Referencias a bibliotecas de Software Libre
y Seguridad Informática
Noticias de TI
Diseñando y creando alternativas
En este sitio encontrarás
Referencias a herramientas alternativas, la utilización de Software Libre, así como sus implicaciones en la seguridad de TI.
Gran cantidad de información, documentos técnicos y ebooks de Seguridad Informática.
Este sitio esta en constante desarrollo.
Software Libre / Seguridad TI
Una alternativa para el futuro inmediato
Misión
Dar a conocer las herramientas y ligas de software libre, de código abierto en el mercado internacional, tomando en cuenta siempre las estrategias de seguridad informática
Visión
Crear una biblioteca de ligas de referencias, y aplicativos de software libre para el back-end y front-end. Tendencia y criterios para la aplicación de la seguridad en TI
Proyectos
- Software Libre
- Seguridad informatica
- Prospectiva Tecnològica
Los proyectos que seguimos son relacionados con la utilización del software libre y de código abierto en el ambiente de los servidores y escritorio de los usuarios.
Proyectos que tiene por objetivo estudiar la seguridad informática en todo su amplia espectro
Espacio designado a los eventos de investigación y desarrollo de la nuevas tecnologías de la informática
¿ Qué hacemos ?
Blogs, notas y ligas sobre SL y Seguridad en Sistemas de TI

01 Seguridad en TI
Criterios y normas para la seguridad de TI

02 Herramientas de Desarrollo y Diseño
EL mundo del SL enfocado al desarrollo de sistemas y el uso del día a día en escritorio

03 Prospectiva tecnológica
Tendencias de la industria de TI
Este sitio no es de fines de lucro y solo persigue ser útil para ti

