<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Yago Hansen CV</title>
	<atom:link href="https://yagohansen.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://yagohansen.com</link>
	<description>Yago Hansen Curriculum Vitae and background experience</description>
	<lastBuildDate>Fri, 17 Apr 2020 15:02:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.9</generator>

<image>
	<url>https://yagohansen.com/wp-content/uploads/2020/03/cropped-android-chrome-512x512-2-32x32.png</url>
	<title>Yago Hansen CV</title>
	<link>https://yagohansen.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mundo Hacker Radio Podcast</title>
		<link>https://yagohansen.com/mundo-hacker-radio-podcast/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Tue, 14 Apr 2020 19:32:59 +0000</pubDate>
				<category><![CDATA[mundohacker-en]]></category>
		<category><![CDATA[ciberseguridad]]></category>
		<category><![CDATA[mundo hacker]]></category>
		<category><![CDATA[mundohacker]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[radio]]></category>
		<category><![CDATA[radiouniverso.es]]></category>
		<guid isPermaLink="false">https://yagohansen.com/?p=4341</guid>

					<description><![CDATA[<p>Desde el año 2007, mis colegas Antonio Ramos Varón y Jean Paul García Morán dirigen un programa de Radio On-Line dedicado a todos los temas relativos al hacking y seguridad en entornos IT. Este programa llamado "Mundo Hacker" ha sido desde sus comienzos grabado y emitido en la emisora de Radio on-line Radiouniverso.es con gran difusión. Desde sus inicios este programa cuenta con otros muchos colaboradores, como Rubén, Maikel, Yanko, Alberto y finalmente Yago Hansen.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/mundo-hacker-radio-podcast/">Mundo Hacker Radio Podcast</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Desde el año 2007, mis colegas Antonio Ramos Varón y Jean Paul García Morán dirigen un programa de radio on-Line dedicado a todos los temas relativos al hacking y seguridad en entornos IT. Este programa llamado &#8220;Mundo Hacker&#8221; ha sido desde sus comienzos grabado y emitido en la emisora de Radio streaming <em>Radiouniverso.es</em> con gran difusión. Desde sus inicios este programa cuenta con otros muchos colaboradores, como Rubén, Maikel, Yanko, Alberto y  Yago Hansen.</p>



<p>Pocas personas escriben código y sin embargo el código afecta a muchas personas. Esta es la premisa de un mundo virtual donde las leyes físicas de la naturaleza no son aplicables, el código es ahora la ley que dicta el comportamiento de los internautas. Esta nueva sociedad digital tiene varias tendencias paralelas al mundo físico en el cual vivimos, entre ellas la lucha por el control. De aquí nace el hacktivismo, el activismo y desobediencia social que lucha por tener una voz y pelea por sus derechos.</p>



<figure class="wp-block-image size-large"><img width="300" height="300" src="https://yagohansen.com/wp-content/uploads/mundohacker02-06-08-25-mp3-image.jpg" alt="" class="wp-image-4338" srcset="https://yagohansen.com/wp-content/uploads/mundohacker02-06-08-25-mp3-image.jpg 300w, https://yagohansen.com/wp-content/uploads/mundohacker02-06-08-25-mp3-image-150x150.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></figure>



<h2><strong><em>Programas de radio en Podcast</em></strong></h2>



<p><em>En este programa se exploran las distintas tendencias de un nuevo mundo digital que no es conocido por muchos. Se dan a conocer las subculturas que han ido creciendo en Internet debido al impulso tecnológico, donde lo que se consideraba &#8216;underground&#8217; o &#8216;marginal&#8217; es ahora un impulso social. Se dará a conocer las amenazas cibernéticas que desatan una guerra digital, las tendencias de seguridad informática y un mundo de activistas sociales que luchan ante las corporaciones. Se dará a conocer el mundo de los Hackers.</em></p>



<p></p>



<h2>Robo de identidad en Internet</h2>



<p><strong>TITULO</strong>: Robo de identidad en Internet<br><strong>SINOPSIS</strong>: En este primer programa de Mundo Hacker debatimos sobre el robo de identidades en Internet. Explica sobre las conductas criminales sobre el robo de identidad y el mal uso que se puede hacer de ella.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yanko Kolev</p>



<figure class="wp-block-audio aligncenter"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker12-06-07.2-1.mp3"></audio><figcaption>Mundo Hacker Radio 12/06/2007 Podcast episode</figcaption></figure>



