Servidores VPS rápidos, escalables y muy económicos:

Servidor VPS SSD Optimizados

Este post con identificación 1863, con la dirección web https://www.exabyteinformatica.com/tienda/foro/the-cybersecurity-of-persona-5-t1863.html y con una longitud de 88 caracteres, se ha verificado completamente. dentro de cada sección del foro, encontrarás mushrooms rojos y verdes. ¿Has jugado a Mario World? Si es que no sigue leyendo: cada seta roja te hace crecer intelectualmente (los temas o posts) y cada seta verde (foros y subforos) te descubre una nueva aptitud.Para poder comentar en este foro o en el resto de exaforo, el paso previo para poder comentar es registrarte,no te preocupes es y ha sido GRATIS desde el inicio.

Deberás haber leído y aceptado eso sí, las Normas generales del foro. Sólo te pedimos un valor: el respeto por los demás miembros de la comunidad. Si detectamos una actividad ilícita en tu cuenta o haces abuso de spam, podemos cancelar tu cuenta permanente o temporalmente.

En exaforo valoramos por encima de todo las opiniones personales de las personas que lo forman, es por esto que te pediremos que por favor, lo que nos escribas no sea un plagio de otra web o de otro miembro; si nuestro sistema anti-spam detecta que tu contenido no és único, el sistema puede borrarlo automáticamente sin avisar.

A modo de conclusión, el equipo humano de Exaforo te desea una provechosa estancia con nosotros y te animamos a que revises los temas que más te interesan del foro para extraer y aportar el máximo de información posible.

¡Agradecidos de tenerte con nosotr@s y esperamos leerte pronto!

Datos internos informativos (No hagas caso de estos datos, son para los administradores de Exaforo)

Fecha y hora de carga de esta página: 21/062018 a las 21:50:20
Memória total usada: 7524792

¿Y el logo de Paypal? ¿Exaforo no era sin ánimo de lucro? Y así es, para poder usar Exaforo nadie cobra nada, fíjate bien que el botón de Paypal es el de donaciones. Mantener la web en un servidor encendido 24 horas, contratar la conexión a internet de alta velocidad para que goces de peticiones rápidas, pagar los certificados SSL,…es decir, los costes de mantenimiento.

Nuestros pocos fondos van destinados a mantener siempre en marcha los sistemas y cuando adquirimos equipos nuevos, los viejos solemos donarlos a escuelas y centros educativos que tienen pocos recursos para adquirir equipos informáticos. Por eso tus donaciones son muy importantes ya que no solo nos ayudan a nosotros sino también a niños en edad escolar, al profesorado y a los centros educativos en general. En exaforo creemos en la formación libre y que sea accesible a todo el mundo. Si crees poder ayudarnos haciendo una donación para que sigamos creciendo como hemos ido haciendo desde 2003, te estaremos muy agradecidos, el importe de la donación lo pones tú, nosotros no pedimos una cantidad fija, piensa que puedes donar hasta mínimo 1 céntimo. Dones o no dones, muchas gracias por habernos leído hasta el final. Más abajo tienes el botón de “Donar con Paypal” (no hace falta que des tu número de la tarjeta, el botón te dirige a la página oficial de Paypal y desde su formulario puedes hacer la donación desde tu cuenta Paypal).

The cybersecurity of Persona 5  The cybersecurity of Persona 5

Valoración de éste post
4.66 / 5 de 337 votos



Mensajes: 957


Puntos totales:

Enhorabuena!

32




El contenido de este artículo o información está sujeto a una licencia Creative Commons BY (CC-BY), puedes divulgar públicamente este contenido pero deberás hacer mención del autor: Kernel e indicar la dirección web de esta página: https://www.exabyteinformatica.com/tienda/foro/the-cybersecurity-of-persona-5-t1863.html

The content of this article or any related information is under the Creative Commons license BY, you can republish this content freely but you must mention the author of this article: Kernel and indicate the URL of this page: https://www.exabyteinformatica.com/tienda/foro/the-cybersecurity-of-persona-5-t1863.html

Bajo licencia de Creative Commons


I am no longer most effective a suggestions security knowledgeable, I additionally turn up to be a massive Jap RPG fan. I have additionally been playing video games in view that 1989. The Persona spinoff of the massive Megami Tensei collection is one of my favorite video game franchises. Persona video games function desirable paintings design with the aid of Shigenori Soejima and Masayoshi Suto, mind-blowing tune by means of Shoji Meguro, neatly written stories and characters, and compelling game mechanics.

