<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: José Manuel Ortega</title>
    <description>The latest articles on Forem by José Manuel Ortega (@jmortega).</description>
    <link>https://forem.com/jmortega</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F150993%2F0617822d-f073-4c31-9ef6-b95cdfbbefb8.png</url>
      <title>Forem: José Manuel Ortega</title>
      <link>https://forem.com/jmortega</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/jmortega"/>
    <language>en</language>
    <item>
      <title>Tecnologías para arquitecturas basadas en microservicios: Patrones y soluciones para aplicaciones desplegadas en contenedores</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Sun, 05 Jul 2020 19:58:59 +0000</pubDate>
      <link>https://forem.com/jmortega/tecnologias-para-arquitecturas-basadas-en-microservicios-patrones-y-soluciones-para-aplicaciones-desplegadas-en-contenedores-b11</link>
      <guid>https://forem.com/jmortega/tecnologias-para-arquitecturas-basadas-en-microservicios-patrones-y-soluciones-para-aplicaciones-desplegadas-en-contenedores-b11</guid>
      <description>&lt;p&gt;&lt;a href="https://www.amazon.es/Tecnolog%C3%ADas-para-arquitecturas-basadas-microservicios-ebook/dp/B08CBDSCHV"&gt;https://www.amazon.es/Tecnolog%C3%ADas-para-arquitecturas-basadas-microservicios-ebook/dp/B08CBDSCHV&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--y9iaji5E--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/m1setpvod1aqiw87bf53.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--y9iaji5E--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/m1setpvod1aqiw87bf53.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;El objetivo de este libro es presentar cómo desarrollar arquitecturas basadas en microservicios, conociendo los principales frameworks de desarrollo y herramientas orientadas al despliegue de las aplicaciones mediante el uso de contenedores y orquestadores. Gracias al uso de plataformas basadas en contenedores y orquestadores conseguimos alta disponibilidad, al tener varias instancias disponibles en distintas máquinas al mismo tiempo, escalabilidad, donde cada microservicio es capaz de escalar individualmente y despliegue de nuevas versiones en un tiempo mínimo.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--WhgwowBW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/oh3v4htw3dnmx80wmtfx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--WhgwowBW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/oh3v4htw3dnmx80wmtfx.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;El lector aprenderá los diferentes patrones que podemos utilizar cuando tenemos en mente el desarrollo de una aplicación basada en microservicios. El conocimiento de las buenas prácticas y patrones de desarrollo de software hace que los aplicaciones cumplan con todas las métricas de calidad de desarrollo como robustez, mantenibilidad, desacoplamiento y escalabilidad.&lt;br&gt;
Introducción a las arquitecturas basadas en microservicios&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Generadores de microservicios&lt;/li&gt;
&lt;li&gt;Patrones de diseño&lt;/li&gt;
&lt;li&gt;Microservicios en Java&lt;/li&gt;
&lt;li&gt;Programación reactiva&lt;/li&gt;
&lt;li&gt;Tecnologías basadas en contenedores&lt;/li&gt;
&lt;li&gt;Introducción a Service mesh&lt;/li&gt;
&lt;li&gt;Plataformas serverless&lt;/li&gt;
&lt;li&gt;Arquitecturas basadas en eventos&lt;/li&gt;
&lt;li&gt;Arquitecturas big data&lt;/li&gt;
&lt;li&gt;Glosario de términos&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>SecDevOps containers</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Sun, 05 Jul 2020 19:50:48 +0000</pubDate>
      <link>https://forem.com/jmortega/secdevops-containers-4del</link>
      <guid>https://forem.com/jmortega/secdevops-containers-4del</guid>
      <description>&lt;p&gt;&lt;a href="https://speakerdeck.com/jmortega/secdevops-containers"&gt;https://speakerdeck.com/jmortega/secdevops-containers&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In this talk I will speak about main tips for integrating Security into DevOps. I will share my knowledge and experience and help people learn to focus more on DevOps Security. In addition to the so-called best practices, the development of efficient, readable, scalable and secure code, requires the right tools for security development.&lt;br&gt;
These could be the main talking points:&lt;br&gt;
-How to integrate security into iteration and pipeline application development with containers.&lt;br&gt;
-How to secure development environments.&lt;br&gt;
-DevOps security best practices&lt;/p&gt;