<h2>La sensibilidad de los datos privados en el e-mail</h2>



<p><strong>TITULO</strong>: Datos privados en e-mail<br><strong>SINOPSIS</strong>: En los últimos tiempos se habla mucho del robo de información en los sistemas públicos de correo electrónico, como Hotmail, Yahoo, G-mail, etc.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yanko y Jacinto</p>



<figure class="wp-block-audio aligncenter"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker19-06-07.18.mp3"></audio><figcaption>Mundo Hacker Radio 19/06/2007 Podcast episode</figcaption></figure>



<h2>Hacktivismo, activismo Social de los hackers</h2>



<p><strong>TITULO</strong>: Hacktivismo<br><strong>SINOPSIS</strong>: Debate sobre las actividades de grupos sociales hackers o hacktivistas como medio de protesta social y activismo social ético y no-ético.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Jacinto y Yanko</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker26-06-07.21.mp3"></audio><figcaption>Mundo Hacker Radio 26/06/2007 Podcast episode</figcaption></figure>



<h2>Las Raíces del hacktivismo</h2>



<p><strong>TITULO</strong>: Las Raíces del hacktivismo<br><strong>SINOPSIS</strong>: Cultura underground sobre los mejores hackers dedicados al hacktivismo como tal del mundo.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker03-07-07.29.mp3"></audio><figcaption>Mundo Hacker Radio 03/07/2007 Podcast episode</figcaption></figure>



<h2>Ciberguerra</h2>



<p><strong>TITULO</strong>: Ciberguerra<br><strong>SINOPSIS</strong>: En este programa tratamos sobre una posible guerra cibernética y las consecuencias que eso podría traer a Gobiernos y Corporaciones.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker17-07-07.22.mp3"></audio><figcaption>Mundo Hacker Radio 17/07/2007 Podcast episode</figcaption></figure>



<h2>Inseguridad inalámbrica </h2>



<p><strong>TITULO</strong>: Inseguridad inalámbrica<br><strong>SINOPSIS</strong>: Tercer capítulo sobre tecnología Wi-Fi y los medios para securizarla, además de sus inseguridaddes vigentes<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Jacinto, Yago Hansen</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker24-07-07.5.mp3"></audio><figcaption>Mundo Hacker Radio 24/07/2007 Podcast episode</figcaption></figure>



<h2>Inseguridad Inalámbrica (I)</h2>



<p><strong>TITULO</strong>: Inseguridad Inalámbrica (I)<br><strong>SINOPSIS</strong>: Es nuestro primer programa sobre redes inalábricas como Wi-Fi y su seguridad y vulnerabilidad. Presentamos los tipos de hacking y los autores y funciones de cada uno.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker25-07-07.11.mp3"></audio><figcaption>Mundo Hacker Radio 25/07/2007 Podcast episode</figcaption></figure>



<h2>Microsoft, la amenaza</h2>



<p><strong>TITULO</strong>: Microsoft, la amenaza<br><strong>SINOPSIS</strong>: Debate sobre ciberrevolución que se creó en Chile al decidirse un acuerdo comercial por parte del Gobierno con Microsoft como proveedor de Software. Hacktivismo en contra de este acuerdo.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yago Hansen, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker31-07-07.13.mp3"></audio><figcaption>Mundo Hacker Radio 31/07/2007 Podcast episode</figcaption></figure>



<h2>Firewalls</h2>



<p><strong>TITULO</strong>: Firewalls<br><strong>SINOPSIS</strong>: Visión amplia y racional de los cortafuegos en formato software o appliance, para conocer a fondo estas herramientas.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Fernado Picouto Ramos</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker04-09-07.16.mp3"></audio><figcaption>Mundo Hacker Radio 04/09/2007 Podcast episode</figcaption></figure>



<h2>Bluetooth Hacking</h2>



<p><strong>TITULO</strong>: Bluetooth Hacking<br><strong>SINOPSIS</strong>: Angel y sus colegas comparten sus conocimientos sobre tecnologías inalámbricas Bluetooth y sus usos maliciosos.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jacinto, Yanko Kolev, Angel García</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker11-09-07.27.mp3"></audio><figcaption>Mundo Hacker Radio 11/09/2007 Podcast episode</figcaption></figure>



<h2>Ficheros logs</h2>



<p><strong>TITULO</strong>: Ficheros logs<br><strong>SINOPSIS</strong>: Describimos los ficheros logs, junto con su importancia y su presencia actual en todos los servidores y equipos de red afecta a cualquier movimiento en la red.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yanko Kolev</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker18-09-07.23.mp3"></audio><figcaption>Mundo Hacker Radio 18/09/2007 Podcast episode</figcaption></figure>