Ligas a Tecnologías de información y a la Seguridad Informática
(ligas dinámicas)
OpenSource
- New developments at Opensource.com junio 6, 2023
- Tips for running virtual, in-person, and hybrid events mayo 3, 2023
- Generate web pages from Markdown with Docsify-This mayo 2, 2023
- 3 reasons to host a docathon for your open source project abril 28, 2023
- How I used guilt as a motivator for good abril 28, 2023
- 3 key open source challenges in developing countries abril 27, 2023
- Run a virtual conference using only open source tools abril 27, 2023
- 5 open ways to help UX designers and developers collaborate better abril 26, 2023
- Test your Drupal website with Cypress abril 26, 2023
- What's new in GNOME 44? abril 25, 2023
CIO readers
- SAP: Latest news and insights abril 25, 2025
- SAP NetWeaver customers urged to deploy patch for critical zero-day vulnerability abril 25, 2025
- Invest in AI search as an enterprise business asset abril 25, 2025
- Bank of America’s big bet on AI started small abril 25, 2025
- 9 IT skills where expertise pays the most abril 25, 2025
- El 89% de los directivos españoles se rinde ante el potencial de los agentes de IA abril 25, 2025
- Cinco consejos para transformar los datos de la empresa en nuevas fuentes de ingresos abril 25, 2025
- 쌓인 데이터를 수익화할 때 필요한 조언 5가지 abril 25, 2025
- 데이터브릭스, 올해 인도 R&D 인력 2배 확충··· “2억 5,000만 달러 투자” abril 25, 2025
- “아시아태평양 지역서 IPv6 도입률 50% 달성” APNIC 조사 abril 25, 2025
Center for Strategic and International Studies (CSIS)
- Positioning the Navy for Cyber Warfare abril 5, 2010
- ICANN and the Internet Ecosystem enero 27, 2010
- Security, Cloud Computing and the Coming Mobile Environment diciembre 3, 2009
- Information Dominance: The Navy's Initiative to Maintain the Competitive Advantage in the Information Age octubre 1, 2009
- Statesmen's Forum: Deputy Secretary of Defense William J. Lynn III junio 15, 2009
- Cybersecurity Policy Review with Melissa Hathaway, Cybersecurity Chief at the National Security Council junio 12, 2009
networkcomputing
- Veeam Report Finds Ransomware Is Still Thriving abril 25, 2025
- Do You Want to be a Network Manager? abril 24, 2025
- Avoid Challenges when Planning for Wi-Fi 7 abril 17, 2025
- DeepSeek Shifts Network Operators' View of AI abril 14, 2025
- 9 Courses for Network Professionals in 2025 abril 9, 2025
- Direct-to-Cell Service Emerges into Focus abril 7, 2025
- Customers Frustrated with VMware after Broadcom Acquisition abril 2, 2025
- Williams-Sonoma's Network Transformation: SD-WAN and SASE for Modern Retail marzo 31, 2025
- The Status of Optical Transport Equipment marzo 27, 2025
- [Virtual Event] Network Resiliency from an IT Manager's Perspective marzo 26, 2025
The Hacker News
- ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion abril 26, 2025
- North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures abril 25, 2025
- New Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Framework abril 25, 2025
- Why NHIs Are Security's Most Dangerous Blind Spot abril 25, 2025
- Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers abril 25, 2025
- DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks abril 25, 2025
- Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware abril 24, 2025
- Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools abril 24, 2025
- Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign abril 24, 2025
- 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure abril 24, 2025
darkreading
- Mobile Applications: A Cesspool of Security Issues abril 25, 2025
- How Organizations Can Leverage Cyber Insurance Effectively abril 25, 2025
- Vehicles Face 45% More Attacks, 4 Times More Hackers abril 25, 2025
- Phishing Kit Darcula Gets Lethal AI Upgrade abril 25, 2025
- [Virtual Event] Anatomy of a Data Breach: And what to do if it happens to you abril 24, 2025
- 'SessionShark' ToolKit Evades Microsoft Office 365 MFA abril 24, 2025
- Digital Twins Bring Simulated Security to the Real World abril 24, 2025
- Max-Severity Commvault Bug Alarms Researchers abril 24, 2025
- NFC-Powered Android Malware Enables Instant Cash-Outs abril 24, 2025
- Gig-Work Platforms at Risk for Data Breaches, Fraud, Account Takeovers abril 24, 2025
IT Bookstore
- [Free eBook] Azure Bot Service Succinctly junio 6, 2023
- [Free eBook] The Official Raspberry Pi Handbook 2023 junio 6, 2023
- [Free eBook] Contemporary Mathematics junio 6, 2023
- [Free eBook] Learning Bosun junio 6, 2023
- Spring 6 Recipes, 5th Edition junio 6, 2023
- [Free eBook] Ernst Denert Award for Software Engineering 2019 junio 6, 2023
- Quantitative User Experience Research junio 6, 2023
- Introduction to Software Testing junio 6, 2023
- Programming for Absolute Beginners junio 6, 2023
- Firewalls Don't Stop Dragons, 5th Edition junio 6, 2023
Cybersecurity Insights
- Celebrating 1 Year of CSF 2.0 febrero 26, 2025
- Privacy-Preserving Federated Learning – Future Collaboration and Continued Research enero 27, 2025
- NIST’s International Cybersecurity and Privacy Engagement Update – New Translations diciembre 19, 2024
- Data Pipeline Challenges of Privacy-Preserving Federated Learning diciembre 5, 2024