Visita Exaforo.com


What is black, crimson, and picaresque in all places? Persona 5, of route.

I best write professionally about cybersecurity, i am now not a video online game reviewer or critic. I have prior to now play the PSP version of the primary Persona online game, the PSP version of Persona 2: blameless Sin, the PSOne version of Persona 2: everlasting Punishment, Persona 3 transportable, and Persona 4 Golden. I have been eagerly looking forward to Persona 5 because that it changed into first announced by using Atlus in 2013. This March, I preordered the PS3 edition with my very own dollars, and it arrived at my domestic by way of mail in mid-April. As of this writing, I have performed about 65 hours of what I are expecting to be an over 100 hour first playthrough. Persona 5 is a brilliant video game, and that I am thoroughly having fun with each minute of it although every so often I stress out about time management.

I purchased the game because of I am a fan. Earlier than I received it, i used to be conscious that one of the vital characters, Futaba Sakura, is a computer hacker. However, I had no conception how enormously cybersecurity subject matters can be woven into the plot of the video game. Nor did I predict my gaming pastime to provide me a concept that i can use in my counsel safety writing. However, it seems that many details of the online game's plot depend on cybersecurity concepts. If you do not want Persona 5 spoilers, i recommend that you stop reading this.

In the cybersecurity world, girls are a minority. i am a woman, and I’ve made some extent of highlighting other ladies in my field in a collection of interviews for Tripwire's State of security blog. I have examine all of the novels in Stieg Larsson and David Lagercrantz's The girl with The Dragon Tattoo (Millennium) series. Admittedly, what first compelled me to study those books was the Lisbeth Salander personality, a female hacker. I enjoyed reading those novels and looking at the Swedish motion pictures, which can be in accordance with the Larsson-written trilogy. However, I knew that the nature of some of Salander's “hacking” could be unrealistic in precise life. (She could not have taken funds from Hans-Erik Wennerström's checking account in the approach it changed into described in the first novel, as an example.) Even with those technical inaccuracies, those books were lots of fun to examine. I do not expect cybersecurity issues in fiction to always be portrayed realistically.

i would describe the surroundings of the Persona games, Persona 5 protected, as modern fantasy. Alternatively, not it's variety of like Buffy The Vampire Slayer within the experience that the characters are living in the contemporary world with modern technology, but there are also magical or fantasy elements, like vampires in Buffy, or “Persona” non-secular entities with magical attacks within the Persona sequence. I really have fun with that sort of environment. I have fun with it more than high fantasy, somewhat frankly. (Come at me, nerds!)

In Persona 5, you play a male eastern high college pupil, who you get to identify yourself. I named mine Kimiko Kururai, impressed with the aid of my English true identify. (The closest phonetic approximation to “Crawley” in eastern is “Kururai.”) Sure, the “ko” suffix makes his name feminine, but “Morgana” is a feminine name for a male non-cat, eh? While in his native land, your protagonist catches a shady baby-kisser while he tries to rape a younger girl. The protagonist intervenes, and the politician, with the cooperation of the girl who you tried to rescue, lies to police to get your protagonist arrested.

