English Peke Press
Cryptography, technology and computer science


The maps are a structure of pairs of key-value, are very useful for the use of structured information, and we will see a couple of simple examples, and one a little more ocmplejo where we can see its functionality and its great advantages .

The first thing to understand how they work, ie as retrieving data from a map and store data as ne a map.


Map<String, Objeto> mapa;

map = new TreeMap<String, Objeto>();
enter data:

get data:


After seeing how can be useful as a cache memory detos base, which could be use of maps.

Here, it is as simple as stockyards all data from a SQL query, running through the ResultSet, something like this:


Objeto x = new Objeto(rs.getString(1), rs.getInt(2), rs.getString(3));

mapa.put(x.id, x);}

So with this we would have all data stored in the table that has consulted on the map, and to give to a client or interface, we could use the map, instead of consultation with the database, which is faster than the base enter of data for everything you need.


Diskgetor: Diskgetor Application to recover deleted data on your hard disk, eye, does not recover data from broken or corrupt disks, only erased, ie, the application reads the data “unsubscribe” by the indices of the hard drives, so that the files got deleted, can still be readable on the hard disk.

data recovery tools: Perhaps data recovery tools is an old application, but can they pursue files in different formats into the hard drive, again only recovers deleted data from hard disk.
hdrecover: hdrecover this if it is a damaged hard drive recovery, it is an application that can touch the bad sectors of a hard disk, the results, which are available are not always perfect and depending on the damage that may have the hard drive can recover data from hard drives that were broken before you start


An entry with a picture, to get depressed a little, at least,for those who someday want a decent job:

Estado del desempleo joven
Youth unemployment

And laugh a little, at least for those who know some C++.

free the malloc()s

A geek joke, in my size.


Dropbox: This is my choice, which I use, I Accerder from phone, and is very comfortable, the desktop application is simple and useful and can be accessed from the Web to your files, password through, makes it both practical and accessible . The free option gives

  • 2 GB of storage
  • Update the changes in “real time”

Zyncro: This is more a collaboration than a storage, but in the end you can use it with the power you need.

  • 2 GB of storage
  • Colaboration tools

googleDocs: Well known for its integration in Gmail, plus documents emails can be taken directly to the platform and GoogleDocs also can manage users that want to see some documents.

  • All features are accessible with no cost
  • Colaboration via Gmail
  • Integrated with Google
  • The storage depends on Gmail account, variation during time.

Zoho Docs: A very complete application, collaboration, advanced search agency documents and workspace management, document editor himself, very comprehensive user management.

  • 1GB free storage
  • Highlight the login via Gmail, Yahoo or Facebook, it is practical to do no more bills.

Ubuntu One: Perhaps the most “free” (use free for Open) of all the options, explain why you a little more pitch, perhaps limited in its functions, but very powerful, most accessible by Linux and especially Ubuntu, the first invitation was needed, but and you can register without restriction, and use.

  • 2GB free Storage
  • Synchronization in “real time”
  • Notes and contacts on the fly
  • Very nice Web interface
  • Primary instalation must be done in a Ubuntu running computer.
Ubuntu One

ADrive:Just give a trial and is perhaps the most commercial of all options. It is fairly complete, but I have not used, because it bothers me 14 days to install and delete things

  • 50GB of Storage
  • Very complete and usefull destok aplicaction.

FileBox: Technically it’s not like the previous ones, as it is to upload files to share more in the style community and not as a work environment, but departs from the standards of other cases, I found remarkable a feature.

  • ilimitate storage
  • Registered users can be pais for uploaded files to the comunity
  • A very interesting aplication to see what happens with it.

Prism is a tool to have on the desktop, Web pages and applications that have direct access, so as to be accessible from the desktop, with a Simple click. I find it quite handy and I wonder what that is parked in Internet environment, at least from my point of view.

The program is a series of shortcuts Leveled down websites that utilize, tl so that we can have access to more quickly and directly. The access can be done to get to the desktop or the Start bar or the Quick Start (the one next to the menu), which is the option I took myself.

When I got out of the mozilla Prism web.

The result of the download is a zip file, unpack it wherever we want and run through the file, prism.exe, asks us to execute a URL and name for the enlce, automatically, we can see how it incorporates the icon of the page itself we want access to.

Here is an example of how looks a kickstart.


Well I think with this, until you can get here, a brief explanation as simple as useful tool.


Article by INTECO (National Institute of Communication Technologies) on bank fraud and stealing passwords of electronic bank accounts and interesting, updated and good to be informed of the topic. Explained in simple language and accessible without technical understand, everything that is hidden behind.

In PDF format, and in spanish.

troyanos bancarios


Mariposa botnet, is the largest network of zombie computers (computers controlled remotely) that has fallen into the history of computer security, for the uninitiated, explain what that is, a lot of computers, in this case 13 million, not I was wrong, they are about 13 million computers have been infected in some way (usually Trojans), a network of data theft, which are controlled remotely, this gave them access to information he had in They also used the network to launder money through betting and gaming.

His goal was to get money, but for the curious comment, it appears that controlling the network, not computer experts were even less, but that it had bought the network to others and what he did was exploit the resources that gave network and to sell those options to others. The less strange pyramid.

Panda Security is highly involved in solving this problem, and Luis Corrons (Technical Director of Panda Security, if I am correctly informed), is now in Madrid to discuss the issue, along with the Civil Guard and the FBI.