</description>
      <category>security</category>
      <category>containers</category>
      <category>docker</category>
      <category>kubernetes</category>
    </item>
    <item>
      <title>Python Memory Management 101.Deeping in Garbage collector</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Sun, 05 Jul 2020 19:47:38 +0000</pubDate>
      <link>https://forem.com/jmortega/python-memory-management-101-deeping-in-garbage-collector-1i5o</link>
      <guid>https://forem.com/jmortega/python-memory-management-101-deeping-in-garbage-collector-1i5o</guid>
      <description>&lt;p&gt;&lt;a href="https://speakerdeck.com/jmortega/python-memory-management-101-dot-deeping-in-garbage-collector"&gt;https://speakerdeck.com/jmortega/python-memory-management-101-dot-deeping-in-garbage-collector&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In this talk I will try explain the memory internals of Python and discover how it handles memory management and object creation.&lt;br&gt;
The idea is explain how objects are created and deleted in Python and how garbage collector(gc) functions to automatically release memory when the object taking the space is no longer in use.&lt;br&gt;
I will review the main mechanisms for memory allocation and how the garbage collector works in conjunction with the memory manager for reference counting of the python objects.&lt;br&gt;
Finally, I will comment the best practices for memory management such as writing efficient code in python scripts.&lt;br&gt;
These could be the main talking points:&lt;br&gt;
-Introduccition to memory management&lt;br&gt;
-Garbage collector and reference counting with python&lt;br&gt;
-Review the gc module for configuring the python garbage collector&lt;br&gt;
-Best practices for memory managment&lt;/p&gt;

