FOSS 3D Computer Graphics Tools

This post features free and open-source (FOSS) 3D computer graphics tools. List of FOSS 3D Computer Graphics Tools FOSS 3D computer graphics tools featured on this post: Blender Blender is released under a GPLv2-or-later license. Official website

Common Criteria

ISO/IEC 15408, also known as Common Criteria for Information Technology Security Evaluation, Common Criteria or CC, is an international standard for testing and confirming the system security. Common Criteria supersedes the American TCSEC (Trusted Computer System Evaluation Criteria) or Orange…

Honeypot

A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. A honeynet is a network set up with intentional vulnerabilities hosted on a decoy server to attract…

IoT Search Engines

This post features search engines for devices of the Internet of Things (IoT) List of IoT Search Engines IoT search engines featured on this post: Shodan Shodan is probably the most known IoT search engine. Official link FOFA FOFA is…

Single Sign-On

Single Sign-on (SSO) allows a user to access multiple applications with a single set of credentials. SSO Implementations SSO implementations: Kerberos Kerberos is both a SSO implementation and a AAA network protocol. You can read more about Kerberos on this…

Node.js Framework

Node.js is a back-end web development framework written in the programming language JavaScript. It allows to create server-side web applications in JavaScript. Take into account that JavaScript was a programming language intended initially for the client side, so JavaScript back-end…

Proxy Server

A proxy server is a variation of an application-level firewall or circuit-level firewall. It is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Possible proxy features: Proxy Server…

How to create a Chrome Extension

This post explains how to create an extension or add-on for Chrome or Chromium. Overview of Chrome Extension Creation Main steps to create a Chrome Extension: Developing a Chrome Extension This section explains how to develop a Chrome extension. Components…

Firewall

This post is an introduction to network firewalls (FW). Firewalls should be complemented with other controls like antivirus scanners, data loss prevention (DLP) solutions and intrusion detection system (IDS) tools. Types of Firewall Firewall classification criteria: Types of Firewall by…