<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8969617379636033882</atom:id><lastBuildDate>Sat, 24 Jan 2026 12:34:25 +0000</lastBuildDate><category>Cyber Security</category><category>Information Security</category><category>Tech Tips</category><category>Science</category><category>Audit Compliance</category><category>Digital Forensics</category><category>Jobs</category><category>General</category><category>Entrepreneurship</category><title>The Secure Planet</title><description>The Secure Planet, India, Information Security, Audit Compliance, Cyber Security, Digital Forensics, Tech Tips, Entrepreneurship, Executive Jobs, Corporate training, CISSP, CISA, CISM, CEH, Security consulting, Cyber crime, ISO27001, Security Conferences, Information Security Tools, security standards and Methodologies</description><link>http://www.thesecureplanet.com/</link><managingEditor>noreply@blogger.com (The Secure Planet)</managingEditor><generator>Blogger</generator><openSearch:totalResults>143</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-6234148353406447643</guid><pubDate>Wed, 20 Sep 2023 06:53:00 +0000</pubDate><atom:updated>2023-09-20T12:23:30.018+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tech Tips</category><title>A FREE Retro Video Game Emulator </title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;It is an open-source project whose purpose is to bring macOS game emulation into the realm of first-class citizenship. The project leverages modern macOS technologies, such as Cocoa, Metal, Core Animation, and other third-party libraries. One third-party library example is Sparkle, which is used for auto-updating. OpenEmu uses a modular architecture, allowing for game-engine plugins, allowing OpenEmu to support a host of different emulation engines and back ends while retaining the familiar macOS native front end.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;645&quot; data-original-width=&quot;898&quot; height=&quot;461&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvWwS2mNvKHmo2PHc1Tw5nOTHwQkQDmBKVFsgjzniRXVyqvV911niEBD67Qr1B_ttMeJwpaQz77orAPJg8nRWhuVauwJTPytWSDwo7agUqQcUwjq1DhcZRAO9rQTO0tJUSPB1DZqRsD1Ll_pCfzRwgBL88fffUf-3ttR7uOMKOYFIY893v-tb0US8z_afw/w640-h461/Emu.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana; text-align: left;&quot;&gt;Currently, OpenEmu can load the following game engines as plugins:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Atari 2600 (Stella)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Atari 5200 (Atari800)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Atari 7800 (ProSystem)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Atari Lynx (Mednafen)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;ColecoVision (CrabEmu)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Famicom Disk System (Nestopia)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Game Boy / Game Boy Color (Gambatte)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Game Boy Advance (mGBA)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;GameCube (Dolphin)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Game Gear (Genesis Plus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Intellivision (Bliss)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;NeoGeo Pocket (Mednafen)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Nintendo (NES) / Famicom (FCEUX, Nestopia)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Nintendo 64 (Mupen64Plus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Nintendo DS (DeSmuME)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Odyssey² / Videopac+ (O2EM)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;PC-FX (Mednafen)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;SG-1000 (Genesis Plus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Sega 32X (picodrive)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Sega CD / Mega CD (Genesis Plus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Sega Genesis / Mega Drive (Genesis Plus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Sega Master System (Genesis Plus)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Sega Saturn (Mednafen)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Sony PSP (PPSSPP)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Sony PlayStation (Mednafen)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Super Nintendo (SNES) (BSNES, Snes9x)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;TurboGrafx-16 / PC Engine (Mednafen)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;TurboGrafx-CD / PCE-CD (Mednafen)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Vectrex (VecXGL)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Virtual Boy (Mednafen)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;WonderSwan (Mednafen)&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/OpenEmu/OpenEmu&quot; target=&quot;_blank&quot;&gt;Download OpenEMU&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/OpenEmu/OpenEmu&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/09/a-free-retro-video-game-emulator.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvWwS2mNvKHmo2PHc1Tw5nOTHwQkQDmBKVFsgjzniRXVyqvV911niEBD67Qr1B_ttMeJwpaQz77orAPJg8nRWhuVauwJTPytWSDwo7agUqQcUwjq1DhcZRAO9rQTO0tJUSPB1DZqRsD1Ll_pCfzRwgBL88fffUf-3ttR7uOMKOYFIY893v-tb0US8z_afw/s72-w640-h461-c/Emu.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-4050481768542694884</guid><pubDate>Wed, 20 Sep 2023 06:47:00 +0000</pubDate><atom:updated>2023-09-20T12:18:02.122+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Science</category><title>Amazing Website - Find if your property will have risk of climate change?</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;I recently came across this amazing website &amp;amp; thought of sharing.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Here is how it works.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;STEP 1 - Search any property&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Find leading physical climate risk modeling for any property in the U.S. Enter a property address above to get started.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;STEP 2 - Review the risks&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Get a comprehensive risk overview and access detailed reports about past, present and future risks as well as high-level solutions to help mitigate risk. Free for all residential properties.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;STEP 3 - Make informed decisions&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Dive deeper into the cause of the risk, explore interactive maps, estimate damage and downtime for the building, and explore preventative solutions after creating a free Risk Factor account.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;616&quot; data-original-width=&quot;1344&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg40aFbGvdWEY86Rq1B5oZ7ilikDZONH5y-ciKb4akKPr619P6raWf0-mi9nKV7lDvhrLW94DJxtUT-8WqBF-VauGIYynOOsSS7MhzH2DbEzSpVDQR57WqrF1m8z3P16E6Lt_gytMGAVYQygbr1YJ_a1BhXCVuqiVYMS71s9GAzJufi1Z0Y780weJp3vRye/s16000/Risk%20Factor.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://riskfactor.com/&quot; target=&quot;_blank&quot;&gt;Review Property&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://riskfactor.com/&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/09/amazing-website-find-if-your-property.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg40aFbGvdWEY86Rq1B5oZ7ilikDZONH5y-ciKb4akKPr619P6raWf0-mi9nKV7lDvhrLW94DJxtUT-8WqBF-VauGIYynOOsSS7MhzH2DbEzSpVDQR57WqrF1m8z3P16E6Lt_gytMGAVYQygbr1YJ_a1BhXCVuqiVYMS71s9GAzJufi1Z0Y780weJp3vRye/s72-c/Risk%20Factor.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-7056722838054625751</guid><pubDate>Wed, 20 Sep 2023 06:43:00 +0000</pubDate><atom:updated>2023-09-20T12:13:52.263+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tech Tips</category><title>Free Program - Find if your computer is being used by someone</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The cursor will be moved to zero coordinates (can be changed, line 23) after starting the application.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;If the cursor is moved, the computer camera will take 1 photo, and the mss module will take 1 screenshot of the screen, all this will be sent to the telegram channel (need to be created), after a delay of 1-3 seconds. the procedure will be repeated again. Then there will be a delay of 5 seconds, the cursor will be moved to the coordinate that is written on line 76, this is done in case someone accidentally hits the computer mouse!&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;To work, you need to create a telegram bot and write down its token on line 13, and on line 14, enter the id of the channel where the photos will be sent. Bot needs to be added as an admin!&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;After you have filled in the 13th and 14th scale, you can build the .exe file by running the command in cmd:&amp;nbsp; pyinstaller -F --onefile --nocosole main.py&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Create a shortcut to the program and add to startup: c:\Users\ACCOUNT LOGIN\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup this will allow the program to start even after a system reboot.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;262&quot; data-original-width=&quot;1108&quot; height=&quot;152&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDD3Zvhk5KXNnV4uqRCmAPQ9qN_YCd0A8VvfRTv6dCREMfoiOq2FS_wR2TsFPf4wTTA18bs1ESNkzjEXarSS48lmT24OHBzuJdqz7CK7mpbtUCutsUFKTy7Wp0nrBigvfr9Dm4y_beQtUedPFEa9YVBsurT74ECKyDH2K48qTa3aHbN6-BciFPaOFMoKn2/w640-h152/Watcher.