This post summarizes the roles involved in managing data in IT systems, according to USA’s NIST SP 800-18 Rev. 1 “Guide for Developing Security Plans for Federal Information Systems” or European Union’s General Data Protection Regulation (GDPR). This data roles are questioned in CISSP exam, corresponding to CISSP Domain 2. Data Roles The roles […]
Linux Sound Servers
This post explain what a sound server is, specifically in a Linux context, and provides a list of Sound Server APIs for Linux. What is a sound server? A sound server is software that manages the use of and access to audio devices, usually a sound card. It commonly runs as a background process […]
How to design a Software Development Environment
When designing a collaborative software development environment where different people are going to work together, we need to set up a system that allow us to ease their work. This post include a list of functional elements that should be included in a software development environment in order to optimize the outcome of the team. […]
List of Code Version Control Systems
List of Code Version Control Systems: Git Subversion (SVN) Concurrent Version System (CVS) Azure DevOps Server List of Code Version Control System Git https://git-scm.com/ Subversion (SVN) https://subversion.apache.org/ By Apache. Concurrent Version System (CVS) https://www.nongnu.org/cvs/ Azure DevOps Server https://azure.microsoft.com/en-us/services/devops/server/ Formerly known as Team Foundation Server (TFS). By Microsoft.
How to prepare CISSP Exam
CISSP (Certified Information Systems Security Professional) is a certification granted by the organization ISC2 (International Information System Security Certification Consortium). This post explains how you can prepare the exam to apply for CISSP certification. To find more information about the CISSP certification itself, please check the main post. Frequently Asked Questions (FAQ) about the exam […]
Difference between Wi-Fi Range Extender and Mesh Network
What is a Wi-Fi Range Extender? A Wi-Fi range extender, also know as a Wi-Fi Booster or Wi-Fi repeater, is a device with two Wi-Fi radios that connects to a network while it rebroadcast what it receives. What is a Wi-Fi Mesh Network? A Wi-Fi mesh network, also know as mesh Wi-Fi system, is a […]
Fingerprint Recognition
Fingerprint recognition needs to steps: Fingerprint registration Fingerprint authentication During fingerprint registration, the fingerprint image(s) are converted into what is called Fingerprints Minutiae Data (FMD). FMD is saved into the database, not the fingerprint image itself. During fingerprint authentication, fingerprint image is converted into FMD. Aftewards, the registered FMD and the recently obtained FMD are […]
Tools to Search Default Passwords
Online Tools to Search Default Passwords https://www.fortypoundhead.com https://cirt.net http://www.defaultpassword.us http://defaultpasswords.in http://www.routerpasswords.com http://www.defaultpassword.com https://default-password.info
Tools to determine the Operating System of a Website
Tools to determine the Operating System of a website Netcraft https://sitereport.netcraft.com/ SHODAN Search Engine Source https://www.shodan.io Censys https://censys.io/domain
List of Intrusion Detection System Tools
IDS is the acronym of Intrusion Detection System Tools. List of IDS tools: snort TippingPoint AlienVault OSSIM Check Point IPS Software Blade (https://www.checkpoint.com) IBM Security Network Intrusion Prevention System (https://www.ibm.com) AlienVault Unified Security Management (https://www.alienvault.com) Cyberoam Intrusion Prevention System (https://www.cyberoam.com) McAfee Host Intrusion Prevention for Desktops (https://www.mcafee.com) Next-Generation Intrusion Prevention System (NGIPS) (https://www.cisco.com) FortiGate IPS […]