RAM Capture Tools
This post summarize some tools for RAM capture. List of RAM Capture Tools List of RAM Capture Tools: MAGNET RAM Capture Official web Belkasoft RAM Capture Official web
This post summarize some tools for RAM capture. List of RAM Capture Tools List of RAM Capture Tools: MAGNET RAM Capture Official web Belkasoft RAM Capture Official web
This post features some apps on Android to read eBooks List of Android Apps to read eBooks List of Android apps to read ebooks: Aldiko The initial version of Aldiko is no longer available. Current version is Aldiko Next. Aldiko…
Trust-Formation Officer (TFO) is a cybersecurity certification aimed to Spanish-speaking CISOs (Chief Information Security Officers), issued by Spanish non-profit association ISMS Forum Spain. This post tries to cover some aspects regarding the TFO certification. It covers the first cycle of…
Unified Modeling Language (UML) is a modelling language for software engineering. UML has been adopted as a standard by the Object Management Group (OMG) and International Standard Organization (ISO). Object Contraint Language (OCL) defines the rules for model elements. In…
This post lists some tools to make low level copies of disks. List of Tools to make low-level Copies of Disks List of tools to make low-level copies of disks. RawCopy64.exe Tools to make copies of NTFS disks. Official web
Word is a word processing application developed by Microsoft, within the Office suite. Styles are predefined text formats that can be used as default normal text, heading, etc. When you are using Word, and especially when you are using a…
This post gives a general and brief overview about IT security and cybersecurity. It also links to other posts within this blog where the information is expanded. Definitions of Information Security and Cybersecurity Information security is in charge of the…
This post lists some pentesting tools for Credential Harvesting. List of Tools for Credential Harvesting Tools for Credential Harvesting featured on this post. Mimikatz Mimikatz is software that performs leverage the Mimikatz exploit to extract passwords stored in memory on…
Data protection is a fundamental right according to article 8 of the EU Charter of Fundamental Rights and the Convention 108. General Data Protection Regulation (GDPR) is a regulation issued by European Union and that must be followed by services…
Java is both the name of a computer platform installed in a personal computer or server and a cross-platform interpreted programming language Java was originally released in 1995 by Sun Microsystems. In 2010, the company was acquired by the American…