Linux Sound Systems and Servers
This post explains what a sound server is, specifically in a Linux context, and provides a list of Sound Server APIs for Linux. What is a Sound Server? A sound server is software that manages the use of and access…
This post explains what a sound server is, specifically in a Linux context, and provides a list of Sound Server APIs for Linux. What is a Sound Server? A sound server is software that manages the use of and access…
Eclipse is a free and open source IDE (Integrated Development Environment). One of its characteristics is its compatibility with multiple programming languages. Some of them (like Java, C++ or PHP) are integrated by default in Eclipse but other require additional…
This post is about how to convert a computer with vanilla Ubuntu OS installed into a FOSS DAW. The steps will be quite similar for other GNU/Linux distributions, but extra steps may be needed, for example, to allow JACK working…
This post features penetration testing methodologies. Take into account that penetration or IT security testing may be consider a subset of quality assurance. You can read about IT security testing frameworks on this post. You can read about secure software…
This post lists some anonymity networks: Tor / Onionland Freenet I2P ZeroNet Tor / Onionland Tor network is sometimes known colloquially as “onionland” because of the onion routing technology it uses. Official website Freenet Official website I2P Official website ZeroNet…
Press and magazines usually come with a barcode that is located in the last page or back cover of these publications. This post tries to clarify the use of this barcode. Breakdown of Linear Barcodes used in Press ISSN (International…
This post summarizes the most common Virtual Private Network (VPN) protocols. List of VPN Protocols VPN (Virtual Private Network) protocols: RADIUS AAA protocol can also establish a VPN. PPTP Deprecated Point to Point Tunneling Protocol (PPTP) is a legacy solution,…
ISO/IEC 27001 is an international standard to implement an ISMS in an organizations. It is issued jointly by International Organization for Standarization (ISO) and International Electrotechnical Commission (IEC). Professionals that want to get the knowledge to implement ISO/IEC 27001 and be…
This post lists some professional certifications for administration of Windows operating systems. List of certifications for Windows administration: Microsoft Certified: Security Operations Analyst GIAC’s GCWN Microsoft 365 Certified: Security Administrator Associate Microsoft 365 Certified: Modern Desktop Administration Associate List of…
CISSP-ISSAP (Information Systems Security Architecture Professional) is a certification issued by (ISC)2. CISSP (Certified Information Systems Security Professional) is another certification issued by (ISC)2 that is a pre-requirement for CISSP-ISSAP. A certification that requires CISSP as a pre-requirement is called…