Visita Exaforo.com


For his probation, the protagonist is shipped to are living and attend faculty in Tokyo. A cafe proprietor named Sojiro Sakura takes him in and lets him live in the attic above the Leblanc cafe. Whereas on his approach to his first day of school at Shujin Academy, your protagonist results in a mysterious fortress with a Shujin pupil he simply met, Ryuji Sakamoto. Whereas trying to escape the fort, Ryuji and your protagonist meet a cartoonish searching cat named Morgana. Morgana insists that he is in reality human, and may additionally support the boys escape. Morgana additionally teaches the boys in regards to the magical palaces, which are produced from the twisted desires of precise Americans, comparable to that fort that became created through Shujin Academy’s sociopathic health, club instructor. They are accustomed to their mission to “steal the hearts” of americans to reform eastern society. Morgana already is aware of how to use his Persona, a non-secular being that may battle shadows with magic when aroused from the soul of any person who is a potential Persona user. Your protagonist and Ryuji awaken their Personas, as do the other main characters who be a part of you over the course of the video game, Ann Takamaki, Yusuke Kitagawa, Makoto Niijima, Haru Okumura, Goro Akechi and our hacker woman Futaba Sakura.

How do your protagonist and his friends, who at last call themselves the Phantom Thieves of Hearts (I named mine “The Crawleys”), access these twisted desires that fashioned palaces within the first area? Before the protagonist ends up in the fort palace at the start of the game, a weird app seems on his smartphone that he cannot delete. It turns out that the app is the capability of getting access to the palaces in the game, which feature as the dungeons of this RPG. To benefit entry to a new palace, the Thieves need to try keyword strings regarding the goal or their palace, and hope for a healthy.

I do not know of any TCP/IP ports that may transport human bodies to imaginary worlds, as a minimum not actually. If there may be any one studying this who has a seller impartial networking certification from the excellent World of Oz, you might also proper me on that be counted. So instead, I will look at malicious cellular apps within the precise world.

Within the game, it cannot be determined no matter if the protagonist's phone runs Android or iOS, which is doubtless a deliberate movement with the aid of Atlus. In Android, occasionally apps that users cannot uninstall are packaged via the device OEM earlier than the person purchases their mobile. They could handiest be uninstalled via buying root entry. In iOS, there are Apple apps that cannot be uninstalled without a jailbreak if ever.

The Metaverse app finally ends up on the protagonist's telephone best after a while of using it, so that it will rule it out as “bloatware.” He also did not intentionally install the app. occasionally malicious apps are put in on cellular gadgets without the knowledge of the user, and a few of those even have launch icons, because the Metaverse app does. Most of the time when that occurs the malicious app is a Trojan that ended up in the App save or Play keep. If the safety configuration of your mobile operating equipment is lax, that you can also get malicious apps backyard of the respectable retailers, reminiscent of by the use of the web or an electronic mail attachment.

The easy availability of file binding courses means that an electronic mail attachment that does not look like an app, corresponding to a JPEG file, can have an app or different variety of executable file in it. Did my Kimiko open a malicious email attachment on his option to Tokyo? Quite possibly. As for Kimiko's inability to eradicate the Metaverse app icon, difficult to delete icons are a frequently pronounced challenge in each iOS and Android. My protagonist could have tried factory resetting his phone. However, what if Igor or Philemon put a mysterious backdoor into his cell's OS?

About midway, right into a Persona 5 playthrough, after beating three different palaces, the Phantom Thieves beginning to develop into noted. Suddenly, some unidentifiable birthday party starts textual content messaging the protagonist.
A hacktivist group known as Medjed threatens the Phantom Thieves. The nameless grownup who texts you says they could support you cope with Medjed, but you need to cooperate with them first. They need you to discover a method into their palace to steal their heart. Huh?

The protagonist is baffled as to how the nameless person who calls them self-Alibaba acquired his quantity within the first region. The way that the hacker reaches the protagonist is, in reality, possible in true lifestyles. They might have performed something like slip RAT malware onto the protagonist's telephone by means of a filebinded photo file dispatched via facebook Messenger. If the protagonist didn't deliberately conceal or anonymize their social networking profile, that is how they could be discovered and chatted with, by using someone pretending to be a person else. With a faraway connection and think about of the phone, the hacker might find their mobile phone number in the mobile settings.

