Author Archives: Admin

Raspberry Pi as security device, first look on IPFire

Raspberry Pi is an interesting candidate for a low cost, low power, small and open source based security device to be used at small office or at home office (SOHO), or for protecting your home automation… However, some preconcerns were … Continue reading

Posted in Anvanced Tools, DIY, Gadgets, Network Monitoring, Protection, Raspberry Pi, Recommended Free Tools, Security Products and Solutions, Tests, Tips | Comments Off on Raspberry Pi as security device, first look on IPFire

Synergy, tool for sharing keyboard and mouse over network

Synergy is an open source tool for using one keyboard and mouse for 2 (or more) computers over the network. Usage is simple, just move mouse from one screen into another. Clipboard is supported. In the figure above, desktop with … Continue reading

Posted in Anvanced Tools, Recommended Free Tools, Tools | Comments Off on Synergy, tool for sharing keyboard and mouse over network

Is IP address personal data? (from criminal law point of view)

CoE (Council of Europe) Cybercrime has pubslihed a report called “Rules on obtaining subscriber information“, where questionnaire responses from different countries has been published. Some of the questions are: Question 1: Is the term “IP address” defined for criminal law … Continue reading

Posted in ICT Regulation, Security Management | Comments Off on Is IP address personal data? (from criminal law point of view)

gImageReader, OCR tool for capturing text from scanned images

gImageReader can recognize text from scanned documents or books. The OCR (Optical character recognition) used is based on tesseract-ocr engine. It is free and open source. There also exist a portable version for PortableApps. Wikipedia: Optical character recognition (OCR) is … Continue reading

Posted in Basic Tools, Recommended Free Tools, Tools | Comments Off on gImageReader, OCR tool for capturing text from scanned images

Recommended Book: Cybersecurity for executives

A new book from 2014 “Cybersecurity for Executives: A Practical Guide” is a great book, and definitely worth for reading for persons working on the security management, or as the title says, for executives. Title: Cybersecurity for executives Author : … Continue reading

Posted in ICT Books, ICT Leadership and Management, Security Management | Comments Off on Recommended Book: Cybersecurity for executives

Ditto, tool for pasting unformatted text

MS Windows does not have a keyboard shortcut for copy pasting text only. In the long run it can be very tedious copy-pasting process when creating presentations or writing documents. Ditto (open source) is a good alternative for this. It … Continue reading

Posted in Basic Tools, Recommended Free Tools, Tips, Tools | Comments Off on Ditto, tool for pasting unformatted text

2 Reports on Cybercrime

EC3 (European Cybercrime Centre at Europol) has published a good report on the cybercrime, worth to take a look. The other report by McAfee complements with estimations of the costs. Definitions TechTarget: Cybercrime is a term for any illegal activity … Continue reading

Posted in Security, Security Management, Security Training, Awareness and Reports | Comments Off on 2 Reports on Cybercrime