<h2>Canales seguros de comunicación</h2>



<p><strong>TITULO</strong>: Canales seguros de comunicación<br><strong>SINOPSIS</strong>: Todo lo importantes sobre el establecimiento y uso de canales seguros de comunicación, principalmente en Internet.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yanko, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker16-10-07.12.mp3"></audio><figcaption>Mundo Hacker Radio 16/10/2007 Podcast episode</figcaption></figure>



<h2>Escaneadores de vulnerabilidades</h2>



<p><strong>TITULO</strong>: Escaneadores de vulnerabilidades<br><strong>SINOPSIS</strong>: Conocimientos básicos sobre los escaneadores de vulnerabilidades para detectar errores o bugs y posteriormente utilizarlos para penetración en sistemas.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker30-10-07.24.mp3"></audio><figcaption>Mundo Hacker Radio 30/10/2007 Podcast episode</figcaption></figure>



<h2>Inseguridad inalámbrica Wi-Fi (II)</h2>



<p><strong>TITULO</strong>: Inseguridad inalámbrica Wi-Fi (II)<br><strong>SINOPSIS</strong>: Volvemos sobre el tema de la seguridad en las redes inalámbricas, especialmente Wi-Fi en este segundo programa relacionado.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yago Hansen, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker13-11-07.15.mp3"></audio><figcaption>Mundo Hacker Radio 13/11/2007 Podcast episode</figcaption></figure>



<h2>Los protocolos ARP y RARP</h2>



<p><strong>TITULO</strong>: Los protocolos ARP y RARP<br><strong>SINOPSIS</strong>: Uso del protocolo ARP y RARP como herramienta para hacking y consecuencias de su utilización en la resolucion de direcciones IP.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Codename</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker20-11-07.7.mp3"></audio><figcaption>Mundo Hacker Radio 20/11/2007 Podcast episode</figcaption></figure>



<h2>IDS e IPS, detección de intrusos</h2>



<p><strong>TITULO</strong>: IDS e IPS, detección de intrusos<br><strong>SINOPSIS</strong>: El especialista en seguridad Fernando Picouto da una buena explicación sobre la implementación y el funcionamiento de los sistemas de detección y prevención de intrusos.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Fernando Picouto Ramos</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker27-11-07.17.mp3"></audio><figcaption>Mundo Hacker Radio 27/11/2007 Podcast episode</figcaption></figure>



<h2>Hardware hacking</h2>



<p><strong>TITULO</strong>: Hardware hacking<br><strong>SINOPSIS</strong>: Los asistentes explican algunas formas de hacer hacking mediante hardware autoconstruido como keyloggers, cpus, etc.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yanko, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker11-12-07.28.mp3"></audio><figcaption>Mundo Hacker Radio 11/12/2007 Podcast episode</figcaption></figure>



<h2>Keylogger (II) y USB hacks</h2>



<p><strong>TITULO</strong>: Keylogger (II) y USB hacks<br><strong>SINOPSIS</strong>: Jacinto continúa con su explicación sobre la construcción de un keylogger made in Hell e introducción a los pendrive ladrones de información o USB hacks.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yago Hansen, Jacinto y Yanko Kolev</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker18-12-07.19.mp3"></audio><figcaption>Mundo Hacker Radio 18/12/2007 Podcast episode</figcaption></figure>



<h2>Phreaking</h2>



<p><strong>TITULO</strong>: Phreaking<br><strong>SINOPSIS</strong>: Tratamos sobre las técnicas actuales que se utilizan para el cracking de telefonía tanto fija como móvil.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yanko Kolev, Jacinto, Jesus FK</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker15-01-08.31.mp3"></audio><figcaption>Mundo Hacker Radio 15/01/2008 Podcast episode</figcaption></figure>



<h2>Inyección de Código SQL</h2>



<p><strong>TITULO</strong>: Inyección de Código SQL<br><strong>SINOPSIS</strong>: Explicamos las posiblidades y el nivel de peligrosidad de los ataques de inyección de código SQL generando procedimientos almacenados muy peligrosos.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Maikel, Jacinto, Quark</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker05-02-08.1.mp3"></audio><figcaption>Mundo Hacker Radio 05/02/2008 Podcast episode</figcaption></figure>



