Pablo Gallardo

Pablo Gallardo

Cybersecurity and IT professional. Find more info at pmgallardo.com

Disk Partition Tables

A partition table or partition scheme is a resource that allocates all partitions within the system. Type of partition table: MBR Master Boot Record (MBR) is older than GPT. GPT Each partition within a GUID Partition Table (GPT) uses a…

Python Development

This post introduces to some aspects of Python development. Python Programming Language Python applications are developed using Python programming language. You can find more information about Python programming language on this post. Integrated Development Environments (IDEs) for Python It is…

Open Content Licenses

This post introduces to free, libre or open content licenses. The term “content” is used to refer to the combination of text, images, sound and/or artwork. This post is part of the main post about open licenses. Relationship between Open…

React Web Framework

React is a web front-end framework written in JavaScript (JS) programming language. You can find an introduction to JavaScript on this post. You can find a list of alternative front-end web frameworks on this post. React Components JSX is a…

Introduction to Django

Django is a back-end web framework written in Python. It follows the model-template-view (MTV) architectural pattern. The Model-Template-View Architecture The Model-Template-View (MTV) architecture separates logically the definitions of a project in the following components: Django apps follows the MTV architecture.…

Source Code Editors

This post lists some source code editors for software development or coding. What is the Difference between a Source Code Editor and an IDE? An Integrated Development Environment (IDE) offers tools to create software projects considering all operative aspects (code,…

Access Control Models

This post summarizes access control models, as considered in cybersecurity and access control. Acccess Control Concepts Permission refers to the access granted for an object and determine what you can do with it. Right refers to the ability to take…

AAA Network Protocols

This post summarizes Authentication, Authorization and Accountability (AAA) protocols or AAA network protocols. Do not confuse the AAA protocols with the authentication protocols like EAP, CHAP and PAP. Authentication protocols works in the OSI layers 2 and 3, and AAA…