Strategies for developing an Internet emergency response system

Published on PCWorld.al

Control the flow of information

All events occurring in the security field i.e. vulnerabilities, compromises, crashes, different attacks, or cause-of-action takes the basis and the starting point for the information flow. A process or cycle that defines the entire model, mode of operation and operation of different systems, services and infrastructures. Continue reading

Posted in CyberSec, Personal Blogs | Tagged , , , , | Leave a comment

Cybersecurity talk with Laura Gallante

Laura Galante speaks at TED2017 – The Future You, April 24-28, 2017, Vancouver, BC, Canada. Photo: Marla Aufmuth / TED

Attending and listening the experience and the stories from her work towards cyber security in particular, analysis and emphasis on the concepts of information security from an American perspective and the research of the developmental or evolution of based concept of 0 and 1 from Russia. 😀

Laura video speech How (and why) Russia hacked the US election | Laura Galante

Continue reading

Posted in CyberSec | Tagged , , , , , | 1 Comment

Metadata and Privacy: Limits of Freedom online

Published on PCWorld.al

The data collection boundary (IP, Time, User, Receiver, etc.), preserving the privacy of the citizen and observing the regulations in force are the ethical principles of the democratic system that everyone has to adhere.

Metadata is information created depending on how you use the technology. For example, include the date and time you can call / set as someone or the location from which you managed to access your e-mail.

Continue reading

Posted in CyberSec, Home, Personal Blogs | Tagged , , , | Leave a comment

Mobile technology, standards and frameworks towards solving problems

Published on PCWorld.al

One thing that should never be forgotten is that everything from Government and Business have similarities in terms of operation and functionality, because they are organizations devoted to customer or citizen services. They can not exist without a citizen.

Application of the program for the development of mobile technology

Continue reading

Posted in CaseStudy, CIO | Leave a comment

How to create backup to multiple disk files

By using Ms SQL Server any edition you can  create a full backup to multiple disk file, which is the best solution. In a steps of one Job you can do it by using this Transact SQL, as it follows:

Continue reading

Posted in SQL Server 2014, SQL Server 2016 | Tagged , , , | Leave a comment

Internet Security and CERT Role

Published on PCWorld.al

Internet Security Day rather than a date is a moment to turn the attention to the importance of security and privacy and the role of initiatives to protect these fundamental rights that every citizen of the world needs. CERT is such an initiative.

Continue reading

Image | Posted on by | Leave a comment

Malware and security risks on mobile platforms

Published on PCWorld.al

Since the 1990s, there has been a story about smart mobile phones where up to now throughout this historic period has had a great development of them.

Continue reading

Posted in CyberSec | Tagged , , , | Leave a comment