RAM Capture Tools
This post summarize some tools for RAM capture. List of RAM Capture Tools List of RAM Capture Tools: MAGNET RAM Capture Official web Belkasoft RAM Capture Official web
This post summarize some tools for RAM capture. List of RAM Capture Tools List of RAM Capture Tools: MAGNET RAM Capture Official web Belkasoft RAM Capture Official web
Trust-Formation Officer (TFO) is a cybersecurity certification aimed to Spanish-speaking CISOs (Chief Information Security Officers), issued by Spanish non-profit association ISMS Forum Spain. This post tries to cover some aspects regarding the TFO certification. It covers the first cycle of…
This post lists some tools to make low level copies of disks. List of Tools to make low-level Copies of Disks List of tools to make low-level copies of disks. RawCopy64.exe Tools to make copies of NTFS disks. Official web
This post gives a general and brief overview about IT security and cybersecurity. It also links to other posts within this blog where the information is expanded. Definitions of Information Security and Cybersecurity Information security is in charge of the…
Data protection is a fundamental right according to article 8 of the EU Charter of Fundamental Rights and the Convention 108. General Data Protection Regulation (GDPR) is a regulation issued by European Union and that must be followed by services…
This post lists some of the main 8-bit microprocessors that appeared on the market in the 1970’s. List of 8-bit Microprocessors Intel 8080 Intel 8080 was released in April 1974. Motorola 6800 Motorola 6800 was released in 1974. It was…
This post summarizes some relevant IT risk analysis and management frameworks or methodologies. Please do not confuse them with risk analysis methodologies. List IT of Risk Management frameworks List of IT risk analysis frameworks: ISO/IEC 27005 The title of ISO/IEC…
This post tries to give an overview of home computers during the 1980s decade, focusing on 8-bit home computers. Overview of early Home Computers Home computers emerged in the late 1970s. They were microcomputers aimed for the home market, in…
IT vulnerability assessment or vulnerability management is a branch of IT security. It is concerned with identifying, assessing, and addressing vulnerabilities in computer systems and software. This post reviews some aspects regarding IT vulnerabilities. You can read a more general…
This post gives some hints about how to erase a storage device securely. That means that data that was stored in the past on that device cannot be retrieved by any mean. Deletion Types Erasing is the deletion of files…