Categories
Security

Reasons why your email address is blocked

Sometimes it may have happened to you that you send an email to a person and that email doesn’t reach the destination mailbox. The message is blocked. This article explains some of the reasons that may occur so that a sent email is not received in the recipient’s email address. Browsing the Internet you immerse […]

Categories
Seguridad

Qué son las funciones hash y su uso en contraseñas

Quizás no lo sepas pero si estás en internet hay muchos servicios que utilizas a diario que emplean funciones hash. Una función criptográfica hash es un algoritmo matemático que transforma cualquier bloque arbitrario de datos en una nueva serie de caracteres con una longitud fija. Es la forma de obtener una huella digital de cualquier […]

Categories
Security

Internet security breaches that expose your data

One of the biggest security issues we encounter while browsing the Internet is that our data is expose by a website. These are security breaches that can become serious because your data is shared. The way, as long as no other way is discovered, to en altae on a site is by using our email […]

Categories
Security

Working with temporary emails, practical example

This article is to explain how to work with pages that provide timeable mail to avoid subsequently receiving SPAM in your personal mail. Using pages that allow you to create disposable temporary accounts is a good way to combat SPAM. I’ll consider a class job, an exercise in working with temporary email. For them we […]

Categories
Seguridad

Trabajar con correos temporales – ejemplo práctico

Este artículo es para explicar como trabajar con páginas que proporcionan correos temporables de correo para evitar recibir posteriormente SPAM en tu correo personal. El empleo de páginas que permiten crear cuentas temporales desechables es una buena manera de combatir contra el SPAM. Plantearé un trabajo en clase, un ejercicio sobre trabajo con correo electrónico […]