<h2>MD5 y SHA1, Ataques de colisión</h2>



<p><strong>TITULO</strong>: MD5 y SHA1, Ataques de colisión<br><strong>SINOPSIS</strong>: Explicamos de forma relativamente fácil de entender el mecanismo de reducción de mensajes, especialmente MD5 y SHA1 y su ataque de hacking mediante colisiones.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yago Hansen, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker19-02-08.8.mp3"></audio><figcaption>Mundo Hacker Radio 19/02/2008 Podcast episode</figcaption></figure>



<h2>Botnets (I)</h2>



<p><strong>TITULO</strong>: Botnets (I)<br><strong>SINOPSIS</strong>: Programa que explica el funcionamiento y la creación de botnets o redes de bots que controlan de forma maliciosa millones de ordenadores en Internet bajo el control de un administrador.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yanko, Jacinto, Rubén y Carlos</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker04-03-08.6.mp3"></audio><figcaption>Mundo Hacker Radio 04/03/2008 Podcast episode</figcaption></figure>



<h2>Ataques XSS (I)</h2>



<p><strong>TITULO</strong>: Ataques XSS (I)<br><strong>SINOPSIS</strong>: Explicación y desarrollo de los ataques Web de tipo XSS sobre los clientes web basándose en formularios no filtrados.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yanko, Jacinto y Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker01-04-08.26.mp3"></audio><figcaption>Mundo Hacker Radio 01/04/2008 Podcast episode</figcaption></figure>



<h2>Inyección de código XSS (II) y Endpoint Security</h2>



<p><strong>TITULO</strong>: Inyección de código XSS (II) y Endpoint Security<br><strong>SINOPSIS</strong>: Volvemos a tratar el tema de inyección de código mediante XSS (crosscripting) mediante Javascript en películas y otros programas Flash. Mediante Actionscript y otros lenguajes. Además damos una introducción sobre Endpoint Security.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Rubén, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker06-05-08.9.mp3"></audio><figcaption>Mundo Hacker Radio 06/05/2008 Podcast episode</figcaption></figure>



<h2>Endpoint Security</h2>



<p><strong>TITULO</strong>: Endpoint Security<br><strong>SINOPSIS</strong>: Todo sobre seguridad en el puesto final o endpoint security para los ejecutivos que viajan con su portatil. Medios de protección para los dispositivos portatiles o fijos.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yanko, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker02-06-08.25.mp3"></audio><figcaption>Mundo Hacker Radio 02/06/2008 Podcast episode</figcaption></figure>



<h2>Inseguridad Inalámbrica (IV)</h2>



<p><strong>TITULO</strong>: Inseguridad Inalámbrica (IV)<br><strong>SINOPSIS</strong>: Es nuestro cuarto programa sobre redes inalábricas como Wi-Fi y su seguridad y vulnerabilidad. Presentamos los tipos de hacking y los autores y funciones de cada uno.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yago Hansen, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker08-07-08.20.mp3"></audio><figcaption>Mundo Hacker Radio 08/07/2008 Podcast episode</figcaption></figure>



<h2>Coldboot attack</h2>



<p><strong>TITULO</strong>: Coldboot attack<br><strong>SINOPSIS</strong>: Ataque basado en la persistencia electríca de los estados de los chips de la memoria basados en cryogenia. Técnica antigua utilizado en la forénsica.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Santiago, Maikel, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker16-09-08.30.mp3"></audio><figcaption>Mundo Hacker Radio 16/09/2008 Podcast episode</figcaption></figure>



<h2>Botnets, el enemigo oculto</h2>



<p><strong>TITULO</strong>: Botnets, el enemigo oculto<br><strong>SINOPSIS</strong>: Volvemos a tratar sobre botnets, pero específicamente mediatne P2P, para causar denegación de servicio contra un servidor víctima mediante redirección de tráfico.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Maikel</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker04-11-08.10.mp3"></audio><figcaption>Mundo Hacker Radio 04/11/2008 Podcast episode</figcaption></figure>



<h2>Anónimos en la Red</h2>



<p><strong>TITULO</strong>: Anónimos en la Red<br><strong>SINOPSIS</strong>: Todo sobre el anónimato o invisibilidad cuando estamos navegando por Internet. Nuestros datos personales y la trazabilidad.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yago Hansen, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker09-12-08.3.mp3"></audio><figcaption>Mundo Hacker Radio 09/12/2008 Podcast episode</figcaption></figure>



<h2>Análisis forense y herramientas</h2>



<p><strong>TITULO</strong>: Análisis forense y herramientas<br><strong>SINOPSIS</strong>: Explicación y debate sobre las técnicas utilizadas para el análisis científico forénsico de dispositivos digitales o de actos maliciosos.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Alberto, Maikel, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker27-01-09.4.mp3"></audio><figcaption>Mundo Hacker Radio 27/01/2009 Podcast episode</figcaption></figure>



