🚨 Alerta de Ciberseguridad: Suplantación de Identidad y Phishing en Invitaciones de Teams 🚨He identificado un nuevo incremento de actividad del tipo de ataque cibernético que utiliza técnicas de suplantación de identidad…Nov 14Nov 14
OSI ModelThe OSI model (or Open Systems Interconnection Model) is an absolute fundamental model used in networking. This critical model provides a…Mar 29, 2022Mar 29, 2022
Defensive Cybersecurity (NIST)I’m going to talk about steps that the US government takes to encourage good defensive cybersecutity practices.Jan 24, 2022Jan 24, 2022
What happens when you type holbertonschool.com in your browser.I’m going to show you how the web stack works.Apr 24, 2021Apr 24, 2021
IoT (Internet of Things).The internet of things (IoT) describes the network of physical objects — “things”- or objects — that are embedded with sensors, software…Apr 19, 2021Apr 19, 2021
What, Why and How of the Static Libraries in C.Befor we start to talk about Static Libraries we need to know what is a library on C language.Oct 12, 20201Oct 12, 20201
What happens when you type gcc main.c ?Gcc is the GNU Compiler Collection which is a compiler system. It is used in many different languages including C, C++, Java, Objective C…Sep 17, 2020Sep 17, 2020
What is the difference between a hard link and a symbolic link?There are two types of links in UNIX system, hard link and soft links, also known as symbolic link or symlink.Sep 17, 2020Sep 17, 2020