Author Archives: Admin

iSpy, Tool for camera surveillance

iSpy is great alternative for monitoring several cameras at the same time with one computer. It has good set of features, like automatic record after motion detection etc.

Posted in Anvanced Tools, Recommended Free Tools, Security Products and Solutions | 1 Comment

TTSReader, tool for reading text aloud (text-to speech)

There are several tools, like TTSReader, which can be used to read text aloud. Good in TTSReader: Can change voice including other languages Can change speed and pitch Can save speech as wav or mp3 file Unfortunately it is difficult … Continue reading

Posted in Basic Tools, Recommended Free Tools | Comments Off on TTSReader, tool for reading text aloud (text-to speech)

Piano basics, parts, how it works, how to find middle C and frequencies of the notes

www.teach-me-piano.com has good basic information about pianos. Here below are links to look at. Parts of piano Piano Action How to find middle C Fingering   Another site, http://www.ptg.org has good sources as well Great video on how piano keys … Continue reading

Posted in Piano | Comments Off on Piano basics, parts, how it works, how to find middle C and frequencies of the notes

Common Criteria, main links

Wikipedia: Common Criteria is a framework in which computer system users can specify their security functional and assurance requirements, vendors can then implement and/or make claims about the security attributes of their products, and testing laboratories can evaluate the products … Continue reading

Posted in ISO, Security Certifications, Security Standardization and Practises, Security Training, Awareness and Reports | Comments Off on Common Criteria, main links

BSIMM3, Security Maturity and Software Development

BSIMM3 is model tool to compare your maturity against the industry average (earth), see figure below. BSIMM = The Building Security In Maturity Model 42 companies has particpated on this BSIMM project. Some of the company names are public: Adobe, … Continue reading

Posted in ICT News, Security Standardization and Practises | Comments Off on BSIMM3, Security Maturity and Software Development

Asmonia Project, addressing security in Mobile Networks

ASMONIA Project is an interesting approach to address security in Mobile Networks. For persons working on the field, it is worth to look on this material. ASMONIA = Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative … Continue reading

Posted in ICT News, Security Standardization and Practises, Telecom Security | Comments Off on Asmonia Project, addressing security in Mobile Networks

Chords and fingering, and example set

For each chord, there exist alternative ways to play them. In some cases, one can play inversions instead of the normal chord. I use inversions in order to fit my fingers more comfortably on the keyboard. For more about Chords … Continue reading

Posted in Piano | Comments Off on Chords and fingering, and example set