</description>
      <category>python</category>
      <category>memory</category>
      <category>managment</category>
    </item>
    <item>
      <title>DevOps and Containers Security: Security and Monitoring in Docker Containers</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Tue, 10 Mar 2020 23:09:46 +0000</pubDate>
      <link>https://forem.com/jmortega/devops-and-containers-security-security-and-monitoring-in-docker-containers-1dd0</link>
      <guid>https://forem.com/jmortega/devops-and-containers-security-security-and-monitoring-in-docker-containers-1dd0</guid>
      <description>&lt;p&gt;&lt;a href="https://www.amazon.es/dp/B085NMP3CV/"&gt;https://www.amazon.es/dp/B085NMP3CV/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--5RUCDqRz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://miro.medium.com/max/357/1%2AMJdLbxivHn_VwMWWrN1Ehw.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--5RUCDqRz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://miro.medium.com/max/357/1%2AMJdLbxivHn_VwMWWrN1Ehw.jpeg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Through this book, we will introduce the DevOps tools ecosystem and the main containers orchestration tools through an introduction to some platforms such as Kubernetes, Docker Swarm, and OpenShift.&lt;br&gt;
Among other topics, both good practices will be addressed when constructing the Docker images as well as best security practices to be applied at the level of the host in which those containers are executed, from Docker’s own daemon to the rest of the components that make up its technological stack.&lt;br&gt;
We will review the topics such as static analysis of vulnerabilities on Docker images, the signing of images with Docker Content Trust and their subsequent publication in a Docker Registry will be addressed. Also, we will review the security state in Kubernetes.&lt;br&gt;
In the last section, we will review container management and administration open source tools for IT organizations that need to manage and monitor container-based applications, reviewing topics such as monitoring, administration, and networking in Docker.&lt;br&gt;
What will you learn&lt;br&gt;
● Learn fundamental DevOps skills and tools, starting with the basic components and concepts of Docker.&lt;br&gt;
● Learn about Docker as a platform for the deployment of containers and Docker images taking into account the security of applications.&lt;br&gt;
● Learn about tools that allow us to audit the security of the machine where we execute Docker images, finding out how to secure your Docker host.&lt;br&gt;
● Learn how to secure your Docker environment and discover vulnerabilities and threats in Docker images.&lt;br&gt;
● Learn about creating and deploying containers in a security way with Docker and Kubernetes.&lt;br&gt;
● Learn about monitoring and administration in Docker with tools such as cadvisor, sysdig, portainer, and Rancher.&lt;br&gt;
Table of Contents&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Getting started with DevOps&lt;/li&gt;
&lt;li&gt;Container platforms&lt;/li&gt;
&lt;li&gt;Managing Containers and Docker images&lt;/li&gt;
&lt;li&gt;Getting started with Docker security&lt;/li&gt;
&lt;li&gt;Docker host security&lt;/li&gt;
&lt;li&gt;Docker images security&lt;/li&gt;
&lt;li&gt;Auditing and analyzing vulnerabilities in Docker containers&lt;/li&gt;
&lt;li&gt;Kubernetes security&lt;/li&gt;
&lt;li&gt;Docker container networking&lt;/li&gt;
&lt;li&gt;Docker container monitoring&lt;/li&gt;
&lt;li&gt;Docker container administration&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>Desarrollo seguro en ingeniería del software. Aplicaciones seguras con Android, NodeJS, Python y C++</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Tue, 10 Mar 2020 22:43:32 +0000</pubDate>
      <link>https://forem.com/jmortega/desarrollo-seguro-en-ingenieria-del-software-aplicaciones-seguras-con-android-nodejs-python-y-c-51h8</link>
      <guid>https://forem.com/jmortega/desarrollo-seguro-en-ingenieria-del-software-aplicaciones-seguras-con-android-nodejs-python-y-c-51h8</guid>
      <description>&lt;p&gt;&lt;a href="https://www.marcombo.com/desarrollo-seguro-en-ingenieria-del-software-aplicaciones-seguras-con-android-nodejs-python-y-c-9788426728005/"&gt;https://www.marcombo.com/desarrollo-seguro-en-ingenieria-del-software-aplicaciones-seguras-con-android-nodejs-python-y-c-9788426728005/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--YOVgJ9p5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/u32dygpn1yv27arxisf6.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YOVgJ9p5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/u32dygpn1yv27arxisf6.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;El desarrollo seguro de aplicaciones implica un cambio hacia un nuevo modelo de trabajo. Si quiere estar a la última sobre cómo mitigar errores comunes de programación y evitar posibles atacantes en sus aplicaciones, este es su libro.&lt;br&gt;
El manual expone los procesos necesarios a seguir por todo desarrollador e ingeniero de software para disponer de buenas prácticas de seguridad desde las primeras fases del desarrollo. Gracias a los contenidos del libro:&lt;br&gt;
o Conocerá el conjunto de tareas que minimizan, en la medida de lo posible, la exposición de la aplicación ante posibles ataques.&lt;br&gt;
o Sabrá cómo mantener de manera eficiente los paquetes que se incorporan en las aplicaciones.&lt;br&gt;
o Dominará las diferentes herramientas para analizar el código fuente desde un punto de vista estático y dinámico en aplicaciones basadas en Android, NodeJS, Python y C++, desde un enfoque teórico-práctico.&lt;br&gt;
Además, a partir de los ejemplos prácticos que respaldan el libro, sacará el máximo provecho a las herramientas para analizar el código fuente de las aplicaciones.&lt;br&gt;
Estar al día, está a su alcance. Consiga este libro, elija las herramientas y las metodologías adecuadas, y desarrolle aplicaciones de forma segura.&lt;/p&gt;

</description>
      <category>desarrolloseguro</category>
      <category>node</category>
      <category>python</category>
      <category>c</category>
    </item>
    <item>
      <title>Machine learning para proyectos de seguridad(pycon)</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Sun, 13 Oct 2019 16:49:16 +0000</pubDate>
      <link>https://forem.com/jmortega/machine-learning-para-proyectos-de-seguridad-l3f</link>
      <guid>https://forem.com/jmortega/machine-learning-para-proyectos-de-seguridad-l3f</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CyQgdYXs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/ryezlift2em15m68mkxm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CyQgdYXs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/ryezlift2em15m68mkxm.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://speakerdeck.com/jmortega/machine-learning-para-proyectos-de-seguridad-pycon"&gt;https://speakerdeck.com/jmortega/machine-learning-para-proyectos-de-seguridad-pycon&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;En esta charla se explicarán los conceptos sobre el machine learning aplicados a la ciberseguridad a través de diferentes casos de uso y ejemplos. Además, se explicarán los principales algoritmos que podemos utilizar para comenzar a desarrollar sistemas de seguridad utilizando distintas técnicas como regresión, árboles de decisión y clustering. Finalmente se mostrará un caso de estudio aplicado a la detección de malware.&lt;/p&gt;