<h2>NAC Sistema de control de acceso a la red </h2>



<p><strong>TITULO</strong>: NAC Sistema de control de acceso a la red<br><strong>SINOPSIS</strong>: Un programa en el que aclaramos todos los términos necesarios para la aplicación de las tecnologías NAC de control de acceso a la red.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Maikel, Francisco (Netbi0s)</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker10-04-09.14.mp3"></audio><figcaption>Mundo Hacker Radio 10/04/2009 Podcast episode</figcaption></figure>



<h2>Cifrado mediante PGP</h2>



<p><strong>TITULO</strong>: NAC Sistema de control de acceso a la red<br><strong>SINOPSIS</strong>: Un programa en el que se habla sobre el cifrado PGP de claves asimétricas muy utilizado en la transmisión de secretos. <br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Maikel, Yago Hansen</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker23-09-09.33.mp3"></audio><figcaption>Mundo Hacker Radio 23/09/2009 Podcast episode</figcaption></figure>



<h2>Seguridad en cibercafés</h2>



<p><strong>TITULO</strong>: Seguridad en cibercafés<br><strong>SINOPSIS</strong>: Un programa en el que se habla los problemas de la seguridad en cibercafés, locutorios, workcenters, etc.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Maikel, Yago Hansen, Francisco (NetBi0s)</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker24-09-09.32.mp3"></audio><figcaption>Mundo Hacker Radio 24/09/2009 Podcast episode</figcaption></figure>
<p>The post <a rel="nofollow" href="https://yagohansen.com/mundo-hacker-radio-podcast/">Mundo Hacker Radio Podcast</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker12-06-07.2-1.mp3" length="58557802" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker19-06-07.18.mp3" length="57154295" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker31-07-07.13.mp3" length="0" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker30-10-07.24.mp3" length="52805432" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker27-11-07.17.mp3" length="52384965" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker17-07-07.22.mp3" length="68318905" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker24-07-07.5.mp3" length="67216095" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker25-07-07.11.mp3" length="67215998" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker18-09-07.23.mp3" length="60409958" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker16-10-07.12.mp3" length="53551907" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker13-11-07.15.mp3" length="53775933" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker18-12-07.19.mp3" length="61345141" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker15-01-08.31.mp3" length="53783873" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker19-02-08.8.mp3" length="48650498" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker02-06-08.25.mp3" length="52858509" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker16-09-08.30.mp3" length="51654371" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker27-01-09.4.mp3" length="51654789" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker23-09-09.33.mp3" length="48485222" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker24-09-09.32.mp3" length="53086535" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker03-07-07.29.mp3" length="58397304" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker11-12-07.28.mp3" length="55931767" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker05-02-08.1.mp3" length="54240700" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker01-04-08.26.mp3" length="125516742" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker06-05-08.9.mp3" length="53006467" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker08-07-08.20.mp3" length="54501924" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker04-11-08.10.mp3" length="53464134" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker09-12-08.3.mp3" length="53465388" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker10-04-09.14.mp3" length="48923007" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker04-03-08.6.mp3" length="52673771" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker20-11-07.7.mp3" length="52652459" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker11-09-07.27.mp3" length="64882843" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker04-09-07.16.mp3" length="53892958" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker26-06-07.21.mp3" length="58271500" type="audio/mpeg" />

			</item>
		<item>
		<title>Cybersecurity in remote work</title>
		<link>https://yagohansen.com/cybersecurity-in-remote-work-2/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Tue, 14 Apr 2020 14:48:45 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[remote]]></category>
		<category><![CDATA[work]]></category>
		<guid isPermaLink="false">https://yagohansen.com/?p=4250</guid>

					<description><![CDATA[<p>Currently, almost all companies of a certain size provide employees with work tools such as secure platform laptops, VPNs for remote connection to the intranet, remote access protection, remote access infrastructures, etc. All this means that a company that is already prepared to work remotely will not have any variation or loss of security in its remote access policies.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/cybersecurity-in-remote-work-2/">Cybersecurity in remote work</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large is-resized"><img loading="lazy" src="https://yagohansen.com/wp-content/uploads/2018/09/im001-1024x683.jpg" alt="" class="wp-image-1191" width="591" height="394" srcset="https://yagohansen.com/wp-content/uploads/2018/09/im001-1024x683.jpg 1024w, https://yagohansen.com/wp-content/uploads/2018/09/im001-300x200.jpg 300w, https://yagohansen.com/wp-content/uploads/2018/09/im001-768x512.jpg 768w, https://yagohansen.com/wp-content/uploads/2018/09/im001.jpg 1200w" sizes="(max-width: 591px) 100vw, 591px" /><figcaption>remote work</figcaption></figure>



