Pablo Gallardo

Pablo Gallardo

Cybersecurity and IT professional. Find more info at pmgallardo.com

Network Access Control

Network Access Control (NAC) is a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk. NAC’s posturing capability determines if a system is sufficiently secure and compliant enough to connect to a…

Linux Desktop Environments

This post summarizes the main free and open-source (FOSS) desktop environments for Unix-like and Linux OSs. List of Linux Desktop Environments List of Linux desktop environments: The most popular are KDE Plasma and GNOME. Common Desktop Environment (CDE) Common Desktop…

Email Protocols

This post presents some aspects related to electronic mail (email or e-mail) protocols. Email Operational Protocols POP3 Post Office Protocol 3 (POP3) is considered deprecated. IMAP Internet message access protocol (IMAP) SMTP An open relay is an insecure SMTP server…

OSI Model Transport Layer Protocols

This post summarizes transport layer protocols. List of Transport Layer Protocols Transport Layer Protocols: TCP and UDP are the main transport protocols of the TCP/IP framework. You can find a list of popular TCP and UDP ports on this post.…

Free Art for Video Games

Take into account that while it may be free as in “gratis”, its use may be restricted by its license. For example, a CC-by is free of use, but if you use this artwork you need to explicitly specify the…

Android OS

Android is an open source operating system aimed for portable devices, but also present in desktop devices. Its kernel is a modified version of Linux kernel. Android was first released in 2008. This post is an introduction to the operating…

Network Routing Protocols

This post summarizes gateway protocols or routing protocols on computer networks. All of them are within OSI layer 3. List of Network Routing Protocols Overall list of network routing protocols: The two main categories of network routing protocols are: Interior…

Cryptographic Standards and Guidelines

This post summarizes some cryptographic standards and guidelines. List of Cryptographic Standards and Guidelines Cryptographic Standards and Guidelines featured on this post: NIST’s Cryptographic Standards and Guidelines ENISA’s Recommended Cryptographic Measures CCN’s CCN-STIC 807 “Criptología de empleo en…