Fernandomagro - fernandomagro.com - Fernando Magro Blog

Latest News:

linux execve logging 18 May 2012 | 11:09 am

Linux execve logging is a way to use auditctl to log every command in your system according to your inclusion and exclusion criteria. auditctl is a tool to control the kernel’s audit system and you c...

ubuntu system restore 12 Sep 2011 | 09:56 am

ubuntu system restore means restoring all packages configurations to default as a way to troubleshoot a problem in your system. Recent Linux distributions often support almost any hardware with no nee...

javascript get remote url 16 Jan 2011 | 12:50 am

javascript get remote url is sometimes difficult due to same origin policy restrictions but those can be overcome with JSONP. In other words, say you use JQuery, instead of doing something like $.get(...

Mozilla Drumbeat Barcelona 8 Nov 2010 | 12:33 pm

Mozilla Drumbeat Barcelona was a festival I went to from November 3 to 5, 2010 and here are some thoughts about what I learned and saw. Open education The most interesting thing I’ve done was partic...

facebook block friend 25 Oct 2010 | 06:50 am

facebook block friend consists in creating a list, adding a friend to that list and ignoring the list. Facebook does not provide a direct per-user ignore system on the web platform, but it allows the ...

social engineering and logging 11 Oct 2010 | 10:04 am

Social engineering and logging is a long con (confidence trick) used to claim access to a computer system by logging technical information and showing it back upon a medium/long period of time. This i...

fake social network share count 9 Sep 2010 | 09:07 am

fake social network share count is changing the number that appears as the count of shared links towards a specific page (url), this said, although it would be possible just to design a button that lo...

Browser history disclosure vulnerability 31 Aug 2010 | 02:30 am

Browser history disclosure vulnerability exists in all browsers and allows an attacker to guess websites a victim visited through brute force. The main idea, in a nutshell, is to use the “a:visited” ...

blackhat entrepreneurship 19 Aug 2010 | 04:31 am

blackhat entrepreneurship is a designation created by me to address taking down a competitor/rival in the same IT industry with such a level of finesse that the chance of recovering from the attack is...

/etc/hosts hacking 7 Aug 2010 | 01:04 am

/etc/hosts hacking is a form of social engineering to easily deceit users into thinking you have access to great servers when you don’t. For example, depending on the attackers reputation towards the ...

Recently parsed news:

Recent searches: