Author Archives: Admin
Raspberry Pi camera and telescope, first tests
I got B+ model of the Raspberry Pi as christmas gift. Then I saw the size of the camera module, and I just had to go and buy one. I have been testing different webcam and digital camera setups with … Continue reading
Bandwidth Manager, tool for limiting bandwidth on a computer at home
SoftPerfect Bandwidth Manager is good basic tool for sharing the internet connection by limiting the bandwidth on different computers. In the example below (Lite edition), download bandwidth limit is set to 20Mb/s and upload limit is 2Mb/s. (For some reason … Continue reading
Balabolka and Microsoft Speech Platform, way for multilanguage TTS (text-to-speech)
Most of the TTS tools on MS Windows support SAPI 5 (SAPI=Microsoft Speech API). In a previous blog, eSpeak and TTSReader were introduced as an alternatives for non-english languages. The good news is that the free tool called Balabolka also … Continue reading
PingInfoView, tool for monitoring network latency (ping)
There are several free tools for monitoring availability of multiple computers. However, it is surprisingly difficult to find a tool with the source code available. (For other needs, please look the discussion forums of your preferred programming language, there are … Continue reading
Guidelines for “Assessing Cyber Security Export Risks”, by TechUK
TechUK has published document “Assessing Cyber Security Export Risks“, which is great effort addressing the business ethics aspects. Institute for Human Rights and Business (IHRB) has been involved as well. The coverage is good, content is straight to the point, … Continue reading
Annual Global Security Report, by Trustwave
Trustwave is maintaining the annual report on their Global Security Report page. The content of the 2014 report is well presented and structured, and easy to read (without heavy and long sentences). Definitely worth to look. One example page is … Continue reading
POS malware, some links to material
Increasing number of attacks has been taken against Point of Sales devices and systems. There are several good overviews and materials on this topic, and those are revealing details of the technics used in these targeted attacks. Main sources PoS … Continue reading