- Kicking-Off with a December 4th Workshop, NIST is Revisiting and Revising Foundational Cybersecurity Activities for IoT Device Manufacturers, NIST IR 8259! noviembre 21, 2024
- Unlocking Cybersecurity Talent: The Power of Apprenticeships noviembre 18, 2024
- Digital Identities: Getting to Know the Verifiable Digital Credential Ecosystem noviembre 13, 2024
- Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 octubre 28, 2024
- Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 octubre 23, 2024
- IoT Assignment Completed! Report on Barriers to U.S. IoT Adoption octubre 22, 2024
INCYBER NEWS
- United Kingdom: Digital Identity sector criticizes government wallet abril 24, 2025
- United States: Amounts Stolen by Cybercriminals Up 33% abril 24, 2025
- Europe delivers its first warning shot to tech giants: Apple and Meta hit with major fines. abril 23, 2025
- United States: The DOGE exfiltrated sensitive data from the agency in charge of labor law abril 23, 2025
- NewsGuard details a Russian disinformation campaign by Storm-1516 targeting France abril 23, 2025
- Japan denounces fraudulent stock transactions carried out by Chinese actors abril 23, 2025
- Canada: Authorities Arrest 87 Cyber Fraudsters Using LabHost abril 17, 2025
- Canada: Free cybersecurity tools for small water, electricity, and gas providers abril 16, 2025
- Taiwan accuses Chinese ship captain of cutting undersea cable abril 16, 2025
- Security requirements for connected products: the disruption brought by the Cyber Resilience Act abril 14, 2025
SANS Internet Storm Center, InfoCON: green
- Steganography Analysis With pngdump.py, (Sat, Apr 26th) abril 26, 2025
- Example of a Payload Delivered Through Steganography, (Fri, Apr 25th) abril 25, 2025
- ISC Stormcast For Friday, April 25th, 2025 https://isc.sans.edu/podcastdetail/9424, (Fri, Apr 25th) abril 25, 2025
- Attacks against Teltonika Networks SMS Gateways, (Thu, Apr 24th) abril 24, 2025
- ISC Stormcast For Thursday, April 24th, 2025 https://isc.sans.edu/podcastdetail/9422, (Thu, Apr 24th) abril 24, 2025
- ISC Stormcast For Wednesday, April 23rd, 2025 https://isc.sans.edu/podcastdetail/9420, (Wed, Apr 23rd) abril 23, 2025
- Honeypot Iptables Maintenance and DShield-SIEM Logging, (Wed, Apr 23rd) abril 23, 2025
- xorsearch.py: "Ad Hoc YARA Rules", (Tue, Apr 22nd) abril 22, 2025
- ISC Stormcast For Tuesday, April 22nd, 2025 https://isc.sans.edu/podcastdetail/9418, (Tue, Apr 22nd) abril 22, 2025
- It's 2025... so why are obviously malicious advertising URLs still going strong?, (Mon, Apr 21st) abril 21, 2025
CIOs Archives – The National CIO Review
- Five Tips for CIOs Leading Remote Workforces febrero 17, 2022
- Engage With the Special Olympics in a Whole New Way octubre 18, 2021
- How to Find, Develop, and Keep the Best IT Talent, According to CIOs julio 29, 2021
- The Goals and Challenges of the CIO Role Over the Last Decade noviembre 25, 2018
Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor | Network World
- Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor abril 25, 2025
- Lenovo targets AI workloads with massive storage update abril 25, 2025
- AI plus digital twins could be the pairing enterprises need abril 25, 2025
- TCS launches SovereignSecure Cloud aligned with India’s data localization needs abril 25, 2025
- As clock ticks, vendors slowly patch critical flaw in AMI MegaRAC BMC firmware abril 24, 2025
- Asia-Pacific hits 50% IPv6 capability abril 24, 2025
- Slowdown in AWS data center leasing plans poses little threat to CIOs abril 24, 2025
- TSMC targets AI acceleration with A14 process and ‘System on Wafer-X’ abril 24, 2025
- Your old servers may now be worth mining for rare earth elements abril 24, 2025
- Cloudbrink pushes SASE boundaries with 300 Gbps data center throughput abril 23, 2025
SAP NetWeaver customers urged to deploy patch for critical zero-day vulnerability | CSO Online
- SAP NetWeaver customers urged to deploy patch for critical zero-day vulnerability abril 25, 2025
- Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor abril 25, 2025
- Die Bösen kooperieren, die Guten streiten sich abril 25, 2025
- Commvault warns of critical Command Center flaw abril 25, 2025
- Darcula phishing toolkit gets AI boost, democratizing cybercrime abril 25, 2025
- Vor diesen Ransomware-Banden sollten Sie sich hüten abril 25, 2025
- Cybercriminals switch up their top initial access vectors of choice abril 25, 2025
- 6 types of risk every organization must manage — and 4 strategies for doing it abril 25, 2025
- Ransomware-Angriff auf guenstiger.de abril 25, 2025
- Cyber Risk Assessments: Risikobewertung hilft CISOs abril 25, 2025
Presencia del SL
Odin Mojica Ramírez y Jorge Díaz Lara dicen:
“…Es importante destacar que el software sólo es un medio que nos ayuda a cumplir un fin, sea cual sea, y para ello se usan ciertas herramientas que ya han sido diseñadas y que permiten satisfacer esa necesidad en específico. Al tener acceso al código, entramos a un mundo de conocimiento compartido, donde el acto de colaborar y compartir es la base de los aportes…”

El camino asi es