<h2>Is it easier to attack a company via a remote connecting worker? Why?</h2>



<p>Not quite. Currently, almost all companies of a certain size provide employees with work tools such as secure platform laptops, VPNs for remote connection to the intranet, remote access protection, remote access infrastructures, etc. All this means that a company that is already prepared to work remotely will not have any variation or loss of security in its remote access policies. At most, when many unintended workers work remotely, you may have some performance, connection speed, or bandwidth issues. The problem occurs when the company has not previously defined remote access policies, practices, and methodologies for teleworking and is currently facing a multitude of employees accessing its intranet from abroad. Haste and lack of preparation can and often create situations of insecurity and even chaos, leading to malfunctions, denials of service and even unforeseen security vulnerabilities, which will put you in a dangerous situation. Security policies and architectures must be prepared in advance and tested in advance, just as making decisions or legislating on impulse is never a good idea. Medium and small companies are much worse prepared for this change and put themselves in more vulnerable situations at the technical and organizational level, depending on insecure and heavy access programs, depending in many cases on personal computers in the teleworker&#8217;s home to connect to their remote jobs. This is indeed a security risk for them since the level of security will depend on the security configuration of the employees and not on the corporate security policies.</p>



<h2>We usually associate teleworking with good access to the management platform and intranet, but what other aspects do we have to take care of?</h2>



<p>Teleworking is associated with many technical and organizational aspects within the structure of a company. Creating good planning for this new capacity is necessary to implement good policies, compliance regulations, standards, management and operating regulations, privacy policies, human resources policies, support structures, etc. It is not something banal that can be organized in a couple of days and affects many organizational and technical aspects. It is very important to take all this into account when implementing efficient and safe remote work policies, which also continue to meet all regulatory and legal requirements. In addition there is the secure access infrastructure that allows sustaining all of the above in an efficient, redundant and reliable way. If all this has been taken into account, the truth is that teleworking today is a great solution to improve our quality of life and work, reconcile work and family and not agglomerate the population around large cities, in addition to lowering production costs for companies.</p>



<h2>What would be the best solution? What must be provided to the worker?</h2>



<p>The best solution is planning and organization as I already mentioned. If the worker is provided with the necessary access and control tools, safety and efficiency problems are avoided in most cases. A well-configured laptop, platform by the company and equipped with the necessary programs and utilities to do the job well, will only depend on a good VPN-type remote access and a good access speed both for the employee&#8217;s internet access and for the width of the company&#8217;s access band. This allows using the same platforms, tools, programs, devices as if we were inside the facilities. On the other hand, it allows us to hold conferences, person-to-person or group videoconferences with different employees and departments. In general, in corporations the work changes little when it is executed remotely than locally. In small and medium-sized companies it is usually different and it is not prepared for this type of structural changes, although they can be adapted normally if they do not depend on production environments, such as manufacturing, machines, warehouses, products, etc.</p>



<h2>From the worker&#8217;s point of view, what measures do you have to take? Especially if you work with your own teams</h2>



<p>The worker is not responsible in any case for providing the security or the necessary infrastructure for remote access, especially when this situation has not been contracted with the company. The latter must not provide the access platform, or even their own personal equipment for the development of their work, unless they were freelance or self-employed. A similar situation occurs when employees use their laptops within the intranet or even their own smartphones in many cases. Safety planning should always start with the company and never with the employee.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/cybersecurity-in-remote-work-2/">Cybersecurity in remote work</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Privacy and COVID-19</title>
		<link>https://yagohansen.com/privacidad-y-covid-19/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Tue, 14 Apr 2020 13:38:16 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[api]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://yagohansen.com/?p=4230</guid>

