Author Archives: Admin

Second test, trying to use hand-cranked dc motor to charge USB devices (3 Watts working!)

Finally some good news and results. With a 12V DC motor, when used as a generator, it is possible to deliver close to 3.5 W for charging an android phone! This is a continuation to the previous blog. Working setup … Continue reading

Posted in DIY, For Fun or Interest, Gadgets, Hobbies and Other Interests, Tests, Tips | Comments Off on Second test, trying to use hand-cranked dc motor to charge USB devices (3 Watts working!)

First test, trying to use hand-cranked dc motor to charge USB devices

Background I tried one hand power cell phone emergency charger with disappointing results. The device is very small, and it comes with a promizing USB connector. But when trying to charge either a USB power bank or mobile phone, it … Continue reading

Posted in DIY, For Fun or Interest, Gadgets, Hobbies and Other Interests, Tests, Tips | Comments Off on First test, trying to use hand-cranked dc motor to charge USB devices

Sandboxie, for improved protection of your internet browsing sessions

Antivirus and firewall on your home computer are not protecting you from all malware. Depending on your browsing habits, and which kind of downloads you are doing, and from where, you also would benefit from VPN, network firewall and sandboxing. … Continue reading

Posted in Basic Tools, Protection, Tips, Tools | Comments Off on Sandboxie, for improved protection of your internet browsing sessions

Recommended Book: The Complete Book of Data Anonymization

I was getting started to search for information about data anonymization and preparing to took a time to do “yet another internet search” for information sources; until I happened to find this book. I was positively surprised that it did … Continue reading

Posted in Books, Cloud Security, Cybersecurity, ICT, ICT Books, Security Management, Security Standardization and Practises, Security Terminology | Comments Off on Recommended Book: The Complete Book of Data Anonymization

Cloud Security Spotlight Report (survey)

Yet another survey results are available in the “2016 Cloud Security Spotlight Report” and is interesting reading. slides webinar Example Applications Q: Which of the following cloud applications are deployed or will be deployed in your organization? Example Authentication Q: … Continue reading

Posted in Cloud Security, ICT Leadership and Management, Security Management | Comments Off on Cloud Security Spotlight Report (survey)

Reference sources for privacy laws

There are at least 3 freely available books that provide information about privacy laws in different countries. These are good references in pdf format. Baker & McKenzie’s Global Privacy Handbook (800p) (online version) see also related online tool Global Privacy … Continue reading

Posted in ICT Regulation, Privacy, Security Training, Awareness and Reports | Comments Off on Reference sources for privacy laws

Reusing motorcycle intercom headset with android phone

This is about reusing an old wire based motorcycle intercom headset with android mobile. With intercom app in android, and with bluetooth, it is possible to use it for intercom between android phones, or even use it for phone calls. … Continue reading

Posted in Android, Audio and Video, DIY, For Fun or Interest, Hobbies and Other Interests, Tests, Tips | Comments Off on Reusing motorcycle intercom headset with android phone