Pablo Gallardo

Pablo Gallardo

Cybersecurity and IT professional. Find more info at pmgallardo.com

Information Technology Taxonomy

This post summarizes taxonomies for information technology, information and communication technology or computer science. List of Information Technology Taxonomy Examples of information technology taxonomy: IEEE Taxonomy There are different versions of IEEE Taxonomy. When this was written, the latest was…

Office 365

Office 365 is a paid cloud service of office tools offered by Microsoft. Microsoft 365 is a broader service that include many Microsoft cloud services, not only Microsoft Office. Office 365 Tools Some tools included in Office 365: Power BI…

Area Networks

The network areas displayed here are sorted by size in ascending order: SAN Storage Area Network (SAN) is a dedicated network for storage devices. You can read this post about SAN. LAN Technologies LAN technologies: WAN Technologies WAN technologies: ATM…

Distributed Network Protocol 3

Distributed Network Protocol 3 (DNP3) is a set of communications protocols used between components in process automation systems. It plays a crucial role in SCADA systems, where it is used by SCADA Master Stations (a.k.a. Control Centers), Remote Terminal Units…

Link Checker Tools

This post feature domain, website or URL checker, inspection tool or scanner. List of Tools Tools: Any.run Any.run official website Check-host.net Check-host.net checks the country of origin of a host or server within the internet.

Penetration Testing

Penetration testing (pentesting) or offensive security is performed by the so-called red teams. A breach and attack simulation (BAS) platform is intended to automate some aspects of penetration testing. These systems are de designed to inject threat indicators on to…

Biometric Authentication

Biometric authentication is any authentication method that is based on human biometrics. Biomterics is part of the type 3 “something you are” of the primary authentication factors. Physiological Biometric Methods Physiological biometric methods featured on this post: Biometric Factor Error…