					<description><![CDATA[<p>One of the most important, most private and most protected types of personal data by fundamental rights, by international laws and by private organizations must always be that of a health nature. A pandemic, which is a threat that we have previously faced, although now in a fully digital era, is not sufficient reason to modify this fundamental right of each individual. Justifying the benefits of digitizing everything is not enough reason to renounce inalienable rights that protect us from digital totalitarianism.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/privacidad-y-covid-19/">Privacy and COVID-19</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large is-resized"><img loading="lazy" src="https://yagohansen.com/wp-content/uploads/200309-D-HN545-003-1024x576.jpg" alt="Covid-19 coronavirus" class="wp-image-4228" width="993" height="557" srcset="https://yagohansen.com/wp-content/uploads/200309-D-HN545-003-300x169.jpg 300w, https://yagohansen.com/wp-content/uploads/200309-D-HN545-003-768x432.jpg 768w" sizes="(max-width: 993px) 100vw, 993px" /><figcaption>Coronavirus Disease 2019 Rotator Graphic for af.mil.  (U.S. Air Force Graphic by Rosario &#8220;Charo&#8221; Gutierrez)</figcaption></figure>



<h2>How would you summarize the main keys of the technological solution that they propose.</h2>



<p>One of the most important, most private and most protected types of personal data by fundamental rights, by international laws and by private organizations must always be that of a health nature. A pandemic, which is a threat that we have previously faced, although now in a fully digital era, is not sufficient reason to modify this fundamental right of each individual. Justifying the benefits of digitizing everything is not enough reason to renounce inalienable rights that protect us from digital totalitarianism.</p>



<p>Faced with this type of news, I face the two faces of technology, the one that affects me as an individual and the one that affects me as an expert hacker in cybersecurity.</p>



<p>The one that affects me as a person, obliges me to protect at all times the integrity of private data about any other common interest. The common interest should not be achieved by forcing the renunciation of the fundamental rights of each citizen.</p>



<p>As a hacker, I think that everything must be analyzed, all the information must be verified before deciding to use it as the basis of a project of this size. All sources must be questioned and any project must be thoroughly tested before being published.</p>



<p>Looking at the case as a project that aims to help society in the face of the dangers of COVID-19, I think that it would not benefit us so much to live wondering if any person to whom we have been exposed, is the neighbor of the next door, or the dealer of food delivery, or anyone who passes me in the supermarket … may be infected. It does not seem so useful to me, nor do I think it solves too many health problems, although it will, however, force us to grow in paranoia, hatred or suspicion of others. Has it been studied what this would bring to society at the health or psychological level? What if the app constantly detects a positive when I&#8217;m at home … maybe a neighbor?</p>



<h2>What do you think Google and Apple can contribute if local initiatives such as Singapore or South Korea have not arrived, which have received so much praise?</h2>



<p>First of all, as I indicated earlier, when a project of this size is carried out, we can build on the famous initiatives &#8220;that have been so successful&#8221; in totalitarian countries, as the basis of the virtues for this project. But that means that we now take for &#8220;verified and totally valid information&#8221; the censored information we receive from these countries regarding the benefits of their digital systems in controlling the epidemic.</p>



<p>And now it turns out that this is &#8220;verified information for us&#8221;, when we cannot even confirm in a certain way the number of affected, deceased or the real impact of the digital surveillance data of citizens in the fight against the pandemic within these countries. . Therefore, if the foundations that justify this project fail, the project itself is questionable, especially when it comes from digitally totalitarian countries.</p>



<p>Currently the developers, Apple and Google indicate that the user through an official APP of each government would enter the data of being positive in COVID voluntarily and personally. But the legal, privacy and regulatory framework are constantly changing and who guarantees that this does not change in a while and that the government itself enters this data through the health system from the COVID tests of its hospitals and health centers? Recall that this information about Apple and Google that we handle today was already prepared weeks / months ago by manufacturers and that by chance the Spanish regulatory framework changed days ago preparing for this technology.</p>



<h2>Do you think that it is possible by pulling the bluetooth and not the GPS to offer an effective tracking of these contacts?</h2>



<p>Technically it is. Bluetooth also offers close location technologies that can be related to the GPS of the smart device. We must not forget that it is already geolocated constantly on smartphones by Google and Apple, something that already allows them to constantly obtain the location of any individual. This initiative cannot be valued as something unique and independent. The information obtained can always be added to other sources, such as the real-time geolocation of the devices. If I already have a record of a user&#8217;s location, day after day, hour after hour, minute and minute, second after second … I can contrast, compare this information with any other, such as bluetooth to add data that will allow it soon discourage her. Example: I have a list of anonymous mobile identifiers that have passed by me today. Tomorrow I do the same tour again, I bump into the same or similar people and also collect information from anonymous identifiers. On the third day, I do the same, but he informs me that I have stumbled upon a COVID positive. Logically I can mentally identify who it could be. On a digital level, for large companies such as these, it is even easier to de-anonymize the information, since they have enough information to compare this local database with other more powerful ones, such as geolocation of devices by common places, etc.</p>



<h2>With the information they have published, can it be assumed that the data is really private and not?</h2>



<p>It is difficult to affirm that something determined is private today. Technology indicates that the information stays for fourteen days on each person&#8217;s device, until a positive is entered in the application.</p>



<p>This technology is not a simple application but a major modification to the Bluetooth stack of Google&#8217;s Android and Apple&#8217;s iOS-based operating systems. It is implemented through updates on the phones and not a simple APP that we install, which gives the device full control over what is done, what is collected, what is stored or what is sent. It is a radical change in technology and as such is dangerous.</p>



<p>I have always defended the idea that what today is private, protected or encrypted data does not mean that tomorrow it cannot be converted, through technology or cybercrime, into public and accessible data. A database encrypted with a encryption type of ten years ago can easily be broken today to decrypt and extract your information. Therefore, when handling such private or confidential data, we cannot think from a short-term point of view.</p>



<p>What if another application (such as a gaming APP) accesses the information saved by this protocol and sends it to your cloud, in addition to using your own geolocation of the game to add more data? There would be a risk of data leakage that would have nothing to do with Google or Apple, but that occurs on their devices.</p>



<h2>¿Cuáles son las principales dudas que te genera?</h2>



<p>Moxie Marlinspike, uno de los principales criptógrafos prácticos actuales y desarrolador del sistema de cifrado de Whatsapp afirma que hay graves dudas de seguridad en este planteamiento. Se podría, desde atacar al sistema generando falsa información, denegar el servicio impidiendo que funcione correctamente, o generar falsos positivos impidiendo que los datos sean fiables y útiles .</p>



<p>Personalmente dudo de las bondades de este sistema, además de la seguridad del mismo en su aplicación real. Además este tipo de tecnologías son muy &#8220;fáciles&#8221; de implementar pero resultan, por experiencia, difíciles de desimplementar. Si de verdad es una solución provisional para este caso de alarma, se debería dejar claro que se desimplentará definitivamente tras la alarma.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/privacidad-y-covid-19/">Privacy and COVID-19</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hello world!</title>
		<link>https://yagohansen.com/hello-world/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Tue, 17 Mar 2020 17:01:30 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[hello]]></category>
		<category><![CDATA[world]]></category>
		<guid isPermaLink="false">https://yagohansen.com/?p=1</guid>

					<description><![CDATA[<p>This is my first post inside yagohansen.com blog. I wish to thank you to visit my personal website and to show interest in my profile and career. I decided to create this profile website because I really don&#8217;t feel so comfortable with social networks, even using professional ones like LinkedIn or Twitter. It seems a&#8230;</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/hello-world/">Hello world!</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" width="514" height="566" src="https://yagohansen.com/wp-content/uploads/logo-capucha-V8-diario-de-un-hacker-en-negro.png" alt="" class="wp-image-4424" srcset="https://yagohansen.com/wp-content/uploads/logo-capucha-V8-diario-de-un-hacker-en-negro.png 514w, https://yagohansen.com/wp-content/uploads/logo-capucha-V8-diario-de-un-hacker-en-negro-272x300.png 272w" sizes="(max-width: 514px) 100vw, 514px" /></figure></div>



<p>This is my first post inside yagohansen.com blog. I wish to thank you to visit my personal website and to show interest in my profile and career. I decided to create this profile website because I really don&#8217;t feel so comfortable with social networks, even using professional ones like LinkedIn or Twitter. It seems a better chance to me to create my own space where I can handle the most important events, experiences, facts, opinions, etc. I will try to keep it updated with all the new stuff I will do in my life. </p>



<p>Diariodeunhacker.com was a website about hacking and cybersecurity that I created and managed many years ago. As I could not continue with the project because I was too busy, I decided to bring it back to life in some way now.</p>



<p class="has-text-align-center"><strong><em>Thank you again, and have a good day!</em></strong></p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" src="https://yagohansen.com/wp-content/uploads/dH-negro.png" alt="" class="wp-image-4401" width="114" height="128" srcset="https://yagohansen.com/wp-content/uploads/dH-negro.png 664w, https://yagohansen.com/wp-content/uploads/dH-negro-267x300.png 267w" sizes="(max-width: 114px) 100vw, 114px" /></figure></div>
<p>The post <a rel="nofollow" href="https://yagohansen.com/hello-world/">Hello world!</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