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The key combination alt + a (line 41) will put the program into standby mode and move the cursor to coordinates 500, 500 (to understand that the program is not active)&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The key combination ctrl + alt (line 33) will put the program into active mode&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/pro100git/watcher&quot; target=&quot;_blank&quot;&gt;Download Watcher&lt;/a&gt;&lt;/p&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/pro100git/watcher&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/09/free-program-find-if-your-computer-is.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDD3Zvhk5KXNnV4uqRCmAPQ9qN_YCd0A8VvfRTv6dCREMfoiOq2FS_wR2TsFPf4wTTA18bs1ESNkzjEXarSS48lmT24OHBzuJdqz7CK7mpbtUCutsUFKTy7Wp0nrBigvfr9Dm4y_beQtUedPFEa9YVBsurT74ECKyDH2K48qTa3aHbN6-BciFPaOFMoKn2/s72-w640-h152-c/Watcher.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-9056157469880184580</guid><pubDate>Wed, 20 Sep 2023 06:40:00 +0000</pubDate><atom:updated>2023-09-20T12:10:08.091+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Digital Forensics</category><title>Open source - Best Image Forensic toolset</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Forensic Image Analysis is the application of image science and domain expertise to interpret the content of an image and/or the image itself in legal matters. Major subdisciplines of Forensic Image Analysis with law enforcement applications include: Photogrammetry, Photographic Comparison, Content Analysis, and Image Authentication.&quot; (Scientific Working Group on Imaging Technologies)&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;It is not meant as an automatic tool that decide if an image is forged or not (that tool probably will never exist...), but as a companion in experimenting with various algorithms found in the latest research papers and workshops.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;While many commercial solutions have high retail prices and often reserved to law enforcement and government agencies only, this toolset aims to be a both an extensible framework and a starting point for anyone interested in making experiments in this particular application of digital signal processing.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Modern Qt-based GUI with multiple tool window management&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Support for many formats (JPEG, PNG, TIFF, BMP, WebP, PGM, PFM, GIF)&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Highly responsive image viewer with real-time pan and zoom&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Many state-of-the-art algorithms to try out interactively&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Export both visual and textual results of the analysis&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Extensive online help with explanations and tutorials&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;General&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Original Image: display the unaltered reference image for visual inspection&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;File Digest: retrieve physical file information, crypto and perceptual hashes&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Hex Editor: open an external hexadecimal editor to show and edit raw bytes&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Similar Search: browse online search services to find visually similar images&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Metadata&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Header Structure: dump the file header structure and display an interactive view&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;EXIF Full Dump: scan through file metadata and gather all available information&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Thumbnail Analysis: extract optional embedded thumbnail and compare with original&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Geolocation Data: retrieve optional geolocation data and show it on a world map&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Inspection&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Enhancing Magnifier: magnifying glass with enhancements for better identifying forgeries&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Channel Histogram: display single color channels or RGB composite interactive histogram&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Global Adjustments: apply standard image adjustments (brightness, hue, saturation, ...)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Reference Comparison: open a synchronized double view for comparison with another picture&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Luminance Gradient: analyze horizontal/vertical brightness variations across the image&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Echo Edge Filter: use derivative filters to reveal artificial out-of-focus regions&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Wavelet Threshold: reconstruct image with different wavelet coefficient thresholds&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Frequency Split: split image luminance into high and low frequency components&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Colors&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;RGB/HSV Plots: display interactive 2D and 3D plots of RGB and HSV pixel values&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Space Conversion: convert RGB channels into HSV/YCbCr/Lab/Luv/CMYK/Gray spaces&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;PCA Projection: use color PCA to project pixel onto most salient components&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Pixel Statistics: compute minimum/maximum/average RGB values for every pixel&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Noise&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Noise Separation: estimate and extract different kind of image noise components&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Min/Max Deviation: highlight pixels deviating from block-based min/max statistics&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Bit Planes Values: show individual bit planes to find inconsistent noise patterns&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;PRNU Identification: exploit sensor pattern noise introduced by different cameras&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;JPEG&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Quality Estimation: extract quantization tables and estimate last saved JPEG quality&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Error Level Analysis: show pixel-level difference against fixed compression levels&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Multiple Compression: use a machine learning model to detect multiple compression&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;JPEG Ghost Maps: highlight traces of different compression levels in difference images&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Tampering&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Contrast Enhancement: analyze color distribution to detect contrast enhancements&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Copy-Move Forgery: use invariant feature descriptors for cloned area detection&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Composite Splicing: exploit DCT statistics for automatic splicing zone detection&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Image Resampling: estimate 2D pixel interpolation for detecting resampling traces&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Various&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Median Filtering: detect processing traces left by nonlinear median filtering&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Illuminant Map: estimate scene local light direction on estimated 3D surfaces&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Dead/Hot Pixels: detect and fix dead/hot pixels caused by sensor imperfections&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Stereogram Decoder: decode 3D images concealed in crossed-eye autostereograms&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1131&quot; data-original-width=&quot;1920&quot; height=&quot;377&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEevf8c51ZKIDwKTZtNFtoMJqLwudvCMD-wGtk6ifqgYoNNPpAFJcbnMf52rzspNJluYWjf1Tr6fY3WIdsQVcykGWAT5CqY667rOyQoPehn0Dmd-_hNotYqLDaNYvTOHXPlUjw73ohWp9pH6te9wpy2hbBswThf95S1bl_2sgsGTy9Sp7LiOoYIct_P8Sy/w640-h377/Image%20Forensic.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/GuidoBartoli/sherloq&quot; target=&quot;_blank&quot;&gt;Download toolset&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/GuidoBartoli/sherloq&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/09/open-source-best-image-forensic-toolset.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEevf8c51ZKIDwKTZtNFtoMJqLwudvCMD-wGtk6ifqgYoNNPpAFJcbnMf52rzspNJluYWjf1Tr6fY3WIdsQVcykGWAT5CqY667rOyQoPehn0Dmd-_hNotYqLDaNYvTOHXPlUjw73ohWp9pH6te9wpy2hbBswThf95S1bl_2sgsGTy9Sp7LiOoYIct_P8Sy/s72-w640-h377-c/Image%20Forensic.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-3166278462010878242</guid><pubDate>Wed, 20 Sep 2023 06:36:00 +0000</pubDate><atom:updated>2023-09-20T12:06:03.671+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Information Security</category><title>Monitor IPv4 utilization for Amazon VPC Subnets</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;This sample deploys a Lambda function that monitors IPv4 utilization for Amazon VPC Subnets and published the metrics to CloudWatch as custom metrics.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;453&quot; data-original-width=&quot;1460&quot; height=&quot;198&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG7IvmikM15gkakaoJM_CNtXT5wbej0_lD3hg8WnPhmRuVBq_j49ohmuUfqDRuKI0DgcPud0qXnnzjfsWoz5CGKXMBdo6Hga6LiX8SwBJhGcEz7rXPCtbbEh4GOdEjBIWgdIIgsJbGrYKfcZSipaMksUprkcYwGO9f5b72Gb2HcP4oOmsf6BB8QbQtsEhp/w640-h198/IP4AWS.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The following metrics are published.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;IPUsage/AvailableIPs&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Gives a count of the total number of IPv4 addresses available in the subnet.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;IPUsage/TotalIPs&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Gives a count of the total possible IPv4 addresses in the subnet CIDR (based on the prefix, not usable IPs).&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;IPUsage/UsedIPs&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Gives the count of IPv4 addresses current used including reserved IP addresses and IP addresses used by ENIs.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;IPUsage/Utilization&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Shows the percentage (as a float, not decimal representation of the percentage) of IPv4 space unusable in the subnet.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/aws-samples/subnet-utilization-monitor-for-amazon-vpc&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/aws-samples/subnet-utilization-monitor-for-amazon-vpc&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/09/monitor-ipv4-utilization-for-amazon-vpc.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG7IvmikM15gkakaoJM_CNtXT5wbej0_lD3hg8WnPhmRuVBq_j49ohmuUfqDRuKI0DgcPud0qXnnzjfsWoz5CGKXMBdo6Hga6LiX8SwBJhGcEz7rXPCtbbEh4GOdEjBIWgdIIgsJbGrYKfcZSipaMksUprkcYwGO9f5b72Gb2HcP4oOmsf6BB8QbQtsEhp/s72-w640-h198-c/IP4AWS.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-3739058560540843932</guid><pubDate>Wed, 20 Sep 2023 06:33:00 +0000</pubDate><atom:updated>2023-09-20T12:03:02.042+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tech Tips</category><title>Free Program - Reminds you on taking breaks.</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;This program alerts you to take micro breaks, rest breaks and limits your daily computer usage.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;It monitors your keyboard and mouse usage and uses this information to prevent your health from getting worse.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Microbreaks: Workrave often reminds you of a little break. Usually every 3 minutes there is a micro-break that lasts about 30 seconds. The exact duration and frequency of the microblock can be fully customized. During a micro break, you can let go of your keyboard and mouse, take your eyes off the screen, and relax a bit.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Rest breaks: Several times a day, Workrave reminds you to take a break from your computer. The rest break usually lasts about 10 minutes every 45 minutes, but the duration and frequency are configurable. During your rest break, you can walk, stretch and relax.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Daily limit: Workrave tracks the amount of time you use your computer. When you have reached your configured daily computer usage limit, you will be prompted to stop using your computer for the day.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;413&quot; data-original-width=&quot;856&quot; height=&quot;308&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirx3zvj6ifjwwSfCfzkgrR-HuJYaw44JG3IcUpp7jt0FtWyHwK8Wf7cR64KxjRk26tGsXF4KibK_1UUkzVPvHzYt82HI4V1buyiIZYQSAWyvCvx2bEbpz789T-HommJaWfIygqDQtJHogE2kK15tv9vamN_ZOve6v8KZfnhHV_jjiQKRTaj0ntCbvb8svc/w640-h308/workrave.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Statistics: You can see the number of breaks per day you have taken as well as the number of breaks you have ignored and postponed. Also available is the amount of time you use your computer daily, weekly, and monthly.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/rcaelers/workrave&quot; style=&quot;text-align: left;&quot; target=&quot;_blank&quot;&gt;Download workrave&lt;/a&gt;&lt;/p&gt;</description><link>http://www.thesecureplanet.com/2023/09/free-program-reminds-you-on-taking.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirx3zvj6ifjwwSfCfzkgrR-HuJYaw44JG3IcUpp7jt0FtWyHwK8Wf7cR64KxjRk26tGsXF4KibK_1UUkzVPvHzYt82HI4V1buyiIZYQSAWyvCvx2bEbpz789T-HommJaWfIygqDQtJHogE2kK15tv9vamN_ZOve6v8KZfnhHV_jjiQKRTaj0ntCbvb8svc/s72-w640-h308-c/workrave.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-7497843623809742386</guid><pubDate>Fri, 11 Aug 2023 03:04:00 +0000</pubDate><atom:updated>2023-08-11T08:36:11.017+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Jobs</category><title>JOB - Data Protection Officer (DPO) - Mahindra Group, India</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Job Description :&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- The DPO will play a crucial role in ensuring compliance with data protection laws and regulations, establishing data protection policies, and fostering a culture of data privacy within manufacturing operations.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Monitor and ensure compliance with data protection laws and regulations relevant to the manufacturing sector.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Stay updated with evolving data protection requirements and recommend necessary changes to company practices.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Collaborate with relevant departments to ensure adherence to data protection policies and guidelines.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Develop, implement, and update data protection policies, procedures, and guidelines tailored to the manufacturing sector.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Provide guidance to employees on data protection matters, ensuring awareness and adherence to policies.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Conduct Privacy Impact Assessments for new projects, processes, and technologies that involve the processing of personal data.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Identify potential privacy risks and recommend mitigating measures.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Review and assess data processing agreements with third-party vendors, suppliers, and partners to ensure compliance with data protection standards.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Collaborate with legal and procurement teams to address data protection clauses in contracts.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Manage data subject access requests and inquiries related to data protection rights, ensuring timely and accurate responses.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Facilitate the exercise of data subject rights, including requests for data deletion, rectification, and portability.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Establish and maintain procedures for managing data breaches, including investigation, notification to authorities, and affected individuals, as required.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Coordinate with relevant stakeholders to mitigate potential harm and prevent future breaches.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Organize data protection training sessions for employees to promote a culture of privacy and data security.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Raise awareness about data protection among various levels of the organization.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;b style=&quot;font-family: verdana;&quot;&gt;Qualifications :&lt;/b&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Bachelor&#39;s + Master&#39;s degree in law, information technology, or a related field. Advanced degrees or certifications in data protection and privacy (e.g., CIPP/E, CIPM, FIP, CT-DPO) are preferred.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- Proven experience in data protection, privacy, or legal roles, preferably within a manufacturing or industrial context.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;- In-depth knowledge of data protection laws and regulations relevant to the manufacturing sector.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;Note: &lt;/b&gt;Job link is active at the time of posting. It may not work if you are checking this post at a later date. I don&#39;t get/charge any referral/commission for posting jobs. It&#39;s purely to help other professionals. Click Apply for detailed job description &amp;amp; application process.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://www.hirist.com/j/mahindra-group-data-protection-officer-privacy-management-10-15-yrs-1233700.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: verdana; font-size: medium;&quot;&gt;Apply&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://www.hirist.com/j/mahindra-group-data-protection-officer-privacy-management-10-15-yrs-1233700.html&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/08/job-data-protection-officer-dpo.html</link><author>noreply@blogger.com (The Secure Planet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-8185166678949620021</guid><pubDate>Fri, 11 Aug 2023 03:00:00 +0000</pubDate><atom:updated>2023-08-11T08:30:05.322+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Jobs</category><title>JOB - Data Governance Officer - Forbes Advisor, Chennai, India</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Forbes Advisor is a new initiative for consumers under the Forbes Marketplace umbrella that provides journalist- and expert-written insights, news and reviews on all things personal finance, health, business, and everyday life decisions.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;We do this by providing consumers with the knowledge and research they need to make informed decisions they can feel confident in, so they can get back to doing the things they care about most.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Job Description&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Experience : Total 15 years experience or more&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;10 year in Data Management and Data Warehousing experience&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;3 to 5 years in Data Governance&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana; font-size: x-small;&quot;&gt;&lt;b&gt;Note:&lt;/b&gt; Job link is active at the time of posting. It may not work if you are checking this post at a later date. I don&#39;t get/charge any referral/commission for posting jobs. It&#39;s purely to help other professionals. Click Apply for detailed job description &amp;amp; application process.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://jobs.smartrecruiters.com/ForbesAdvisor/3743990002262306-data-governance-officer-chennai&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: verdana; font-size: medium;&quot;&gt;Apply&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;</description><link>http://www.thesecureplanet.com/2023/08/job-data-governance-officer-forbes.html</link><author>noreply@blogger.com (The Secure Planet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-3170685585277032973</guid><pubDate>Fri, 11 Aug 2023 02:55:00 +0000</pubDate><atom:updated>2023-08-11T08:25:23.444+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Jobs</category><title>JOB - Interns Software Engineering - Microsoft, India</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Software engineers (SWEs) work with teammates to solve problems and build innovative software solutions. You are passionate about customers and product quality, and you provide technical guidance to Program Managers as they consider user needs and product requirements. You will also be expected to demonstrate an ability to learn and adopt relevant new technologies, tools, methods&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;and processes to leverage in your solutions.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;As a SWE, you are dedicated to design, development and testing of next-generation software which will empower every person and organization on the planet to achieve more.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Applies engineering principles to solve complex problems through sound and creative engineering.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Quickly learns new engineering methods and incorporates them into his or her work processes.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Seeks feedback and applies internal or industry best practices to improve his or her technical solutions.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Demonstrates skill in time management and completing software projects in a cooperative team environment.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Locations: Hyderabad, Bengaluru, Noida&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Qualifications&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Pursuing a bachelor&#39;s or master&#39;s degree in engineering, computer science or related field.   &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Must have at least one additional quarter/semester of school remaining following the completion of the internship.   &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;One year of programming experience in an object-oriented language.   &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Ability to demonstrate an understanding of computer science fundamentals, including data structures and algorithms. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana; font-size: x-small;&quot;&gt;&lt;b&gt;Note:&lt;/b&gt; Job link is active at the time of posting. It may not work if you are checking this post at a later date. I don&#39;t get/charge any referral/commission for posting jobs. It&#39;s purely to help other professionals. Click Apply for detailed job description &amp;amp; application process.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://jobs.careers.microsoft.com/us/en/job/1577325/Software-Engineering---Internship-Opportunities&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: verdana; font-size: medium;&quot;&gt;Apply&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;</description><link>http://www.thesecureplanet.com/2023/08/job-interns-software-engineering.html</link><author>noreply@blogger.com (The Secure Planet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-4736166911291401552</guid><pubDate>Fri, 11 Aug 2023 02:50:00 +0000</pubDate><atom:updated>2023-08-11T08:20:43.561+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Jobs</category><title>JOB - Interns Software Engineering - Google,  India</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Summer Internships start in May/June 2024 and are 10-12 weeks in duration.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;This internship is intended for students who are pursuing a Bachelor&#39;s, Master&#39;s or Dual degree program in Computer Science or a related field.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;To start the application process, you will need an updated CV or resume and a current unofficial or official transcript in English. Click on the &#39;Apply&#39; button on this page and provide the required materials in the appropriate sections (PDFs preferred):&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;In the &#39;Resume Section&#39; attach an updated CV or resume.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;In the &#39;Education Section&#39; attach a current or recent unofficial or official transcript in English.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Under &#39;Degree Status,&#39; select &#39;Now attending&#39; to upload a transcript.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;By applying to this position you will have an opportunity to share your preferred working location from the following: Bangalore, Karnataka, India; Hyderabad, Telangana, India; Pune, Maharashtra, India.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://www.google.com/about/careers/applications/jobs/results/131573075612181190-software-engineering-intern/&quot; style=&quot;text-align: left;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: verdana; font-size: medium;&quot;&gt;Apply&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;</description><link>http://www.thesecureplanet.com/2023/08/job-interns-software-engineering-google.html</link><author>noreply@blogger.com (The Secure Planet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-1637518150001980452</guid><pubDate>Fri, 11 Aug 2023 02:45:00 +0000</pubDate><atom:updated>2023-08-11T08:15:56.809+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Jobs</category><title>JOB - Chief Risk Officer- Hewlett Packard (HP Financial services), Bangalore, India</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HPE Financial services is where we help organizations create the investment they need for digital transformation, in an innovative and sustainable way. We partner with customers across their entire IT asset portfolio from edge to cloud to end-user. Unique to each client’s aspirations and size, our financial and asset management solutions are anchored by best-in-class tech upcycling services.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;What you’ll do:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Responsibilities:&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Responsible for HPFS risk management function, including ensuring that HPFS has an effective risk management framework in place to identify, measure, mitigate, monitor, and report the risks to which it is or might be exposed to in day-to-day business activities.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Provide an ongoing, independent appraisal to ensure that effective policies, processes, limits and controls are in place to manage risks;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Develop and manage an effective risk management team, including setting of objectives, performance appraisals and people development;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Note:&lt;/b&gt; Job link was active at the time of posting. It may not work if you are checking this post at a later date. I don&#39;t get/charge any referral/commission for posting jobs. It&#39;s purely to help other professionals. Click Apply for detailed job description &amp;amp; application process.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://careers.hpe.com/us/en/job/HPE1US1158041EXTERNALENUS/Chief-Risk-Officer&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Apply&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://careers.hpe.com/us/en/job/HPE1US1158041EXTERNALENUS/Chief-Risk-Officer&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/08/job-chief-risk-officer-hewlett-packard.html</link><author>noreply@blogger.com (The Secure Planet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-2551323343727702243</guid><pubDate>Fri, 11 Aug 2023 02:39:00 +0000</pubDate><atom:updated>2023-08-11T08:09:54.097+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Jobs</category><title>JOB - Chief Information Officer (CIO) - Liberty Insurance, Mumbai, India</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Leadership Role and Managing a Team of ~ 40&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Partnering Closely With Country CXOs – Reporting Directly to Regional CIO and Dotted Line to Country CEO&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The CIO is responsible for driving key transformational technology strategies and initiatives in our India market. He / She will drive and execute technology strategy, transforming traditional teams to proactive and customer oriented teams (design thinking and agile) and drive key global / local initiatives to outpacing competitors.