain Name System is considered the Internet’s phonebook, it’s a place that stores the domain settings in terms of records, here you can manage how a domain will behave in terms of IP resolution, aliases, email servers, and more advanced features. If you are not familiar…

Network

3 min read

DNS analysis in a nutshell
DNS analysis in a nutshell
Network

3 min read


Published in FAUN Publication

·Nov 25, 2021

General planning concerns about servers (3/3)

This is critical for evaluating when something wrong happens. We can plan and control many things, even disasters. For software, we have different approaches. Let’s split this into the site types, how replication is done and how to work on the continuity of operations. For the site types of disaster…

Servers

3 min read

Servers

3 min read

David E Lares S

David E Lares S

63 Followers

Backend Developer, Pentesting and InfoSec Student

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech