Apr 28
Latex is a language for high quality editing documents, especially oriented to book composition, scientific and technical documents, that include formulas and high quality images. It consists on a set of Tex macros (one low-level language) and has become almost a standard for scientific publications in areas such as mathematics, physics and engineering, since we can have finer control over any typographical appearance of the document.
Apr 07
Security Protocol Animator (SPAN) is a free tool to check cryptographic protocols that helps in searching and characterization of attacks. The main advantage of this application is that allows different verification techniques using a same protocol. We can say, it is a graphical interface for managing HLPSL (High-Level Protocol Specification Language) and CAS + (an implementation of the Protocol Central Authentication), which allows the translation between these languages ​​and also provides a friendly graphical user interface. SPAN helps to produce interactively sequences messages or MSC (Message Sequence Charts). This tool is used for simulating cryptographic protocol, allows active or passive…
Dec 02
I present you my favorite applications to capture packets on the network, although they are well known for their features, I decided to give a little space to discuss some of their features. In addition to data capture, these applications are useful for certain packets analysis with the obtained data, on the other hand, when the analysis that we need to do is a bit complex or very specific, it is always advisable to build our own scripts, but there is no doubt that no matter for what we use them, this applications will help us to obtain useful network…
Nov 11
For some time I have been using various traffic generators, and today I want to share 3 of the that I most use for their interesting features. The traffic generators are useful for injecting traffic of certain applications or network services and not have the need to run such applications, in my case I used to generate the traffic of VoIP, video streaming, video surveillance, and even to make some reverse engineering on certain commercial devices. Then I leave a short review of each of them: