Prueba técnica orientada al rol de Analista de Datos. A través del uso teórico de PostgreSQL y conocimientos de negocio, se abordan cuatro retos clave del negocio.
Análisis del Apagón Eléctrico en España: 28–29 de Abril de 2025 (Spanish version)
Exploiting vulnerabilities on web services
Design of a 4-bit adder. Input two 4-bit numbers A &B, output is the 4-bit sum and a carry
Exploits and mitigations for stack, heap, and side-channel vulnerabilities in C programs using ROP, unlink attacks, and timing/fault-based analysis.
Process of designing an 8-bit shift register using CMOS 45nm technology, optimized for minimum complexity and high-speed.
This post analyzes multiple security vulnerabilities in C programs, focusing on buffer overflows and memory corruption exploits.
Should social media platforms have the power to influence the world trough political advertising?
Presentation of a project
This is the report of the Lab 3 of ECE 440 at Purdue University. In this case we are trying to hear airport tower AM signals.