The case has been a global impact in that it speaks of data, which have affected users from 190 countries and it is information of some 800,000 users, their success against the security company has been in the speed that have changed the code of malware applications, as sometimes in 48 hours had modified the code and therefore could no longer be detected by the updates that did business.


aMSN: Real time communication with hotmail accounts, yahoo, gmail … An instant messaging program.

Thunderbird: The best way of not using Outlook, neck more, if you try, you may stay forever.

ClamWin: Antivirus, may not be the best int market but it is open, and that gives a bonus.

BitTorrent: With the craze that is talking about P2P, with a little luck decouple the mule, as the only global program of P2P. 😉

TrueCrypt: Really no one could expect that one of cryptography is not going to fall in this list, figure pendrive, hard disks, folders, whatever you want. It is a great tool for the security we enjoy.

PDFCreator: it serves to create a virtual printer, which prints, which is in PDF format, very useful, I say realemnte useful addition to Chinese it sounds, is easy to use.

musikCube: Music Player and iTunes control type library.


Mozilla Firefox: Mozilla Firefox: Web Browser with all you can expect an immense amount of extensions, which can help you need, it’s fast and reliable, regular updates.

GIMP: Graphics Editor, very powerful, and with many capabilities, you can get great results with a little effort.

Notepad++: I am, an essential tool, if I install it on all computers that use because it reads text in virtually any format, and detects keywords multiple programming languages, and labels.

Open Office: A replacement of the office suite from Microsoft, the truth is that is very complete, and also fully compatible with the version of the Redmond company.

Eclipse: it is,  my favorite tool for Java programs, very useful, perhaps consumes many resources, but the results and additions make it very useful for developing applications of all kinds.

Videloan VLC mediaplayer: The player par excellence, powerful, fast and low consmo also full of surprises, every day you can descubirr new functionality.

Ubuntu Linux: The Linux operating system more usable and closer to the user use to Windows, is very complete, with few indications you can replace all the Windows XP functionallity appreciated by all (I say appreciated, because let’s be realistic, the many of us use it).


Overtaken explanations of cryptographic systems, modular arithmetic and finite symmetric systems (private key) and asymmetric (public key), I’ll throw to explain the types of attacks that can be made to security system.

With types of attack, I mean ways to attack a key, or get a key, I will not guide the methodology, but I’m going to what is the theory of the attacks, that is, as they are earned but not I instantiate an attack, not because I look ugly or illegal or wrong, but because I leave that to other post where you delve into a particular type of attack.

Here are some types of attacks:

  • Brute force: This is the most basic attack that can be done on a key addition in slower and possibly fruitless, can be improved with certain techniques, but basically, is to go Porbén until successes, this is done by proposing an alphabet (a series of letters, numbers and symbols) that a program, anger ordeanda ranging from a form, not skipping any, and trying to pass and see if they match, by any chance with the key. To follow some improvements:
  • A possible improvement to these systems, such as using limited alphabets, knowing the culture of the target, ie if you are attacking an Englishman, do not use the N in the alphabet, so it may seem silly can drastically reduce A number of checks.
  • Or Another theory is assumed, which is a word that makes sense, thereby testing the limits refer to the dictionary of a language, there are many fewer options to mix all the letters of an alphabet.
  • Or you can combine the latter with a replacement system of letters and numbers, such as vowels, changing A-4 E-3 I-1 O-0 U-7, for example, so that these vowels are removed and is sustituyn by those numbers.
  • In addition there are a number of common keys that can be tested, since we are at bottom little original key setting, but for this type of attack, you know the person, and it is used, dates and names, which are very common in passwords of people, if not believe me, think of your own.
  • A second type of attack is that of MIM (Man in the Middle) or known as getting in the way, now, a translation would be, man in the middle, in this case is to analyze what is transmitted between sender and receiver to guess the key, ie capture the communication and cryptograms, remove the key, est system requires that before you strain into medium to capture the frames, if desired peuden testing at home, with the WiFI at home, browsing to a computer with WiFi and capture troo, what they are doing. This requires some expertise, but sooner or Tempra colgare hare a test and a post, I did it once, and it was fun to rob me, if at the same time quite stupid.
  • Another common attack is the Denial of service (DoS Dennial of service), these attacks do not want to get the key to a system, but collapsed in the U.S. recently, users of Iphone were angered by the network service AT & T’s network and wanted to collapse, one arrancadno implementing them, which activated and generated muhas via 3G network connections so that saturate the networks tried this, but it seems a nonsense if you do one, you can saturate a data network because the collisions between each other terminals, causing a failure in the network chain. (This topic deserves a separate post, network collisions, broadcast and multicast, and broadcast areas collision networks, I will).
  • Leakage, this type of attack, is when good, do not have to be a type in itself, but when a fact is that it should go to a site, go to another where it should not, ie if my communication with a Web site should go alone to that page and it also goes to another place where it should not, may overlap with the case of Man In the Middle.
  • At last case to comment, I will talk about social engineering, although it seems that the name of a self-help book is an attack users, direct and ruthless, is when someone by fraud, leads us to provide private information, making us believe it is a Autoride entity to which we deliver these data, the typical case of the bank that sends an email to send him your information, but can be complicated further, leading to cases where a phone call from someone that poses as an employee of a company asking to open a port for working from home.