DLL Side-loading Attack
This post explains what is a DLL side-loading attack in the context of IT security. What is a DLL Side-loading Attack? A Dynamic Linked Library (DLL) is a file that is used on Windows systems to group functions. By…
This post explains what is a DLL side-loading attack in the context of IT security. What is a DLL Side-loading Attack? A Dynamic Linked Library (DLL) is a file that is used on Windows systems to group functions. By…
This post explains how to transfer data from an Android smartphone to another Android smartphone. What is the data in a phone that I must backup or transfer? The source of some typical data to be backuped or transfered…
This post explains how to update and install packages in Ubuntu from a terminal. It also explains how to perform a version upgrade. apt-get and apt is the same command. We use apt in this post because is shorter. To…
This post explains what a sound server is, specifically in a Linux context, and provides a list of Sound Server APIs for Linux. What is a Sound Server? A sound server is software that manages the use of and access…
Eclipse is a free and open source IDE (Integrated Development Environment). One of its characteristics is its compatibility with multiple programming languages. Some of them (like Java, C++ or PHP) are integrated by default in Eclipse but other require additional…
This post is about how to convert a computer with vanilla Ubuntu OS installed into a FOSS DAW. The steps will be quite similar for other GNU/Linux distributions, but extra steps may be needed, for example, to allow JACK working…
This post features penetration testing methodologies. Take into account that penetration or IT security testing may be consider a subset of quality assurance. You can read about IT security testing frameworks on this post. You can read about secure software…
This post lists some anonymity networks: Tor / Onionland Freenet I2P ZeroNet Tor / Onionland Tor network is sometimes known colloquially as “onionland” because of the onion routing technology it uses. Official website Freenet Official website I2P Official website ZeroNet…
Press and magazines usually come with a barcode that is located in the last page or back cover of these publications. This post tries to clarify the use of this barcode. Breakdown of Linear Barcodes used in Press ISSN (International…
This post summarizes the most common Virtual Private Network (VPN) protocols. List of VPN Protocols VPN (Virtual Private Network) protocols: RADIUS AAA protocol can also establish a VPN. PPTP Deprecated Point to Point Tunneling Protocol (PPTP) is a legacy solution,…