Blog

Racoon

Quick Response

Quick Response

Ivonne Zambrano

2025. The world isn’t spinning any faster, but we live as if it were. Everything is fleeting, fast, instantly. We’ve grown used to life happening in real time, without pause. We no longer perceive the feel of paper money or hear the clinking of coins when paying for a coffee. Today, a single scan is enough to access almost anything....

Read more
What is Ransomware?

What is Ransomware?

  • July 21, 2021
  • Ola Bini
  • Over the last few years we have seen more and more attacks of ransomware, in the beginning against private individuals and smaller companies. However, the last 6 months have seen...
Read more about: What is Ransomware?
Icono
How to avoid censorship in times of social conmotion?

How to avoid censorship in times of social conmotion?

  • May 13, 2021
  • Sara Zambrano , Ola Bini
Read more about: How to avoid censorship in times of social conmotion?
Icono
CAD, present at FLISOL 2021!

CAD, present at FLISOL 2021!

  • April 15, 2021
  • Rafael Bonifaz
  • Since 2005, the Latin American Festival of Free Software Installation - FLISOL has been held in different cities of the continent in order to spread the word about Free Software...
Read more about: CAD, present at FLISOL 2021!
Icono
Introduction to Data Structures

Introduction to Data Structures

  • June 01, 2020
  • Mauro Velasco
  • The use of data structures allows the applications store and process information efficiently, for this reason it is necessary to review their main characteristics.
Read more about: Introduction to Data Structures
Icono
Nextcloud through Tor

Nextcloud through Tor

  • December 05, 2019
  • Sandy Acurio
  • This article will address the problem of data privacy in the use of file sharing services in the cloud. With free software, safe and autonomous alternatives with similar functionalities can...
Read more about: Nextcloud through Tor
Icono
Two-Factor Authentication

Two-Factor Authentication

  • November 29, 2019
  • Pedro Palau , Rafael Bonifaz
  • In the previous article we reviewed some important concepts around password handling and how to generate them in a more secure way.
Read more about: Two-Factor Authentication
Icono