SlideShare una empresa de Scribd logo
1 de 10
monitor
PLACA BASE
C.P.U
MEMORIA RAM
TARJETA DE EXPANSION
FUENTE DE
ALIMENTACION
UNIDAD DE DISCO OPTICO
DISCO DURO
TECLADO
RATON/MOUSE

Más contenido relacionado

Destacado

Google, apple, and microsoft struggle for your internet experience
Google, apple, and microsoft struggle for your internet experienceGoogle, apple, and microsoft struggle for your internet experience
Google, apple, and microsoft struggle for your internet experienceAnirudhya Reevu
 
Low Radiation Dose effect of Tomotherapy for Hepatocellular Carcinoma
Low Radiation Dose effect of Tomotherapy for Hepatocellular CarcinomaLow Radiation Dose effect of Tomotherapy for Hepatocellular Carcinoma
Low Radiation Dose effect of Tomotherapy for Hepatocellular Carcinomaaccurayexchange
 
A Stealthy Stealers - Spyware Toolkit and What They Do
A Stealthy Stealers - Spyware Toolkit and What They DoA Stealthy Stealers - Spyware Toolkit and What They Do
A Stealthy Stealers - Spyware Toolkit and What They Dosanghwan ahn
 
How to find_vulnerability_in_software
How to find_vulnerability_in_softwareHow to find_vulnerability_in_software
How to find_vulnerability_in_softwaresanghwan ahn
 
System Hacking Tutorial #2 - Buffer Overflow - Overwrite EIP
System Hacking Tutorial #2 - Buffer Overflow - Overwrite EIPSystem Hacking Tutorial #2 - Buffer Overflow - Overwrite EIP
System Hacking Tutorial #2 - Buffer Overflow - Overwrite EIPsanghwan ahn
 
System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...
System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...
System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...sanghwan ahn
 
System Hacking Tutorial #4 - Buffer Overflow - Return Oriented Programming ak...
System Hacking Tutorial #4 - Buffer Overflow - Return Oriented Programming ak...System Hacking Tutorial #4 - Buffer Overflow - Return Oriented Programming ak...
System Hacking Tutorial #4 - Buffer Overflow - Return Oriented Programming ak...sanghwan ahn
 
System Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
System Hacking Tutorial #3 - Buffer Overflow - Egg HuntingSystem Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
System Hacking Tutorial #3 - Buffer Overflow - Egg Huntingsanghwan ahn
 

Destacado (9)

Research Discussion
Research DiscussionResearch Discussion
Research Discussion
 
Google, apple, and microsoft struggle for your internet experience
Google, apple, and microsoft struggle for your internet experienceGoogle, apple, and microsoft struggle for your internet experience
Google, apple, and microsoft struggle for your internet experience
 
Low Radiation Dose effect of Tomotherapy for Hepatocellular Carcinoma
Low Radiation Dose effect of Tomotherapy for Hepatocellular CarcinomaLow Radiation Dose effect of Tomotherapy for Hepatocellular Carcinoma
Low Radiation Dose effect of Tomotherapy for Hepatocellular Carcinoma
 
A Stealthy Stealers - Spyware Toolkit and What They Do
A Stealthy Stealers - Spyware Toolkit and What They DoA Stealthy Stealers - Spyware Toolkit and What They Do
A Stealthy Stealers - Spyware Toolkit and What They Do
 
How to find_vulnerability_in_software
How to find_vulnerability_in_softwareHow to find_vulnerability_in_software
How to find_vulnerability_in_software
 
System Hacking Tutorial #2 - Buffer Overflow - Overwrite EIP
System Hacking Tutorial #2 - Buffer Overflow - Overwrite EIPSystem Hacking Tutorial #2 - Buffer Overflow - Overwrite EIP
System Hacking Tutorial #2 - Buffer Overflow - Overwrite EIP
 
System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...
System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...
System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...
 
System Hacking Tutorial #4 - Buffer Overflow - Return Oriented Programming ak...
System Hacking Tutorial #4 - Buffer Overflow - Return Oriented Programming ak...System Hacking Tutorial #4 - Buffer Overflow - Return Oriented Programming ak...
System Hacking Tutorial #4 - Buffer Overflow - Return Oriented Programming ak...
 
System Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
System Hacking Tutorial #3 - Buffer Overflow - Egg HuntingSystem Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
System Hacking Tutorial #3 - Buffer Overflow - Egg Hunting