Afterward in the game, we learn that Alibaba is really Futaba Sakura, whose stepdad Sojiro Sakura runs the Leblanc cafe the place the protagonist lives. Therefore, what I believe obviously happened is that Futaba bought physical entry of the protagonist's cell whereas they left it unattended in the cafe. That makes greater sense in the event you agree with how Futaba bugged the cafe to listen in on the Phantom Thieves' conversations. The bugs are probably historic-long-established analog style, as if the bugs that helped deliver down Richard Nixon, because of Sojiro Sakura would not appear to use any laptop device while working his cafe.

I am impressed through how the writers of the game developed Medjed. Years ago, I wrote about hacktivist corporations like nameless. Nameless, the first hacktivist community to ever become noted began on 4chan. In 4chan boards, users are referred to as “nameless” through default. The way of life of 4chan, even a decade in the past, encourages Americans to make outrageous posts while sharing no identifying suggestions about themselves-now not even a reused username.

The writers of the online game did a superb job of modelling Medjed on anonymous. Futaba displays that she all started Medjed, possibly on a discussion board like 2ch, the Japanese precursor to 4chan. She claims to do not have anything to do with Medjed's contemporary activities. That is as a result of any person on the internet can claim to be Medjed, there is not any organizational hierarchy like in a conventional geared up crime group. It is exactly how businesses like nameless and its LulzSec spinoff have worked.

Medjed even has a slogan it is variety of like anonymous used, “we are nameless. We are Legion. We do not forgive. We do not forget. Are expecting us.” Medjed says, “We are Medjed. We are unseen. We are able to get rid of evil. “ (I’m simply the use of the respectable English translation of the game, as a result of it really is the version I’m playing and that i don't communicate enough eastern.)

As soon as Futaba joins your group, notwithstanding she is a Persona person, she would not directly battle battles in your birthday party. Instead, she can present random buffs to your group individuals, reminiscent of to increase your assault energy. She will be able to additionally aid you navigate palaces and Mementos, the facet quest dungeon. Her l33t competencies turn out to be useful in the event you need to crack or penetrate the equipment that foes use in palaces.

Futaba Sakura, like Lisbeth Salander of Stieg Larsson's novels, is introverted, socially awkward, and has a past. i will relate to each characters in those methods. Besides the fact that children I am no longer neurotypical either, I feel i will false extroversion better than they can. In addition, i would a great deal somewhat write about cyberattacks than ever try any in actual life. Maybe i may be a pen tester eventually. Alternatively, probably I will simply write about cybersecurity for the relaxation of my life.

I have met many individuals in my trade, and that I have additionally met individuals who thought they might turn into the subsequent Kevin Mitnick. The tips safety professionals I have met are undoubtedly all very brainy Americans, and we are often greater introverted than the norm. Americans in my industry are also greater likely to be paranoid, even when they under no circumstances do anything else unlawful. Futaba definitely has personality features that I have viewed in both cybersecurity gurus and script kiddies with unrealistic goals of infamy. You must be able to savor many hours of solitude to be taught potential like desktop programming or penetration checking out. Computer nerds do sometimes should interact with each different, but many of the time that interaction is over the internet instead of in meat space. Futaba feels herbal as the sort of 15-12 months-old woman who would have a subscription to 2600 magazine, where I have also written about hacker culture.

Atlus and P Studio have completed a superb job of constructing this game, and i seem forward to playing the 35+ hours left of my first playthrough. as a result of the constraints of writing fiction for video games, and additionally because the Persona video games take vicinity in undoubtedly fictional modern delusion settings (despite the fact that the Tokyo of Persona 5 does use areas that look similar to locations in real world Tokyo), no longer all of the “hacking” is fully realistic. However what they deliberately acquired appropriate is genuine of precise world knowledge and the cultures that computer expertise have created.



No te pierdas el tema anterior: Final fantasy I to XV: rating the sequence

Salta al siguiente tema: Horizon: Zero dawn time evaluation

Quizás también te interese:
Si has encontrado información útil en Exaforo, ayúdanos a seguir creciendo. Muchas gracias por confiar en nosotros!


Volver a Playstation 4 a tope