Types of Bluetooth Attacks
This post summarizes types of attacks through bluetooth. List of Bluetooth Attacks List of Bluetooth Attacks:
This post summarizes types of attacks through bluetooth. List of Bluetooth Attacks List of Bluetooth Attacks:
Android is an open source operating system aimed for portable devices, but also present in desktop devices. Its kernel is a modified version of Linux kernel. This post is an introduction to the operating system. Explaining Android Android is developed…
This post summarizes gateway protocols or routing protocols on computer networks. All of them are within OSI layer 3. List of Network Routing Protocols Overall list of network routing protocols: The two main categories of network routing protocols are: Interior…
This post summarizes some cryptographic standards and guidelines. List of Cryptographic Standards and Guidelines Cryptographic Standards and Guidelines featured on this post: NIST’s Cryptographic Standards and Guidelines ENISA’s Recommended Cryptographic Measures CCN’s CCN-STIC 807 “Criptología de empleo en…
This post summarizes some websites for crowdfunding. List of Crowdfunding Websites Crowfunding websites: Kickstarter Kickstarter is a project from Spain. Official website Verkami Verkami is a project from Spain. Official website Gamefound Crowdfunding website specialized in video games. Official website
Rust is an emerging programming language that focuses on performance. It is free and open-source (FOSS) under an MIT and Apache 2.0 dual-license. It was created by software developer Graydon Hoare while he was working at Mozilla, and it was…
This post summarizes some chatbots for Artificial Intelligence or AI generative tools. List of Artificial Intelligence Chatbots List of Artificial Intelligence Chatbots: OpenAI ChatGPT ChatGPT, developed by American company OpenAI, it is open worldwide to the general public. Official website…
Green cloud and green data centers is the concept of optimizing a cloud or data centers to reduce to an optimal level the environmental impact of cloud and data center technologies. This post covers some aspects regarding green cloud and…
Software is the intangible side of computers. It includes programs and data. Software development is the process of creating and deploying software. This post covers some aspects of software development. It is somehow an index to other posts in the…
This post lists OT security certifications that can be achieved by professionals, i.e. people, not organizations. List of OT Security Certifications for Professionals OT security certifications featured on this post: ISA’s ISA/IEC 62443 Cybersecurity Certificate Program ISA/IEC 62443 Cybersecurity Certificate…