Tag it

IPSec

Internet Protocol Security (IPSec) is a standard of IP security extensions that comprises a collection of protocols and that is used as an add-on for IPv4 and integrated into IPv6. Each IPsec VPN uses two security associations, one for encrypted…

Document Store Database

Document store database are NoSQL databases. List of Document Store Databases Document stores are specifically designed to handle JSON-like documents. Document store solutions: Apache CouchDB Apache CouchDB is a document store database. It is FOSS, under an Apache 2.0 license.…

Contributor License Agreement

A contributor license agreement (CLA), sometimes called participation agreement, is a document that defines the terms under which intellectual property has been contributed to a project or organization. CLAs are typically used on FOSS projects. Reasons to use a CLA…

FOSS 3D Computer Graphics Tools

This post features free and open-source (FOSS) 3D computer graphics tools. List of FOSS 3D Computer Graphics Tools FOSS 3D computer graphics tools featured on this post: Blender Blender is released under a GPLv2-or-later license. Official website

Node.js Runtime Environment

Node.js is a runtime environment for the programming language JavaScript. It allows to run code within an OS, without the need of a browser. It is asynchronous and event-driven. It is mandatory to use an application like Node.js for back-end…

How to create a Chrome Extension

This post explains how to create an extension or add-on for Chrome or Chromium. Overview of Chrome Extension Creation Main steps to create a Chrome Extension: Developing a Chrome Extension This section explains how to develop a Chrome extension. Components…

Firewall

This post is an introduction to network firewalls (FW). Firewalls should be complemented with other controls like antivirus scanners, data loss prevention (DLP) solutions and intrusion detection system (IDS) tools. Types of Firewall Firewall classification criteria: Types of Firewall by…

Information Security Policy Frameworks

This post provides resources to create Information Security policies, standards, procedures and guidelines. Documenting IT Security Policy Frameworks IT Security Policy Framework Document Types IT security policy framework documents: Policy Policies would be like the constitution, while procedures are the…