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The India operation is undergoing a number of exciting transformational initiatives to replace existing legacy with new technologies to build rapid speed and meet evolving customer demands. The incumbent must have a strong passion and competent to lead change across teams, work through key business and IT challenges as one team, and navigate in a high-unknown and complex environment and strong sense of business partnership.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Note: &lt;/b&gt;Job link was active at the time of posting. It may not work if you are checking this post at a later date. I don&#39;t get/charge any referral/commission for posting jobs. It&#39;s purely to help other professionals. Click Apply for detailed job description &amp;amp; application process.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://libertyinsurance.richiejobboarda.com/apply/OpiwqElNTl/Chief-Information-Officer&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: verdana; font-size: medium;&quot;&gt;Apply&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://libertyinsurance.richiejobboarda.com/apply/OpiwqElNTl/Chief-Information-Officer&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/08/job-chief-information-officer-cio.html</link><author>noreply@blogger.com (The Secure Planet)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-9000363682319082841</guid><pubDate>Fri, 11 Aug 2023 02:31:00 +0000</pubDate><atom:updated>2023-08-11T08:01:34.803+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Science</category><title>VIDEO - India successfully achieves autonomous landing of space vehicle (RLV LEX)</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The Indian Space Research Organisation (ISRO) achieved a remarkable feat by carrying out the Reusable Launch Vehicle Autonomous Landing Mission (RLV LEX) successfully. This momentous test took place at the Aeronautical Test Range (ATR) situated in Chitradurga, Karnataka, which also serves as the headquarters for the nation&#39;s esteemed space agency.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;For the first time ever, a helicopter has transported a winged body to a staggering altitude of 4.5 km, only to release it and witness its remarkable ability to autonomously land on a runway. This groundbreaking achievement has been accomplished with the use of a Reusable Launch Vehicle (RLV), which can be described as a space plane boasting a low lift to drag ratio. This unique characteristic necessitates a specific approach during landing, as the RLV must navigate its descent with precision and finesse.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The RLV, or reusable launch vehicle, embarked on its journey at 7:10 am IST with the assistance of an Indian Air Force (IAF) Chinook Helicopter, which carried it as an underslung load. Gradually ascending to an impressive altitude of 4.5 km above Mean Sea Level, the RLV reached its desired pillbox parameters. These parameters were established for the RLV&#39;s Mission Man, ensuring its successful progression towards its intended objectives.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;528&quot; data-original-width=&quot;1054&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6CSBnGDxAY-N4OqIbX-V772Z1Ni5fWGTKR4BcICj_nGWOVrFjdMLqlGpcYV8C3-3bqIPrCHZfxnbr3j5bPXhMD8ysZUM2OH9VVQUPW2eP5SBa3scJB14s5Gw3zSlhI2mJj8U-sNO4YhE0Fw91HbdUWcSdT9vQxI8zw_-3fPItPytCqFh5DOrzI9YI5obc/w640-h320/RLV%20LEX.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The successful autonomous landing was executed with utmost precision, replicating the exact conditions of a Space Re-entry vehicle&#39;s landing. This intricate feat involved the landing being performed at high speeds, without any human intervention, and following the precise return path as if the vehicle had just arrived from outer space.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The RLV LEX required the integration of numerous cutting-edge technologies to ensure its successful operation. These included advanced navigation hardware and software, a state-of-the-art pseudolite system, a highly precise Ka-band radar altimeter, a reliable NavIC receiver, a specially designed indigenous landing gear, innovative aerofoil honey-comb fins, and an efficient brake parachute system.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Watch this amazing video&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;415&quot; src=&quot;https://www.youtube.com/embed/yq16_yDiWU8?rel=0&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;</description><link>http://www.thesecureplanet.com/2023/08/video-india-successfully-achieves.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6CSBnGDxAY-N4OqIbX-V772Z1Ni5fWGTKR4BcICj_nGWOVrFjdMLqlGpcYV8C3-3bqIPrCHZfxnbr3j5bPXhMD8ysZUM2OH9VVQUPW2eP5SBa3scJB14s5Gw3zSlhI2mJj8U-sNO4YhE0Fw91HbdUWcSdT9vQxI8zw_-3fPItPytCqFh5DOrzI9YI5obc/s72-w640-h320-c/RLV%20LEX.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-1649145286955197485</guid><pubDate>Fri, 11 Aug 2023 02:21:00 +0000</pubDate><atom:updated>2023-08-11T07:51:33.921+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><title>Open Source - First response tool for threat hunting</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;It is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;It performs an initial and quick triage of malware samples, URLs, IP addresses, domains, malware families, IOCs and hashes. Additionally, Malwoverview is able to get dynamic and static behavior reports, submit and download samples from several endpoints. In few words, it works as a client to main existing sandboxes.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;It can&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Determine similar executable malware samples (PE/PE+) according to the import table (imphash) and group them by different colors (pay attention to the second column from output). Thus, colors matter!&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Show hash information on Virus Total, Hybrid Analysis, Malshare, Polyswarm, URLhaus, Alien Vault, Malpedia and ThreatCrowd engines.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Determining whether the malware samples contain overlay and, if you want, extract it.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Check suspect files on Virus Total, Hybrid Analysis and Polyswarm.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Check URLs on Virus Total, Malshare, Polyswarm, URLhaus engines and Alien Vault.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Download malware samples from Hybrid Analysis, Malshare, URLHaus, Polyswarm and Malpedia engines.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Submit malware samples to VirusTotal, Hybrid Analysis and Polyswarm.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;List last suspected URLs from URLHaus.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;List last payloads from URLHaus.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Search for specific payloads on the Malshare.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Search for similar payloads (PE32/PE32+) on Polyswarm engine.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Classify all files in a directory searching information on Virus Total and Hybrid Analysis.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Make reports about a suspect domain using different engines such as VirusTotal, Malpedia and ThreatCrowd.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Check APK packages directly from Android devices against Hybrid Analysis and Virus Total.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Submit APK packages directly from Android devices to Hybrid Analysis and Virus Total.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Show URLs related to an user provided tag from URLHaus.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Show payloads related to a tag (signature) from URLHaus.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Show information about an IP address from Virus Total, Alien Vault, Malpedia and ThreatCrowd.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Show IP address, domain and URL information from Polyswarm.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Perform meta-search on Polyswarm Network using several criteria: imphash, IPv4, domain, URL and malware family.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Gather threat hunting information from AlienVault using different criteria.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Gather threat hunting information from Malpedia using different criteria.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Gather threat hunting information from Malware Bazaar using different criteria.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Gather IOC information from ThreatFox using different criteria.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Gather threat hunting information from Triage using different criteria.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Get evaluation to hashes from a given file against Virus Total.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Submit large files (&amp;gt;= 32 MB) to Virus Total.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Malwoverview uses Virus Total API v.3, so there isn&#39;t longer any option using v.2.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Retrieve different information from InQuest Labs and download samples from there.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;728&quot; data-original-width=&quot;1688&quot; height=&quot;276&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisNGrYQSs1rjvMxymCoZ1l0jLcAcB6g-QvULtSOUsx1M0DHGMbf5IhXnyiXLlBVrRml1klLCrKqnXzrxt-w_nRMuVbPHT_Ladxp4JVac6ZJcbhpTKc9f7HqCtx11kRpOyxUanSH--0NRy_ThGpwlGVnfwZ1LqV02CiYIK8XF1wPlw-0qPJ4529_5kNq6Hq/w640-h276/TH1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/alexandreborges/malwoverview&quot; target=&quot;_blank&quot;&gt;Download Malwoverview&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/alexandreborges/malwoverview&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/08/open-source-first-response-tool-for.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisNGrYQSs1rjvMxymCoZ1l0jLcAcB6g-QvULtSOUsx1M0DHGMbf5IhXnyiXLlBVrRml1klLCrKqnXzrxt-w_nRMuVbPHT_Ladxp4JVac6ZJcbhpTKc9f7HqCtx11kRpOyxUanSH--0NRy_ThGpwlGVnfwZ1LqV02CiYIK8XF1wPlw-0qPJ4529_5kNq6Hq/s72-w640-h276-c/TH1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-2021730804796258838</guid><pubDate>Fri, 11 Aug 2023 02:17:00 +0000</pubDate><atom:updated>2023-08-11T07:47:56.323+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Information Security</category><title>FREE - Prompt engineering course</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Prompt engineering (PE) is the process of communicating effectively with an AI to achieve desired results. As AI technology continues to rapidly advance, the ability to master prompt engineering has become a particularly valuable skill. Prompt engineering techniques can be applied to a wide variety of tasks, making it a useful tool for anyone seeking to improve their efficiency in both everyday and innovative activities.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;This course is tailored to beginners, making it the perfect starting point if you&#39;re new to AI and PE. However, even if you&#39;re not a beginner, you&#39;ll still find valuable insights within this course. This course is the most comprehensive prompt engineering course available, and the content ranges from an introduction to AI to advanced PE techniques.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;This course is open source, and built by a diverse community of researchers, translators, and hobbyists. We believe that AI should be accessible to everyone, and that it should be described clearly and objectively. To this end, we strive to produce a comprehensive and unbiased course that is free of excessive jargon and hype.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;604&quot; data-original-width=&quot;1609&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXq85wm4TRTWyvB6Ll5RV3iNmpvT5fIAqVRtHi1eQO9Lh0wv9qKrXn9VmR-GiBHl7p9Q0Z77sYuktWsAgc46kkizeV9vvUDd9QfgW3i27MBl3zXfQCS9as1rSGjL0s8OpaJTVpJ9rnf6SxcJm6v50fL-fgA1er-uXMuz60X6tIpCysjm8rotrKkZUngIPA/w640-h240/PE.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://learnprompting.org/&quot; target=&quot;_blank&quot;&gt;Access Prompt engineering course&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://learnprompting.org/&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/08/free-prompt-engineering-course.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXq85wm4TRTWyvB6Ll5RV3iNmpvT5fIAqVRtHi1eQO9Lh0wv9qKrXn9VmR-GiBHl7p9Q0Z77sYuktWsAgc46kkizeV9vvUDd9QfgW3i27MBl3zXfQCS9as1rSGjL0s8OpaJTVpJ9rnf6SxcJm6v50fL-fgA1er-uXMuz60X6tIpCysjm8rotrKkZUngIPA/s72-w640-h240-c/PE.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-1418074842419893878</guid><pubDate>Fri, 11 Aug 2023 02:15:00 +0000</pubDate><atom:updated>2023-08-11T07:45:01.690+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tech Tips</category><title>Free Program Uninstaller </title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HiBit Uninstaller is a program removal manager and a good set of utilities. Built-in utilities: registry cleaner, junk files removal, empty folder deletion, shortcut repair, file shredder by algorithms, managers - processes, autorun, services, scheduler, context menu and restore points (Windows System Protection function). A handy feature in the program is the removal of Windows Store programs (UWP apps).&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Fully uninstall programs without leftovers&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Forced Uninstall removes any stubborn software&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Remove multiple programs at once&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Monitoring installation of programs&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Program quick search function&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Uninstall windows store apps&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Remove browsers&#39; extensions&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Shred sensitive files&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Fix registry problems and boost your PC performance&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Remove junk files and unnecessary program files&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Delete invalid shortcuts in your system&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Find the empty folders in your hard drive&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Easily manage programs and services that start with Windows&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Easily manage windows system restore points&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Easy-to-use user interface&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Automatic update to the latest version&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;609&quot; data-original-width=&quot;900&quot; height=&quot;434&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHCMpPo8JJh9qjHjGdGnU3NPgHt9YfbPK6nvjamY_Vbd1AvRUZy1QA214JnKyVxZLhImXnTNZSgKKn59s29FG7dhI-JFkHZDNd1TKDtMbafjQD6gMdftLW2G7-zcZspd49WFgjYBoVbnWLJ-mmeT-Srmd7hIDC_tFP9kSn6Dsxc85ZHIX0NUgeo8TrePxn/w640-h434/Hibit.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;http://www.hibitsoft.ir/Uninstaller.html&quot; target=&quot;_blank&quot;&gt;Download HiBit Uninstaller&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;http://www.hibitsoft.ir/Uninstaller.html&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/08/free-program-uninstaller.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHCMpPo8JJh9qjHjGdGnU3NPgHt9YfbPK6nvjamY_Vbd1AvRUZy1QA214JnKyVxZLhImXnTNZSgKKn59s29FG7dhI-JFkHZDNd1TKDtMbafjQD6gMdftLW2G7-zcZspd49WFgjYBoVbnWLJ-mmeT-Srmd7hIDC_tFP9kSn6Dsxc85ZHIX0NUgeo8TrePxn/s72-w640-h434-c/Hibit.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-1551236781496073239</guid><pubDate>Fri, 11 Aug 2023 02:10:00 +0000</pubDate><atom:updated>2023-08-11T07:40:48.361+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Science</category><title>Medical - Google Lens can now review skin conditions</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Google Lens is a revolutionary technology that utilizes visual recognition to enable users to search for information about the things they see using their smartphones. It functions by analyzing and comparing an uploaded or taken image with countless other images available on the internet, much like how traditional Google search works. The results are then ranked based on the similarities between the user&#39;s image and the identified objects in the database. This incredible feature not only helps users identify unknown objects or plants during a leisurely stroll, but it also goes above and beyond by offering recommendations and additional details about the specific item being searched. With Google Lens, users can effortlessly gain valuable context and supplementary information about the world around them.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Google recently unveiled an awe-inspiring addition to its Google Lens tool, which allows users to search for information on various skin conditions. This groundbreaking feature empowers individuals to simply snap a photo of their skin ailment, such as a bothersome rash or unusual discoloration, and instantly receive a tailored compilation of the most pertinent and informative results. By effortlessly matching the image with relevant data, Google Lens effectively offers valuable insights into the nature and potential causes of the condition in question.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Describing an odd mole or rash on your skin can be hard to do with words alone. Fortunately, there’s a new way Lens can help, with the ability to search skin conditions that are visually similar to what you see on your skin. Just take a picture or upload a photo through Lens, and you’ll find visual matches to inform your search. This feature also works if you&#39;re not sure how to describe something else on your body, like a bump on your lip, a line on your nails or hair loss on your head. This feature is currently available in the U.S.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;638&quot; data-original-width=&quot;377&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoetfbarM36LAkU33AabdBp2wJQ-YB_GqXaO7rgqIQkJXHiQhmQpL_T_jJwbocJ6BTfi4EAwH0aB6lmYtF4WxV8kchgQa5blRv2P18w5kjpoqPVf8bMU3A6lPMSNXvZ11pZc07tVxyOR3S5LrUGhwgOM7dSyC1okVIII9wzBGlnALRfwpToYIdD2eqvjeM/w378-h640/Google%20Lens.png&quot; width=&quot;378&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://lens.google/&quot; target=&quot;_blank&quot;&gt;Access Google Lens&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://lens.google/&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/08/medical-google-lens-can-now-review-skin.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoetfbarM36LAkU33AabdBp2wJQ-YB_GqXaO7rgqIQkJXHiQhmQpL_T_jJwbocJ6BTfi4EAwH0aB6lmYtF4WxV8kchgQa5blRv2P18w5kjpoqPVf8bMU3A6lPMSNXvZ11pZc07tVxyOR3S5LrUGhwgOM7dSyC1okVIII9wzBGlnALRfwpToYIdD2eqvjeM/s72-w378-h640-c/Google%20Lens.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-8933131036118784105</guid><pubDate>Fri, 11 Aug 2023 02:06:00 +0000</pubDate><atom:updated>2023-08-11T07:36:22.618+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tech Tips</category><title>cat alternative written in Go</title><description>&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;gat is an alternative to cat written in Go with additional features such as syntax highlighting in different languages, theme support, and beautiful text formatting.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;600&quot; data-original-width=&quot;1200&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvhYQ84RMRASBCVGULguba3f-vP422uZcRKuaaWndazGgcC1sbAZ-Gj8SFX-m3pZTaoRL8MgZJWMZ_UiT0_mBW842utYwJ5mskV9-c8i2Un_2saF0mQ2bIqz34T3A8es28xQzlRAXEvpIuykZt8L7GMI2dtN3m_VqV8-iq77WHwsWkSVDNWLv3ltC7YS6G/w640-h320/demo.gif&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/koki-develop/gat&quot; target=&quot;_blank&quot;&gt;Download GAT&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/koki-develop/gat&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/08/cat-alternative-written-in-go.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvhYQ84RMRASBCVGULguba3f-vP422uZcRKuaaWndazGgcC1sbAZ-Gj8SFX-m3pZTaoRL8MgZJWMZ_UiT0_mBW842utYwJ5mskV9-c8i2Un_2saF0mQ2bIqz34T3A8es28xQzlRAXEvpIuykZt8L7GMI2dtN3m_VqV8-iq77WHwsWkSVDNWLv3ltC7YS6G/s72-w640-h320-c/demo.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-1041275657273460789</guid><pubDate>Fri, 11 Aug 2023 02:03:00 +0000</pubDate><atom:updated>2023-08-11T07:33:05.385+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tech Tips</category><title>Open Source - Text-to-video Generation</title><description>&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;VideoCrafter is a set of text-to-video conversion and editing tools.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;VideoCrafter is an open-source video generation and editing toolbox for crafting video content.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;It currently includes the following THREE types of models:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Base T2V: Generic Text-to-video Generation&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;VideoLoRA: Personalized Text-to-Video Generation with LoRA&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;VideoControl: Video Generation with More Condition Controls&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;748&quot; data-original-width=&quot;1356&quot; height=&quot;354&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieY82-opBLvEunLpZ2IV_5-voQtGVdfWhWLx_w8nYpg3kBPeTce_3_WkCgfkjqc9IZVslz0ovJhDcXHnqhR9wE-xL6iH28dENQX-eKxYQH9toU9eCOwad6IiuveS9aI3dVwGcvwpNtnqxa9n8vU3LPkm-6AQxjqVmQqlV4F3G_pAoB85bT6FzviicXDUhK/w640-h354/Intro.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/VideoCrafter/VideoCrafter&quot; target=&quot;_blank&quot;&gt;Download VideoCrafter&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/VideoCrafter/VideoCrafter&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/08/open-source-text-to-video-generation.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieY82-opBLvEunLpZ2IV_5-voQtGVdfWhWLx_w8nYpg3kBPeTce_3_WkCgfkjqc9IZVslz0ovJhDcXHnqhR9wE-xL6iH28dENQX-eKxYQH9toU9eCOwad6IiuveS9aI3dVwGcvwpNtnqxa9n8vU3LPkm-6AQxjqVmQqlV4F3G_pAoB85bT6FzviicXDUhK/s72-w640-h354-c/Intro.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-4959615984727421062</guid><pubDate>Fri, 26 May 2023 09:01:00 +0000</pubDate><atom:updated>2023-05-26T14:31:34.665+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><title>Raspberry Pi  - Review Network communications to find suspicious connections</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;This tool provides a simple method for capturing network communications on a smartphone or other Wi-Fi enabled device, allowing for rapid analysis. It can be utilized to detect any dubious or harmful communication originating from a smartphone by utilizing heuristics or IoCs.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The team came up with the idea to create a small kiosk device that could be operated by non-technical individuals to test their phones for any malicious communications that may have been initiated by stalkerware or other spyware. The kiosk would be based on Raspberry Pi technology and would serve as a simple and efficient solution to this problem.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;It is not limited to detecting ordinary threats, as it can also identify any harmful communications originating from cybercriminals or even state-sponsored cyberattacks. Additionally, TinyCheck empowers users to expand their detection capabilities by adding their own Indicators of Compromise through a backend system, which enables them to detect hidden threats that may be present in their network communications.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;629&quot; data-original-width=&quot;1387&quot; height=&quot;290&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhx9zPG-L4cJ6IHg7q2QI_oBxzgr2ewBfiI5hMImKFGTVpSHYB-h9voBriPcFcFusHd4M61bkUpGWpq9__DC1B20PPezgHV-sx6WprRd_2kUWInjmRK-LAHN-RWuW9KXD0se9d_Mms6y8eKLHFgagUAw1EVQdf2IzuaPYArzjY9Ss3BiUFXd5pXtJKBtg/w640-h290/Tiny.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;TinyCheck can be used in several ways by individuals and entities:&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Over a network - TinyCheck is installed on a network and can be accessed from a workstation via a browser.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;In kiosk mode - TinyCheck can be used as a kiosk to allow visitors to test their own devices.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Fully standalone - By using a powerbank, two Wi-Fi interfaces or a 4G dongle and a small touch screen like in this video, you can tap any device anywhere.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/KasperskyLab/TinyCheck&quot; target=&quot;_blank&quot;&gt;Download Tool&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/KasperskyLab/TinyCheck&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/05/raspberry-pi-review-network.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhx9zPG-L4cJ6IHg7q2QI_oBxzgr2ewBfiI5hMImKFGTVpSHYB-h9voBriPcFcFusHd4M61bkUpGWpq9__DC1B20PPezgHV-sx6WprRd_2kUWInjmRK-LAHN-RWuW9KXD0se9d_Mms6y8eKLHFgagUAw1EVQdf2IzuaPYArzjY9Ss3BiUFXd5pXtJKBtg/s72-w640-h290-c/Tiny.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-2861398720684584623</guid><pubDate>Fri, 26 May 2023 08:58:00 +0000</pubDate><atom:updated>2023-05-26T14:28:21.078+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Jobs</category><title>JOB - India/Gurgaon - Cluster CIO - DB Schenker</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;DB Schenker is a division of German rail operator Deutsche Bahn that focuses on logistics. The company was acquired by Deutsche Bahn as Schenker-Stinnes in 2002. It comprises divisions for air, land, sea freight, and Contract Logistics.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Schenker AG and its many subsidiaries handle worldwide logistics operations including Land Transport, Air and Ocean Freight as well as Contract Logistics/SCM, and is part of the DB Schenker organization. Since 2016, rail freight business no longer operates under the brand DB Schenker Rail. Instead, it operates as a standalone business unit under the brand name DB Cargo in Deutsche Bahn Group.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;297&quot; data-original-width=&quot;1222&quot; height=&quot;156&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCAhUTTUkaCHMhhzf6cOBC40PJuiTA-3JdH0ORprGhOqzu46cee-wSDa3DrTssJKqfQH2p3bYWr71pm2y-GsfGmoHN_4cWRcC296HATdYHqtjs6RMAAYSQ-M775JZv8TE_ExeXGc6vXWTF9RtmGJh6DjNCtsfLbBRa-gidOOQLaWQOEjV725kEEQ6t0Q/w640-h156/DBSCIO.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://www.dbschenker.com/in-en/careers/jobs/joboffer-202305020008%23en&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;Apply here&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://www.dbschenker.com/in-en/careers/jobs/joboffer-202305020008%23en&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/05/job-indiagurgaon-cluster-cio-db-schenker.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCAhUTTUkaCHMhhzf6cOBC40PJuiTA-3JdH0ORprGhOqzu46cee-wSDa3DrTssJKqfQH2p3bYWr71pm2y-GsfGmoHN_4cWRcC296HATdYHqtjs6RMAAYSQ-M775JZv8TE_ExeXGc6vXWTF9RtmGJh6DjNCtsfLbBRa-gidOOQLaWQOEjV725kEEQ6t0Q/s72-w640-h156-c/DBSCIO.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-8188113930869586595</guid><pubDate>Fri, 26 May 2023 07:46:00 +0000</pubDate><atom:updated>2023-05-26T13:16:08.697+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">General</category><title>Indian Hotel and Restaurant Association launches it&#39;s own Food Delivery App.</title><description>&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Food Delivery segment in India is dominated by two giants - Swiggy &amp;amp; Zomato.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Waayu is backed by Indian Hotel and Restaurant Association (AHAR) with 8000+ member resultants. Waayu has collaborated with esteemed partners like Paytm, CCAvenue, Razorpay for Payment Gateway and EDC Machines, Dunzo, Grab and Shadow Fax for Delivery, a Facebook and Google for marketing and promotions.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Employing a software as a service (SaaS) model, &lt;b&gt;WAAYU does not charge any commission fees&lt;/b&gt;, allowing restaurants to price their dishes competitively and pass the savings on to customers.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Waayu app will help hotels and restaurants to log orders for food delivery without any commission. The app, which started its services in Mumbai. Its also onboarding restaurants from most parts of Mumbai BMC, Mira Bhayander, Navi Mumbai, Thane, Pune, Palghar, etc.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b style=&quot;font-family: verdana;&quot;&gt;The platform is also planning to integrate with the Open Network for Digital Commerce (ONDC).&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Indian Hotel and Restaurant Association (AHAR) had strong comments about multiple unicorn start ups of India in the past.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Food Delivery is live now. Are hotels next?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;501&quot; data-original-width=&quot;1374&quot; height=&quot;234&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia0lLekVEiEe5JuT00pPkyIaUgR0WOPzV5p0hm5ZbpNS_SMnxHnlvQEYJHNR1PDMZovg47RKQIDqrXjJuCpixyNZ1DTpXjHvzF_puIornI_zPu32yQvGbL6IWFit91Kk2gDdGVWQUSuAPkRSMSIdCj1dKslnxJNaGTKXozUSnQwin6jEty9Nf3DHhUgw/w640-h234/Waayu.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://waayu.app/&quot; target=&quot;_blank&quot;&gt;Download the App&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://waayu.app/&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/05/indian-hotel-and-restaurant-association.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia0lLekVEiEe5JuT00pPkyIaUgR0WOPzV5p0hm5ZbpNS_SMnxHnlvQEYJHNR1PDMZovg47RKQIDqrXjJuCpixyNZ1DTpXjHvzF_puIornI_zPu32yQvGbL6IWFit91Kk2gDdGVWQUSuAPkRSMSIdCj1dKslnxJNaGTKXozUSnQwin6jEty9Nf3DHhUgw/s72-w640-h234-c/Waayu.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-156770718619339909</guid><pubDate>Fri, 26 May 2023 07:42:00 +0000</pubDate><atom:updated>2023-05-26T13:12:41.149+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Jobs</category><title>JOB - India/Bangalore - Chief Of Staff - Truecaller</title><description>&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Truecaller is one of the most common app used in India; I don&#39;t use it though :)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Truecaller is looking for Chief Of Staff who will support our leadership teams operationally and enable them to execute faster and focus on the bigger picture by driving special projects and tasks. You will act as a trusted advisor to the executive team. You will manage important, organisation-wide initiatives from initial concept through execution.&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;321&quot; data-original-width=&quot;843&quot; height=&quot;244&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijnVG1l7f_m2vVPI45YbNUOtWcR0DXGSlFDGZuJ-qikCFrne23Nkp140KYIA2-iBnWB1Mg6tjGHNG8r_RHiqEcbRDCz5BQZNFB5HM9zh8KYHGlmMONU3HWd1ozP07qZt9T7cAnDC-UvHukcYyuDbtc4gvZyxjqwBsgd706RJhqzYooh268u9-K989lLQ/w640-h244/JOBTC.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b style=&quot;font-family: verdana;&quot;&gt;Note:&lt;/b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt; I don&#39;t get/charge any referral / commission for posting jobs. It&#39;s purely to help others looking for an opportunity.&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://boards.greenhouse.io/truecaller/jobs/5029197&quot; target=&quot;_blank&quot;&gt;Apply here&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://boards.greenhouse.io/truecaller/jobs/5029197&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/05/job-indiabangalore-chief-of-staff.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijnVG1l7f_m2vVPI45YbNUOtWcR0DXGSlFDGZuJ-qikCFrne23Nkp140KYIA2-iBnWB1Mg6tjGHNG8r_RHiqEcbRDCz5BQZNFB5HM9zh8KYHGlmMONU3HWd1ozP07qZt9T7cAnDC-UvHukcYyuDbtc4gvZyxjqwBsgd706RJhqzYooh268u9-K989lLQ/s72-w640-h244-c/JOBTC.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-776968182595920014</guid><pubDate>Fri, 26 May 2023 07:36:00 +0000</pubDate><atom:updated>2023-05-26T13:06:47.524+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tech Tips</category><title>1425 free APIs for use in software and web development</title><description>&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;In this article, you will find a comprehensive list of freely available APIs that can be utilized for software and web development purposes.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The APIs have been categorized into various topics, ensuring that users can easily navigate and select the one that best suits their needs.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;455&quot; data-original-width=&quot;1112&quot; height=&quot;262&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtbjkQKxkhN7kTb_uRIvS-5bHuXI4P64gXjxZAylh5VlWMymV1w-wPS-kLw7lsrDiZQPUO9PLtrwPayIk9QA-thTSNR2YhNBBBvFnMI37k-CRswG4n1nVn2zLE2XSbKTWFclIDlxAr3dvcJSOxpXoGCa43NbDWAKj8SYx7obGR-P1OYW5ofsVn9QAdzA/w640-h262/API.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/public-apis/public-apis&quot; target=&quot;_blank&quot;&gt;List of APIs&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://github.com/public-apis/public-apis&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/05/1425-free-apis-for-use-in-software-and.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtbjkQKxkhN7kTb_uRIvS-5bHuXI4P64gXjxZAylh5VlWMymV1w-wPS-kLw7lsrDiZQPUO9PLtrwPayIk9QA-thTSNR2YhNBBBvFnMI37k-CRswG4n1nVn2zLE2XSbKTWFclIDlxAr3dvcJSOxpXoGCa43NbDWAKj8SYx7obGR-P1OYW5ofsVn9QAdzA/s72-w640-h262-c/API.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8969617379636033882.post-6774964339592732186</guid><pubDate>Fri, 26 May 2023 07:32:00 +0000</pubDate><atom:updated>2023-05-26T13:03:48.305+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><title>FDA Announces New Cybersecurity Requirements for Medical Devices</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The US Food and Drug Administration (FDA) has announced that medical device manufacturers will now be required to fulfill certain cybersecurity standards when presenting an application for a new product. This decision has been taken in order to ensure the safety and security of the medical devices that are being introduced into the market. The FDA has identified the need for enhanced cybersecurity measures due to the growing number of cyber threats and attacks that have been witnessed in recent years. The new regulations will require manufacturers to incorporate robust security features and practices into their devices to prevent any potential cyber breaches. The FDA is hopeful that this move will not only protect patients but also create a more secure and trustworthy healthcare system.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The agency issued guidance on March 30, which outlines new requirements that are a result of the Consolidated Appropriations Act. This act was signed into law in late 2022 and includes a section called &quot;Ensuring Cybersecurity of Medical Devices&quot;, which made changes to the Federal Food, Drug, and Cosmetic Act. The purpose of these requirements is to enhance the cybersecurity of medical devices.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The FDA has mandated that new medical device submissions must provide comprehensive information regarding cybersecurity, including the provision of a plan that outlines the identification and resolution of potential security threats and exploits within a reasonable timeframe.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;It is important for companies to disclose the methods and protocols they use to issue updates and patches after a product has been released in the market. This includes the provision of routine updates and the issuance of out-of-band patches specifically designed to address critical vulnerabilities and security concerns.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;As part of the information required by the FDA, a comprehensive software bill of materials (SBOM) for all commercial, open source, and pre-manufactured components must be provided.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The criteria are relevant to devices that are capable of connecting to the internet, run software, and have the potential to be susceptible to digital security hazards, commonly known as cyber devices.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://thesecureplanet.com&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;526&quot; data-original-width=&quot;1071&quot; height=&quot;314&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGw0wPieGboXmiVcFC42Av_SCencpvSK3LsGf8FruwSaEkTZHhlqhl3u95ab35yMs5iyS_upTY7zLosAjBVuhhSHawgSYhOeRKL7gmMUyqTpPFOStDSRAtsCqbY_AdiJautxiSw7D2vkPJAXmriEs4h42vFMdKsW1aU7fR88wv4NJ14ebOZf5odfeohA/w640-h314/FDA.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://www.fda.gov/media/166614/download&quot; target=&quot;_blank&quot;&gt;Guidance Document&lt;/a&gt;&lt;/div&gt;&lt;a class=&quot;button transparent blue&quot; href=&quot;https://www.fda.gov/media/166614/download&quot; target=&quot;_blank&quot;&gt;&lt;i class=&quot;fa fa-cloud-download&quot;&gt;&lt;/i&gt;&lt;/a&gt;</description><link>http://www.thesecureplanet.com/2023/05/fda-announces-new-cybersecurity.html</link><author>noreply@blogger.com (The Secure Planet)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGw0wPieGboXmiVcFC42Av_SCencpvSK3LsGf8FruwSaEkTZHhlqhl3u95ab35yMs5iyS_upTY7zLosAjBVuhhSHawgSYhOeRKL7gmMUyqTpPFOStDSRAtsCqbY_AdiJautxiSw7D2vkPJAXmriEs4h42vFMdKsW1aU7fR88wv4NJ14ebOZf5odfeohA/s72-w640-h314-c/FDA.png" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>