sábado, 3 de noviembre de 2007

Everyone


We were walking, round the station
All the beatiful lights, beatiful lights,beatiful lights
We were dancing, and romancing
What a beatiful sight, beatiful sight, beatiful sight

So tell me why
How we are running around
People always say the same things, the same things
That we just let on by
So I take it down
and now yah and tell me
That it's all for everyone, everyone, everyone


We were talking about the future
I wonder how it could be, how it could be, how it could be
And we were singing woo ooh ooh!
Round the corner
What a wonderful sight, wonderful sight, wonderful sight

So tell me why
how we are running around
Everybody knows that
this is the place is
Where we're both belong
So it bring it all
for now yah and tell me
and that is all for everyone, everyone

Because All the things you say to me
They mean some much to you and me
with everyone, everyone

Because All the things you say to me
And All the things you say to me

And how long is it gonna take before
we celebrate our lives
And how long is it gonna take before
we make it all worthwhile
And what can we do, what can we do
let's take our time
write it all down
until we figure it out the tune
for everyone, everyone

Because All the things you say to me
They mean some much to you and me
with everyone, everyone
Because All the things you say to me
They mean some much to you and me
with everyone, everyone

Get this widget | Track details | eSnips Social DNA

jueves, 11 de octubre de 2007

Using my creativity, that's the result :P. Enjoy it.

Your Smile

I can only imagine
your pretty smile
in front of me
I would like to know
The reason it makes me happier
And by trying and trying
I just realize
that this reason
Is the friendship we have.


P.D: Dedicated to my friend Ninaski

domingo, 30 de septiembre de 2007

Ethical Hacking: A study case (Introduction)

Well... i dunno how to start, may be describing me. I'm a systems engineering student, so consider me a geek8-). I like all IT stuff, technology topics, etc...
I'll explain more about me next posts.

Finishing the introduction lets begin with the main topic.
During next posts i'll try to explain the application of the concepts i got at my Ethical Hacking class.
Recently my faculty Web server suffered an atack from a iranian hacker. I guess my proffesor got angry about it, so he let us the work to reply the atack. o.o!!

So here we go..
Let's start showing the phases i follow to reproduce the atack:
1. Reconnaissance
2. Scanning
3. Gaining access
4. Maintaining access
5. Covering tracks

Each phase is important before to continue next one.
I'll describing specifically them later.




P.D. I was stimulated to write, thanks to my friend Nina. n_n Terima kasih!