KVM Switch, Using 2 computers with one set of “Keyboard, Video Screen and Mouse” + USB & Audio

I just recently bought a type of KVM switch with USB and audio cables, and it is just great. For an example, see Dlink KVM-221 below.

Dlink-KVM

No more moving laptop around the table when needed. Now, with one switch button, I can switch between dektop and laptop computers. And keep on using the same keyboard, mouse, monitor and headphones!

One more good thing, there is no need for external power supply. KVM takes power from USB connection.

I bought mine from Clas Ohlson, and it turned out to be one model of the Wiretek. My model looks quite close to this (below).

KVM

Posted in Tips | Comments Off on KVM Switch, Using 2 computers with one set of “Keyboard, Video Screen and Mouse” + USB & Audio

BlogDesk, Tool for offline blogging

BlogDesk is great tool for blogging. One can write content offline, and upload it to site later.

The features which I value most:

  • offline blogging feature
  • easy way to include images with thumbnails
  • can download and edit already published blogs
  • HTML view

The main view is quite simple. Here is a screenshot when editing this blog post.

BlogDesk-editing

 

Below is an example of the already posted Blogs list.

BlogDesk-alreadyposted

 

This figure was too big for the blog, and BlogDesk automatically proposed for a thumbnail (see below). For this Blog site, I have used custom default (640 wide).

BlogDesk-thumbnailing

Posted in Anvanced Tools, Recommended Free Tools | Comments Off on BlogDesk, Tool for offline blogging

AppCleaner, Tool for cleaning up windows from old applications, settings and files

AppCleaner has many utilities. It can delete Browsers temporary file cache, cookies, browsing history etc. It can also clean up registry and uninstall software. I found AppCleaner due to it possibility to delete files older than X days.

With default values, just pressing “Analyze” button, the outcome might be something like this (below).

appcleaner-firstrun

 

Settings for Customer files could look like below. (There are camera files in network drive).

appcleaner-customfiles

Tool shows number of files, size and execution time after “Analyze” and “Clean” actions. In this case, there were a huge amount of old camera files (see below).

appcleaner-customfiles-after-deletion

In this case there were 163386 files! All the other options were cleared, so basically this tool can be used for deleting old files too.

For privacy, there are additional options on how to delete the file, ie. not only deleting but rewriting so that file cannot be recovered.

appcleaner-deleteoption

Posted in Anvanced Tools, Privacy, Recommended Free Tools | Comments Off on AppCleaner, Tool for cleaning up windows from old applications, settings and files

ISO 27001 Certifications Register

It is possible to view which companies and organizations have ISO 27001 certification via site “International Register of ISMS Certificates“.

In their “number of certification per Country” list, there are about 7300 certifications.

ISO27001-certifications-status

 

Please note, the information is maintained by certification bodies themselves. For organization bodies, there exist another ISO standard 27006.

Posted in ISO, Security Management, Security Organizations | Comments Off on ISO 27001 Certifications Register

ISO 27000 serie of standards for Information Security

ISO 27000 serie is THE set of standard for Information Security, a must to have and look for people working in the area.

Good overviews and lists are available

* ISO/IEC 27000 — Information security management systems — Overview and vocabulary [1]
* ISO/IEC 27001 — Information security management systems — Requirements
* ISO/IEC 27002 — Code of practice for information security management
* ISO/IEC 27003 — Information security management system implementation guidance
* ISO/IEC 27004 — Information security management — Measurement
* ISO/IEC 27005 — Information security risk management
* ISO/IEC 27006 — Requirements for bodies providing audit and certification of information security management systems
* ISO/IEC 27011 — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002
* ISO/IEC 27031 — Guidelines for information and communications technology readiness for business continuity
* ISO/IEC 27033-1 — Network security overview and concepts
* ISO/IEC 27035 — Security incident management
* ISO 27799 — Information security management in health using ISO/IEC 27002

  • site called “ISO 27001 security”

They have an interesting toolkit available.

ISO 27000 serie material is done by SubCommittee 27 (JTC 1/SC27) “IT Security techniques”. A full list of their standards is available here.

Posted in ISO, Security Standardization and Practises, Telecom Security | Comments Off on ISO 27000 serie of standards for Information Security

Cloud Security Alliance

If one wish to understand better security related issues in Cloud Computing, it is worth to have a look on the work done by Cloud Security Alliance.

Their guidance document is available from their Guidance page.

They also have a certification program for individuals called CCSK (CSA Certificate of Cloud Security Knowledge). One can participate a training, or take the exam directly online.

Posted in Cloud Security, Cloud Standards, CSA, Security Certifications | Comments Off on Cloud Security Alliance

ITU-T Study Group 17

ITU-T Study Group 17 works on security related issues.

In the technical Flyer, the building block are listed as

  • Security Architecture and Frameworks
  • Telecommunication Security
  • Protocols
  • Security in Frame Relay
  • Security Techniques
  • Directory Services and Authentication
  • Network Management Security
  • Systems Management
  • Televisions and Cable Systems
  • Multimedia Communications
  • Facsimile
  • Message Handling Systems (MHS)

By looking the standards on the ones with “bold” gives a good overview. Another good overview is provided by their “Security Manual” from 2009 called “Security in telecommunications and information technology – An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications”. It is available in different languages.

ITU-T-security-manual

There is many other good collection on information, like

  • Listing of common text and technically aligned Recommendations
  • Mapping between ISO/IEC Standards and ITU-T Recommendations
  • list of Network Forensics and Vulnerability Organizations
Posted in ICT, ICT Standards, ITU-T, Security Organizations, Telecom Security | Comments Off on ITU-T Study Group 17