Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 

How to install Eclipse on Ubuntu

This post explains how to install Eclipse on Ubuntu. Ways to install Eclipse IDE on Ubuntu There are different ways to install Eclipse on Ubuntu: Official package snap Ubuntu Sofware app apt Each of these ways has its drawbacks, so please read all of them. Install Eclipse IDE using official package The process of installing […]

Comments { 0 }

List of Linux Package Managers

This post explains different type of Linux package Managers. List of Linux Package Managers List of Linux packages: apt-get Snapcraft apt-get apt-get is shorten as apt. It appeared in 1998, and it is related to Debian packages. It makes use of .deb packages. A deb package contains only the data for its own application. In […]

Comments { 0 }

Data Centers

A data processing center (DPC) or data center is a building, a dedicated space within a building, or a group of buildings used to house computer systems and associated components, such as telecommunications and storage systems. Data center certifications ANSI TIA-942 is a certification issued by ANSI. You can find more information about this certification […]

Comments { 0 }

Incident Response

CERT is the acronym for Computer Emergency Response Team. Some countries have an international scope: FIRST https://www.first.org/ SEI CERT https://www.sei.cmu.edu/about/divisions/cert/index.cfm Most countries have an official CERT. DKCERT (Denmark) esCERT (Spain) IRIS-CERT (Spain, RedIRIS CERT) https://www.rediris.es/cert/

Comments { 0 }

How to enable or disable Audio Enhancements in Windows 11

Some Windows 11 sound issues are solved by disabling the setting “Audio Enhancement”. This post explains how to enable/disable Sound Enhancements in Windows 11. How to enable or disable Sound Enhancements in Windows 11 In Windows 11, go to System > Sound. Click the audio output device, and then go to “Properties”. Toggle on or […]

Comments { 0 }

How to connect a Windows 10 computer to the Internet through an Android Bluetooth Hotspot

This post explains how to activate bluetooth tethering from an Android device and then connect a Windows 10/11 computer to it. Steps on how to connect a Windows 10 computer to the Internet through an Android Bluetooth Hotspot The main steps are: Activate bluetooth tethering on your Android device Pair your Windows 10 device bluetooth […]

Comments { 0 }

Secure Development Frameworks

This post lists some secure development frameworks. Secure Development Frameworks List of Secure Development Frameworks: Secure Software Development Framework (SSDF) OWASP Security Knowledge Framework (OWASP-SKF) SEI CERT Coding Standards Secure Software Development Framework (SSDF) https://owasp.org/www-project-security-knowledge-framework/ SSDF is issued by NIST. OWASP Security Knowledge Framework (OWASP-SKF) https://owasp.org/www-project-security-knowledge-framework/ OWASP Security Knowledge Framework (OWASP-SKF) is issued by OWASP. […]

Comments { 0 }

Cloud Security for Microsoft 365

This post adds some comments on cloud security for Microsoft 365. Cloud Security for Microsoft 365 Products related to Microsoft 365 security: Microsoft 365 Defender Microsoft Secure Score Microsoft Secure Score Microsoft Secure Score is a Microsoft product that measures the organization’s security posture regarding specific Microsoft 365 products and displays the results on a […]

Comments { 0 }

Microsoft Azure

This post is an introduction to Microsoft Azure. Microsoft Azure Frameworks Microsoft Azure Frameworks: Microsoft Azure Well-Architected Framework Microsoft Cloud Adoption Framework for Azure Microsoft Azure Well-Architected Framework Microsoft Azure Well-Architected Framework is the counterpart of AWS Well-Architected Framework. https://docs.microsoft.com/en-us/azure/architecture/framework/ Microsoft Cloud Adoption Framework for Azure Microsoft Cloud Adoption Framework for Azure provides proven guidance […]

Comments { 0 }

How to perform an IT Risk Assessment

This post tries to make an overview about how to perform a risk assessment of information technology (IT) assets. Steps to perform an IT risk assessment The summary of steps to be done are: Define scope Select a risk assessment methodology Identify asset types Identify threats Identify vulnerabilities List controls Assign controls to threats Identify […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional