Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
Tag Archives | system

Data Roles

This post summarizes the roles involved in managing data in IT systems, according to USA’s NIST SP 800-18 Rev. 1 “Guide for Developing Security Plans for Federal Information Systems” or European Union’s General Data Protection Regulation (GDPR). This data roles are questioned in CISSP exam, corresponding to CISSP Domain 2.   Data Roles The roles […]

Comments { 0 }

Linux Sound Servers

This post explain what a sound server is, specifically in a Linux context, and provides a list of Sound Server APIs for Linux.   What is a sound server? A sound server is software that manages the use of and access to audio devices, usually a sound card. It commonly runs as a background process […]

Comments { 0 }

How to design a Software Development Environment

When designing a collaborative software development environment where different people are going to work together, we need to set up a system that allow us to ease their work. This post include a list of  functional elements that should be included in a software development environment in order to optimize the outcome of the team. […]

Comments { 0 }

List of Code Version Control Systems

List of Code Version Control Systems: Git Subversion (SVN) Concurrent Version System (CVS) Azure DevOps Server   List of Code Version Control System Git   Subversion (SVN) By Apache. Concurrent Version System (CVS) Azure DevOps Server Formerly known as Team Foundation Server (TFS). By Microsoft.

Comments { 0 }

How to prepare CISSP Exam

CISSP (Certified Information Systems Security Professional) is a certification granted by the organization ISC2 (International Information System Security Certification Consortium). This post explains how you can prepare the exam to apply for CISSP certification. To find more information about the CISSP certification itself, please check the main post. Frequently Asked Questions (FAQ) about the exam […]

Comments { 0 }

Difference between Wi-Fi Range Extender and Mesh Network

What is a Wi-Fi Range Extender? A Wi-Fi range extender, also know as a Wi-Fi Booster or Wi-Fi repeater, is a device with two Wi-Fi radios that connects to a network while it rebroadcast what it receives. What is a Wi-Fi Mesh Network? A Wi-Fi mesh network, also know as mesh Wi-Fi system, is a […]

Comments { 0 }

Fingerprint Recognition

Fingerprint recognition needs to steps: Fingerprint registration Fingerprint authentication During fingerprint registration, the fingerprint image(s) are converted into what is called Fingerprints Minutiae Data (FMD). FMD is saved into the database, not the fingerprint image itself. During fingerprint authentication, fingerprint image is converted into FMD. Aftewards, the registered FMD and the recently obtained FMD are […]

Comments { 0 }

Tools to Search Default Passwords

Online Tools to Search Default Passwords

Comments { 0 }

Tools to determine the Operating System of a Website

Tools to determine the Operating System of a website Netcraft   SHODAN Search Engine Source Censys

Comments { 0 }

List of Intrusion Detection System Tools

IDS is the acronym of Intrusion Detection System Tools. List of IDS tools: snort TippingPoint AlienVault OSSIM Check Point IPS Software Blade ( IBM Security Network Intrusion Prevention System ( AlienVault Unified Security Management ( Cyberoam Intrusion Prevention System ( McAfee Host Intrusion Prevention for Desktops ( Next-Generation Intrusion Prevention System (NGIPS) ( FortiGate IPS […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional