Tag computer

IT Threat Intelligence

This post explores some aspects of threat intelligence in the context of IT security. Concepts related to IT Threat Intelligence Tactics, techniques and procedures are commonly referred as TTPs. IT Thread Modelling Thread modelling is a process by which potential…

Introduction to C++

This post is an introduction to C++. C++ is an adaptation of C to the object-oriented paradigm. It was originally developed by Bjarne Stroustrup. C++ Versions and Standards There are different standard versions of C++. Each version is standardized through…

How to identify a Computer Font

This post provides resources to identify the name of a computer font given a text with a specific typeface. Webs for Font Identification List of webs for font identification: Identifont Whatfontis The Font Finder service is included in Whatfontis…

Software

Software is a collection of programs and data that tell a computer how to perform specific tasks. Software is a term that opposes to hardware, from which the system is built and which actually performs the work. You can read…

How to compress PDFs

This post summarizes some ways to compress PDF files. Free methods to compress PDFs Free Online Tools I Love PDF Official website CIB pdf standalone Official website Paid methods to compress PDFs Paid Online Tools Official website Paid Applications Adobe…

Functional Programming Languages

This post discuss about functional programming languages, it means, programming languages that use the functional paradigm. List of Functional Programming Languages Functional programming languages featured on this post: Haskell Haskell is a purely functional programming language, and one of the…

Cloud Computing

This post is an introduction to the concept of cloud on IT. Cloud Essential Characteristics Cloud essential characteristics: Multitenant is considered within Resource Pooling according to NIST SP 800-145, while ISO/IEC 22123 considers it a different characteristic. Cloud Logical Model…

Cloud Security

This post covers some aspects of information security related to cloud services. Cloud Security Components On this section you can find different components that are relevant to cloud security. A Cloud Access Security Broker (CASB) scans the security between on-premise…