Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
Tag Archives | list

Compliance Management Solutions

Compliance management solutions provide templates, assessment tools and other functionalities to help an organization to meet compliance with some of the most popular standards. This post lists some Compliance Management Solutions.   Popular Compliance Standards List of some popular compliance standards: Payment Card Industry Data Security Standard (PCI DSS) International Standard Organizations (ISO) Standards, like […]

Comments { 0 }

Free and open source Video Editors for Linux

This post is a non-exhaustive list of free and open source (FOSS) video editors for Linux. List of free and open source Video Editors for Linux Featured video editors: Pitivi Kdenlive Openshot Flowblade Pitivi It is part of GNOME project. Kdenlive It is part of KDE project. Openshot Shotcut Flowblade […]

Comments { 0 }

Web Search Engines

This post offers a list of popular web search engines. According to Statcounter, as of 2020 Google dominate search engine market with a 82% in desktop computers and 95% on mobile phones. Some initiatives like the lobby FairSearch try to counteract the Google dominance of the market. In case you are looking for a search […]

Comments { 0 }

List of VPN Protocols

This post summarizes the most common VPN (Virtual Private Network) protocols. VPN protocol VPN (Virtual Private Network) protocols: PPTP L2TP SSH OpenVPN IPsec SSTP IKEv2 PPTP Point to Point Tunneling Protocol (PPTP). L2TP Layer Two Tunneling Protocol (L2TP) is an extension of PPTP. SSH You can use Secure Shell (SSH) to set a VPN over […]

Comments { 0 }

ISO/IEC 27001 Lead Implementer Certifications

ISO/IEC 27001 is an international standard to implement an ISMS in an organizations. It is issued jointly by International Organization for Standarization (ISO) and International Electrotechnical Commission (IEC). Professionals that want to get the knowledge to implement ISO/IEC 27001  and be able to prove it to third parties may look for a certification on this subject.This […]

Comments { 0 }

Certifications for Windows Security Administration

This post lists some professional certifications for administration of Windows operating systems. List of certifications for Windows administration: Microsoft Certified: Security Operations Analyst GIAC’s GCWN Microsoft 365 Certified: Security Administrator Associate Microsoft 365 Certified: Modern Desktop Administration Associate List of certifications for Windows Security Microsoft Certified: Security Operations Analyst Certification is “Microsoft Certified: Security Operations […]

Comments { 0 }

List of Software Tracking Applications

There are tools in software development that allow us to track requirements and issues related to an IT system. List of Sofware Tracking Applications Jira Trello Asana Bugzilla Backlog (by Nulab) Trac Microsoft Azure DevOps SAP Focused Build   External References “Eugenio: memorias de un informático“; Roland Durareli (Spanish)

Comments { 0 }

Websites where Spanish FNMT Digital Certificate can be used for Authentication

This is a non-exhaustive list of websites that accept the digital certificate from Spanish Royal Mint (FNMT, from the Spanish Fábrica Nacional de Moneda y Timbre) as a method of authentication.   List of websites where Spanish FNMT Digital Certificate can be used for Authentication Spanish Tax Agency Spanish Tax Agency (Agencia Tributaria, in […]

Comments { 0 }

Free VPN

This post summarizes some Virtual Private Network (VPN) services that are available for free. List of free VPN services List of free VPN services: Linux Fu VPN VPN Gate Tor HideMyAss Free Web Proxy SwitchVPN VyprVPN Linux Fu VPN VPN Gate Tor HideMyAss Free Web Proxy […]

Comments { 0 }

Virus Maker Tools

List of virus maker tools: DELmE’s Batch Virus Generator JPS Virus Maker Tool   List of virus maker tools DELmE’s Batch Virus Generator DELmE’s Batch Virus Generator is a virus creation program with lots of options to infect the victim’s PC such as formatting C: drive, deleting all files in Hard Disk drive, disabling admin […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional