Linear Barcodes used in Press

Press and magazines usually come with a barcode that is located in the last page or back cover of these publications. This post tries to clarify the use of this barcode. Breakdown of Linear Barcodes used in Press ISSN (International…

List of VPN Protocols

This post summarizes the most common Virtual Private Network (VPN) protocols. VPN Protocols VPN (Virtual Private Network) protocols: RADIUS AAA protocol can also establish a VPN. PPTP Deprecated Point to Point Tunneling Protocol (PPTP) is a legacy solution, and it…

Certifications for Windows Security Administration

This post lists some professional certifications for administration of Windows operating systems. List of certifications for Windows administration: Microsoft Certified: Security Operations Analyst GIAC’s GCWN Microsoft 365 Certified: Security Administrator Associate Microsoft 365 Certified: Modern Desktop Administration Associate List of…

How to get CISSP-ISSAP certification

CISSP-ISSAP (Information Systems Security Architecture Professional) is a certification issued by (ISC)2. CISSP (Certified Information Systems Security Professional) is another certification issued by (ISC)2 that is a pre-requirement for CISSP-ISSAP. A certification that requires CISSP as a pre-requirement is called…

How to get GISP Certification

GIAC Information Security Professional (GISP) is an IT certification provided by Global Information Assurance Certification (GIAC), that is linked to training courses provided by SANS. Do not confuse GIAC’s GISP with another certification related to GIS that shares the same…

Search Engines for the deep Web

This post lists some popular portals to search content in the deep web. List of portals to search content in the deep web featured in this post: The Hidden Wiki Torch NotEvil Ahmia OnionLinks DuckDuckGo In order to see content…