Posts

Migrate from Microsoft Windows to Linux

Image
 Migrate from Microsoft Windows to Linux

SSO (Single Sign-On)

Image
  SSO (Single Sign-On)

What is an Evil Twin Attack and How Does It Work?

Image
  What is an Evil Twin Attack and How Does It Work?

Types of Cyberattacks / Tipos de Ciberataques

Image
 Types of Cyberattacks / Tipos de Ciberataques 

32 Cyber Security Terms

 32 Cyber Security Terms  1. Malware Malware is a portmanteau of “malicious” and “software,” and describes any malicious code that infects a computer with unwanted files, programs or lines of code that can do a variety of destructive things. Malware can decrease a device’s functionality, allow cybercriminals to steal data or personal information, or take control of an entire computer or network.  2. Phishing Phishing scams began in the mid-1990s, when hackers started targeting users of AOL, then the leading provider of internet service. Hackers stole users’ passwords by sending them emails posing as AOL employees, then generating random credit card numbers in the hopes of matching some of them to real users’ accounts. When the credit card number generator was shut down, phishers began targeting payment systems, which are the custodians of millions of credit card profiles.  Today the practice continues with hackers using fake emails and websites to lure people into ha...

HOW WE MANAGE PROJECTS (Iterative, Agile, Waterfall, Spiral Model, RAD Model)

Image
  HOW WE MANAGE PROJECTS? Iterative, Agile, Waterfall, Spiral Model, RAD Model... What are the differences? The Software Development Life Cycle (SDLC) is a framework that outlines the process of developing software in a systematic way. Here are some of the most common ones:   1 - Waterfall Model: - A linear and sequential approach. - Divides the project into distinct phases: Requirements, Design, Implementation, Verification, and Maintenance.   2 - Agile Model: - Development is done in small, manageable increments called sprints. - Common Agile methodologies include Scrum, Kanban, and Extreme Programming (XP).   3 - V-Model (Validation and Verification Model): - An extension of the Waterfall model. - Each development phase is associated with a testing phase, forming a V shape.   4 - Iterative Model: - Focuses on building a system incrementally. - Each iteration builds upon the previous one until the final product is achieved. ...

Let’s talk about… What is Custom ROM in cellular phones

Image
Let’s talk about… What is Custom ROM in cellular phones Before we head down, you can learn about the custom ROM; well, with the word of XDA, Custom ROMs are one of the best things about Android. By installing custom ROM, you get the benefits such as an improved battery, better performance, easy root access, customization, themes (not all supported), and many more. Source: https://www.getdroidtips.com/best-custom-rom-xiaomi-poco-x3-pro/   ADVANTAGES OF A CUSTOM ROM Source: https://www.quora.com/What-are-the-advantages-of-a-custom-ROM There are lot of advantages of having a custom ROM, but all might not be applicable to you. I’ll list a few I know, see if they are good for you: NO BLOATWARE: Custom ROMs always come with only necessary apps and never contains promotional contents or bloatware (of all ROMs I have seen). UI OF YOUR CHOICE: For example, you are a redmi user and you are fed up with the UI, then you could get a makeover with Pixel Experience ROMs that has the...

Top 20 false beliefs users hold about IT professionals (Michael Medina)

Image
Top 20 false beliefs users hold about IT professionals Author: Michael Medina 1. Users expect IT professionals to drop everything and fix an issue immediately, regardless of how important the request is. Your relatively insignificant issue probably isn't the most important thing IT needs to focus on right now. Often they're working on higher-priority problems. 2. Users expect IT professionals to know everything about technology, as if they have infinite knowledge. IT pros are great at problem-solving, but getting to the bottom of an issue is a process that involves research; trial and error to rule out potential causes; and often, good old-fashioned Googling. 3. Users expect IT pros to fix personal computers free of charge. IT professionals get paid to do work in the office, but what they do after hours is their own business. It's weird to ask them to do work for free. You wouldn't expect a mechanic to fix your car for free, or an accountant to do your taxes for you. 4....

Install Hard Drives by Side, Upside-Down, Regular and Vertical Position

Install Hard Drives by Side, Upside-Down, Regular and Vertical Position Does mounting a hard disk drive on its side or even upside-down affects its lifespan or reliability? According to every drive manufacturer, it’s perfectly acceptable to mount a hard disk drive in any orientation as long as it’s not tilted and has sufficient cooling. Each drive manufacturer says on the subject of drive mounting: Seagate: “All Seagate and Maxtor-brand hard drives can be fitted sideways or upside down. As long as they are not moved during use and get enough cooling, it is irrelevant in which direction they are mounted.” Western Digital: “The drive can be mounted sideways, on end, or even upside down as long as the mounting screws are used properly.” HGST: “Hitachi Deskstar drive can be mounted with any side or end vertical or horizontal. Do not mount the drive in a tilted position.” So it’s perfectly fine to mount a hard disk drive upside down, vertical, or on either ...