Chords and fingering, and example set

For each chord, there exist alternative ways to play them. In some cases, one can play inversions instead of the normal chord. I use inversions in order to fit my fingers more comfortably on the keyboard.

For more about Chords and fingering, see blog.

Using the Piano Chords Dictionary, I have created a minimum set of chords which could be used as a base for learning to play piano. Left hand plays chords, and right hand the melody.

lauris-minimum-chords

With this minimal set, one can play many songs. For more advanded, one can learn step by step to play chords with 4 fingers (ie. X7 and Xm7 chords).

Posted in Piano | Comments Off on Chords and fingering, and example set

Piano Chords and fingering, and video course

One of the first problem, when starting to play piano chords, is where to put the fingers. What is the best way? How the hand should be placed?

Cthumb

The following list provides links to information sources. I have collected various alternatives of the same topic, since there is more than one way to explain these 🙂

 

Chord Charts and fingering

The figure below shows the link between Treble and Bass clefs.

musicnote

Videos

Same information is available via videos

And there are even some piano courses available, for example

left hand: Chords, right hand: melody

 

A full course is available via ezpianochords.com, worth to check out “Piano Chord Tutorial” (10 lessons)

An Example Set

I have described my fingering in another blog.

Posted in Piano | Comments Off on Piano Chords and fingering, and video course

Continuous Security Monitoring, new draft by NIST

NIST has produced an interesting set of drafts related to Continuous Monitoring(CM).

Continuous Monitiring here can be explained by sentence:

“Continuous security monitoring is a risk management approach to Cybersecurity that maintains a
picture of an organization’s security posture, provides visibility into assets, leverages use of
automated data feeds, monitors effectiveness of security controls, and enables prioritization of
remedies.”

Enterprise Architecture view is presented below.

NIST-CM-2

 

The material presented in these drafts are steps into good direction. It is definitely worth to look this material.

Look also

 

ceasars-maturitymodel

Posted in Cybersecurity, ICT News, NIST, Security Standardization and Practises | Comments Off on Continuous Security Monitoring, new draft by NIST

Tip, Tune your Firefox security settings

In addition to your antivirus and firewall protection, one should consider Browser security.

In firefox , there are several settings related to security. At minimum, one should check security and privacy configurations.

Security Settings

  • Open Menu -> Tools -> Options, select “Security” panel

Recommendation: tick the first 3 settings

firefox-security

 

Privacy Settings

  • Open Menu -> Tools -> Options, select “Privacy” panel

Recommendation:

  • tick “Always use privacy browsing mode”
  • tick “Accept cookies from sites”, but untick “Accept third-party cookies”

firefox-privacy

 

Alternative, one can use private browsing mode only occasionally via main menu.

  • Menu -> Tools -> Start Private Browsing
  • Menu -> Tools -> Stop Private Browsing

 

Review firefox settings

Review Add-ons list via main menu to see that only those add-ons which are needed are active.

  • Menu -> Tools -> Add-ons

See what is installed in “Extensions” and “Plugins”.

 

Security Add-ons

There are add-ons available for security and privacy. It is worth to look “BetterPrivacy” which protects agains long term cookies, and NoScript which prevents scripts from sites. NoScript need to be “trained”, since all scripts from all sites are disabled until explicitly configured otherwise.

Posted in Security, Tips | Comments Off on Tip, Tune your Firefox security settings

Tip, personal online file storage by using your home computer

One can create online storage for personal use by using the following tools:

Steps

  • Step 1
    • Configure sftp server, userid and directory in freeftpd. One can run freeftpd as service if wished. Note, one should use strong password, since interfacing internet. Also limit directory into one sub-directory only, and activate logging.
  • Step 2
    • Configure and activate dynamic dns service so that your computer can be easily accessed by name. By running client, one can reach computer even if ip address from your ISP (Internet Service Provider) has changed.
  • Step 3
    • Configure you firewall(s) and routers so that port 22 is accessable for you.
  • Step 4
    • Configure WinSCP to access your storage. In advanced options one can define keep-alive function in order to stay connected. WinSCP also has synchronizing functions which can be handy.

Why

It is possible to keep your notes at one main place (home computer) and access them remotely without needing to transfer files between computers via USB sticks or emails.

Posted in Tips | Comments Off on Tip, personal online file storage by using your home computer

Calibre, portable tool for reading ebooks

Calibre is good alternative for reading E-books on Windows. It supports both epub and pdf formats. The figure below shows some free books downloaded from internet sources.

calibre

 

Some sources for e-books:

Links:

Note: It can convert epub into pdf.

Posted in Basic Tools, Recommended Free Tools | Comments Off on Calibre, portable tool for reading ebooks

Risks and recommendation for smartphone users, report by ENISA

ENISA has published a report called “Smartphones: Information security risks, opportunities and recommendations for users”, which is good reading for smartphone security issues.

enisa-smartphonesecurity

10 different risks are evaluated:

  • R1 Data leakage
  • R2 Improper decommissioning
  • R3 Unintentional data disclosure
  • R4 Phishing
  • R5 Spyware
  • R6 Network spoofing attacks
  • R7 Surveillance
  • R8 Diallerware
  • R9 Financial malware
  • R10 Network congestion

Several recommendations are provided for Consumers, Employees and High Officials.

Note: NIST has produced document Special Publication 800-124 “Guidelines on Cell Phone and PDA Security” which is worth to look at the same time.

Posted in ENISA, Security Training, Awareness and Reports, Smartphones | Comments Off on Risks and recommendation for smartphone users, report by ENISA