</description>
      <category>machinelearning</category>
      <category>cybersecurity</category>
      <category>python</category>
      <category>sklearn</category>
    </item>
    <item>
      <title>Machine learning para proyectos de seguridad</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Sun, 29 Sep 2019 09:35:07 +0000</pubDate>
      <link>https://forem.com/jmortega/machine-learning-para-proyectos-de-seguridad-2h5b</link>
      <guid>https://forem.com/jmortega/machine-learning-para-proyectos-de-seguridad-2h5b</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--VpSN_BAK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/9gwfsftv727f3zm4xjua.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--VpSN_BAK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/9gwfsftv727f3zm4xjua.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://speakerdeck.com/jmortega/machine-learning-para-proyectos-de-seguridad"&gt;https://speakerdeck.com/jmortega/machine-learning-para-proyectos-de-seguridad&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;En esta charla se explicarán los conceptos sobre el machine learning aplicados a la ciberseguridad a través de diferentes casos de uso y ejemplos. Además, se explicarán los principales algoritmos que podemos utilizar para comenzar a desarrollar sistemas de seguridad utilizando distintas técnicas como regresión, árboles de decisión y clustering. Finalmente se mostrará un caso de estudio aplicado a la detección de malware.&lt;/p&gt;

</description>
      <category>machinelearning</category>
      <category>cybersecurity</category>
      <category>python</category>
      <category>sklearn</category>
    </item>
    <item>
      <title>osint + python: extracting information from tor network and darkweb</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Sat, 31 Aug 2019 23:48:24 +0000</pubDate>
      <link>https://forem.com/jmortega/osint-python-extracting-information-from-tor-network-and-darkweb-140f</link>
      <guid>https://forem.com/jmortega/osint-python-extracting-information-from-tor-network-and-darkweb-140f</guid>
      <description>&lt;p&gt;&lt;a href="https://speakerdeck.com/jmortega/osint-plus-python-extracting-information-from-tor-network-and-darkweb"&gt;https://speakerdeck.com/jmortega/osint-plus-python-extracting-information-from-tor-network-and-darkweb&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The talk will start explaining how Tor project can help us to the research and development of tools for online anonymity and privacy of its users while surfing the Internet, by establishing virtual circuits between the different nodes that make up the Tor network. Later, we will review main tools for discover hidden services in tor network with osint tools. Finally we will use python for extracting information from tor network with specific modules like stem &lt;a href="https://stem.torproject.org/"&gt;https://stem.torproject.org/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These could be the main points of the talk:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Introduction to Tor project and hidden services &lt;/li&gt;
&lt;li&gt;Discovering hidden services with osint tools &lt;/li&gt;
&lt;li&gt;Extracting information from tor network with python&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--DkRxlwyk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/0qeblhs8owxatkorfliw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--DkRxlwyk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/0qeblhs8owxatkorfliw.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>python</category>
      <category>osint</category>
      <category>tornetwork</category>
      <category>stem</category>
    </item>
    <item>
      <title>Security in open source projects</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Wed, 14 Aug 2019 02:23:38 +0000</pubDate>
      <link>https://forem.com/jmortega/security-in-open-source-projects-5c50</link>
      <guid>https://forem.com/jmortega/security-in-open-source-projects-5c50</guid>
      <description>&lt;p&gt;In recent years, the amount of open source components used by developers has experienced significant growth. Millions of open source libraries are distributed through centralized systems such as Maven Central (Java), NPM (JavaScript) and GitHub (Go).&lt;br&gt;
tags: security,open source&lt;/p&gt;

