XMedia Recode, Tool for converting audio and video files

XMedia Recode is good alternative for converting audio/video file into another format so that it can be played in another device.

Below is an example, where video from camera will be converted for phone format (mp4).

xmedia-recode1

 

The tool contains a lot of features, and one can create new output profiles, or adjust existing ones.

xmedia-recode

Posted in Audio and Video, Basic Tools, Recommended Free Tools | Comments Off on XMedia Recode, Tool for converting audio and video files

iSpy, Tool for camera surveillance

iSpy is great alternative for monitoring several cameras at the same time with one computer.

It has good set of features, like automatic record after motion detection etc.

iSpy

Posted in Anvanced Tools, Recommended Free Tools, Security Products and Solutions | 1 Comment

TTSReader, tool for reading text aloud (text-to speech)

There are several tools, like TTSReader, which can be used to read text aloud.

Good in TTSReader:

  • Can change voice
    • including other languages
  • Can change speed and pitch
  • Can save speech as wav or mp3 file

TTSReader

Unfortunately it is difficult to find good and pleasant human like voices 😉

Human voices

Better quality human voices are commercial products. AT&T provides a demo site for testing different voices.

Other languages

For non-english languages, one could install eSpeak.

Online alternatives

There are some online text-to-speech services. One multilanguage example is here. Just paste your text and listen yourself.

Update 2014: In MS Windows, there is now a Speech Platform, which supports 26 languages. The voice quality is good (as compared with eSpeak). For more information, see blog article.

Posted in Basic Tools, Recommended Free Tools | Comments Off on TTSReader, tool for reading text aloud (text-to speech)

Piano basics, parts, how it works, how to find middle C and frequencies of the notes

www.teach-me-piano.com has good basic information about pianos. Here below are links to look at.

Parts of piano

grandcrosssec

Piano Action

How to find middle C

StaffnKeys

Fingering

 

Another site, http://www.ptg.org has good sources as well

Great video on how piano keys work with hammer! (via http://www.ptg.org)

pdf on how does piano work?

 

more links

video about C chord inversions

Piano diagrams

Video on How piano is made

Virtual Piano Chords, including inversions

Commonly used notation of piano keys, and their related frequencies (logarithmic scale) are available in wikipedia’s pages 1 and 2.

300px-Pitch notation

PianoKeysWithOctavesNumbered

Posted in Piano | Comments Off on Piano basics, parts, how it works, how to find middle C and frequencies of the notes

Common Criteria, main links

Wikipedia: Common Criteria is a framework in which

  • computer system users can specify their security functional and assurance requirements,
  • vendors can then implement and/or make claims about the security attributes of their products, and
  • testing laboratories can evaluate the products to determine if they actually meet the claims.

CommonCriteria

 

Links

  • Documents are available from the main site.
  • To search for certified products, one can start here.
  • List of laboratories is here.
  • Tools used for testing.
  • ISO Standards
  • ISO/IEC 15408-1:2009 Evaluation criteria for IT security — Part 1: Introduction and general model
  • ISO/IEC 15408-2:2008 Evaluation criteria for IT security — Part 2: Security functional components
  • ISO/IEC 15408-3:2008 Evaluation criteria for IT security — Part 3: Security assurance components

EAL

Important concept is Evaluation Assurance Level (EAL):

  • EAL1: Functionally Tested
  • EAL2: Structurally Tested
  • EAL3: Methodically Tested and Checked
  • EAL4: Methodically Designed, Tested, and Reviewed
  • EAL5: Semiformally Designed and Tested
  • EAL6: Semiformally Verified Design and Tested
  • EAL7: Formally Verified Design and Tested

Implementation Cost and effort

The following figure related to costs is taken from wikipedia

Common Criteria evaluation costs

Posted in ISO, Security Certifications, Security Standardization and Practises, Security Training, Awareness and Reports | Comments Off on Common Criteria, main links

BSIMM3, Security Maturity and Software Development

BSIMM3 is model tool to compare your maturity against the industry average (earth), see figure below.

BSIMM = The Building Security In Maturity Model

BSIMM3FakeFirmvsEarth42

42 companies has particpated on this BSIMM project. Some of the company names are public: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Fannie Mae, Fidelity, Google, Intel, Intuit, Mashery, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, SAP, Scripps Networks Interactive, Sony Ericsson, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, Visa, VMware, Wells Fargo, and Zynga.

The 42 companies represent industries as follows:

  • financial services (17)
  • independent software vendors (15)
  • technology firms (10)
  • telecommunications (3)
  • insurance (2)
  • energy (2)
  • media (2)
  • healthcare (1)

 

BSIMM3 describes 109 activities organized in 4 domains and 12 practices.

BSIMM3-practises

Term vBSIMM is used Vendor Control in the BSIMM. It includes five specific activities:

  • Compliance & Policy activity 2.4: Paper all vendor contracts with SLAs compatible with policy.
  • Compliance & Policy activity 3.2: Impose policy on vendors.
  • Standards and Requirements acivity 2.1: Communicate standards to vendors.
  • Standards and Requirements activity 2.5: Create SLA boilerplate.
  • Training 3.2: Provide training for vendors or outsource workers.
Posted in ICT News, Security Standardization and Practises | Comments Off on BSIMM3, Security Maturity and Software Development

Asmonia Project, addressing security in Mobile Networks

ASMONIA Project is an interesting approach to address security in Mobile Networks. For persons working on the field, it is worth to look on this material.

ASMONIA = Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchAnge

asmonia-2

 

What it contains? Well, it can be briefly explained by short extract:

The overall goal of ASMONIA is the development of a holistic security concept for mobile network infrastructures

  • Integrity protection
  • attack detection solutions, including cloud computing system
  • collaborative information exchange mechanisms

The mains tasks of the ASMONIA project are:

  • Risk analysis of mobile networks and end devices
  • Defining holistic and collaborative protection concepts
  • Protecting the integrity of network devices
  • Incorporation of resilient and flexible systems as essential protection components
  • Development of attack detection and assessment techniques

There are several deliverables available:

  • WP 1 Reference Architecture for Collaboration in Mobile Networks
  • WP 2 Evaluating Methods to assure System Integrity and Requirements for Future Protection Concepts
  • WP 3 Analysis of Requirements for the Deployment of Cloud Systems
  • WP 4 Development of a Monitoring System for Security Risk Reduction
  • WP 5 Threat and Risk Analysis for Mobile Communication Networks and Mobile Terminals
Posted in ICT News, Security Standardization and Practises, Telecom Security | Comments Off on Asmonia Project, addressing security in Mobile Networks