Blog técnico Entelgy Innotec Security
images/banners/security-garage-banner-04_300.png

Investigaciones

Hello, readers!

Today we offer you a post that we are sure you will find very interesting and useful.

In this article, we are going to review the different structures that exist in a PE file. Specifically, those that are in charge of specifying which functions are to be imported once this file is executed. imported once this file is executed, and also those that are in charge of specifying which functions a DLL exports. to specify which functions a DLL exports.

Dear readers, on the occasion of the anniversary of its launch, today we are going to make reference in this new blog entry to a very special initiative, a commitment to establish, through different gamification techniques, a culture of cybersecurity that allows all types of users to navigate cyberspace safely. In this way, the aim is to advocate the use of good practices in the use of all the resources offered by this dimension, defending the incorporation of attractive and innovative learning tools, while at the same time reviewing the different historical milestones in the field. This is, no more and no less, the role-playing game Karma.

S5 Box