&lt;p&gt;In this talk, I will present the common security problems faced by companies that use open source. We will also talk about how to manage the risks of open source software using people, processes and tools&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--U0y_P5R6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/ezzcepawluacalkmxj6g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--U0y_P5R6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/ezzcepawluacalkmxj6g.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;[Slides]&lt;br&gt;
&lt;a href="https://www.slideshare.net/jmoc25/security-in-open-source-projects"&gt;https://www.slideshare.net/jmoc25/security-in-open-source-projects&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;[Video]&lt;br&gt;
&lt;a href="https://media.ccc.de/v/froscon2019-2361-security_in_open_source_projects"&gt;https://media.ccc.de/v/froscon2019-2361-security_in_open_source_projects&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Testing python security</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Mon, 27 May 2019 15:14:18 +0000</pubDate>
      <link>https://forem.com/jmortega/testing-python-security-1873</link>
      <guid>https://forem.com/jmortega/testing-python-security-1873</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--tV9uA7ka--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/jt91kw3wrhwmst6ywtrf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--tV9uA7ka--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/jt91kw3wrhwmst6ywtrf.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://speakerdeck.com/jmortega/testing-python-security-pyconweb"&gt;https://speakerdeck.com/jmortega/testing-python-security-pyconweb&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Python is a language that in a easy way allows to scale up from starter projects to complex applications for data processing and serving dynamic web pages. But as you increase complexity in your applications, it can be easy to introduce potential problems and vulnerabilities.In this talk José Manuel Ortega will talk about the common security problems in Python code, like remote command execution and SQL injections. Of course he'll show to to prevent against these and other types of vulnerabilities.&lt;/p&gt;

</description>
      <category>testing</category>
      <category>python</category>
      <category>security</category>
      <category>pyconweb</category>
    </item>
    <item>
      <title>Darkweb + Python: discover, analyze and extract information from hidden services</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Sun, 05 May 2019 08:48:05 +0000</pubDate>
      <link>https://forem.com/jmortega/darkweb-python-discover-analyze-and-extract-information-from-hidden-services-55p9</link>
      <guid>https://forem.com/jmortega/darkweb-python-discover-analyze-and-extract-information-from-hidden-services-55p9</guid>
      <description>&lt;p&gt;&lt;a href="https://es.slideshare.net/jmoc25/darkweb-python-discover-analyze-and-extract-information-from-hidden-services"&gt;https://es.slideshare.net/jmoc25/darkweb-python-discover-analyze-and-extract-information-from-hidden-services&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--3A9v63nV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/kgpv4e98svmyr6hzh3v7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--3A9v63nV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/kgpv4e98svmyr6hzh3v7.png" alt="python"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In addition, we will review how Tor works from anonymity point of view, preventing websites from tracking you. Python help us to automate the process to search an discover hidden services thanks to packages like requests,requesocks and sockspy,At this point we will review the crawling process and show tools in python ecosystem available for this task(&lt;a href="https://github.com/jmortega/python_dark_web"&gt;https://github.com/jmortega/python_dark_web&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;These could be the talking points:&lt;/p&gt;

&lt;p&gt;-Introduction to Tor project and hidden services&lt;br&gt;
-Discovering hidden services.&lt;br&gt;
-Modules and packages we can use in python for connecting with Tor network&lt;br&gt;
-Tools that allow search hidden services and atomate the crawling process in Tor network&lt;/p&gt;

</description>
      <category>python</category>
      <category>darkweb</category>
      <category>tornetwork</category>
      <category>hiddenservices</category>
    </item>
    <item>
      <title>Machine learning y data science con scikit-learn y pyspark</title>
      <dc:creator>José Manuel Ortega</dc:creator>
      <pubDate>Sat, 30 Mar 2019 20:29:26 +0000</pubDate>
      <link>https://forem.com/jmortega/machine-learning-y-data-science-con-scikit-learn-y-pyspark-203l</link>
      <guid>https://forem.com/jmortega/machine-learning-y-data-science-con-scikit-learn-y-pyspark-203l</guid>
      <description>

&lt;p&gt;&lt;a href="https://udemy.com/machine-learning-y-data-science-con-scikit-learn-y-pyspark/"&gt;https://udemy.com/machine-learning-y-data-science-con-scikit-learn-y-pyspark/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--BFIVPfVw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/LznlysR.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--BFIVPfVw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/LznlysR.png" alt="python"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CQAeuB3V--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/UnGhgfC.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CQAeuB3V--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/UnGhgfC.png" alt="python"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6Rm1D7Uj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/vStIiNy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6Rm1D7Uj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/vStIiNy.png" alt="python"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--oI57WeGK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/wKEjgop.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--oI57WeGK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/wKEjgop.png" alt="python"&gt;&lt;/a&gt;&lt;/p&gt;


</description>
      <category>python</category>
      <category>datascience</category>
      <category>sklearn</category>
      <category>pyspark</category>
    </item>
  </channel>
</rss>
