Falkner Tree Template

Falkner Sphere Template Falkner Sphere Template

Falkner Tree Template

Falkner Sphere Template Falkner Sphere Template

Falkner Tree Template

Falkner Sphere Template Falkner Sphere Template

Falkner Tree Template

Falkner Sphere Template Falkner Sphere Template
Latest News

Prueba de articulo grande

Posted by AlPoza on 3.11.09 , under | comentarios (0)



Mapping ITIL V3 with Cobit 4.1
ISACA ha publicado el documento de mapeo entre ITIL V3 y Cobit 4.1; es el resultado de un trabajo que era bastante complicado de hacer, ya que como en los demás documentos de mapeo, se intenta realizar un análisis de cómo se referencia cada uno de los objetivos de control detallados de Cobit en ITIL V3 y para poder hacer esto el equipo de trabajo debe tener grandes conocimientos de ambos extremos de la comparación.


wProxy.com

Posted by AlPoza on 4.8.05 , under | comentarios (0)



Navegador anónimo via web
wProxy.com

Libros Maravillosos

Posted by AlPoza on 3.8.05 , under | comentarios (0)


PreGrant Publication Database Search Results: AN/Microsoft in PGPUB Production Database

Posted by AlPoza on 1.8.05 , under | comentarios (0)



Patentes solicitadas por Microsoft recientemente, o lo linea de negocio que parece quiere seguir para los próximos años:

PreGrant Publication Database Search Results: AN/Microsoft in PGPUB Production Database

Revista de Derecho Inform�tico: Alfa-redi

Posted by AlPoza on 7.7.05 , under | comentarios (0)


Revista de Derecho Inform�tico: Alfa-redi

Posted by AlPoza on , under | comentarios (0)


Apuntes de seguridad de la informaci�n: octubre 2004

Posted by AlPoza on , under , | comentarios (0)



Apuntes de seguridad de la informaci�n: octubre 2004: "Apuntes de seguridad de la informaci�n"

Free online network utilities - traceroute, nslookup, automatic whois lookup, ping, finger

Posted by AlPoza on 29.6.05 , under | comentarios (0)


Caldoso: b�squedas en el BOE

Posted by AlPoza on 22.6.05 , under | comentarios (0)


LAS DISTORSIONES COGNITIVAS

Posted by AlPoza on , under | comentarios (0)


Visor

Posted by AlPoza on 16.6.05 , under | comentarios (0)


Finding Information on the Internet: A Tutorial

Posted by AlPoza on 4.6.05 , under | comentarios (0)


Cerrar resultSet antes de PreparedStatemetns

Posted by AlPoza on 2.6.05 , under | comentarios (0)



dev2dev Online: "Leaks are application dependent, not driver dependent.
The new driver is 100% completely different than the old driver you were
using. Zero code in common. Regarding the 'already-closed' exception,
check your code. If you close a statement before it's resultset, that
can cause the issue. The spec says closing the statement will automatically
close the result set. The spec says the behavior of a result set that is
already closed is undefined, so closing it again could get you that
exception."

Seguridad

Posted by AlPoza on 16.5.05 , under | comentarios (0)



Seguridad: "dgonzalez.net

Seguridad informática
Artículos

Sistemas de Detección de Intrusiones, versión 1.01 - Julio 2003. [pdf] [zip (pdf)] [zip (html)]

Amplio trabajo de documentación sobre Sistemas de Detección de Intrusiones (IDS), licenciado bajo GNU FDL, que trata sobre diversos aspectos relacionados con este tipo de sistemas de seguridad informática. Está disponible en formato PDF (copia "Opaca" (Opaque), según los términos de GNU FDL) y en HTML (copia "Transparente").

Dipositivas sobre IDS, versión 1.0 - Julio 2003. Color [pdf]. B/N [pdf]

Diapositivas utilizadas durante la presentación del documento anterior, tanto en formato PDF como en HTML.

Marco legal en Europa y España sobre delitos informáticos - Junio, 2003

Descripción de los aspectos legales asociados a las nuevas tecnologías en España, partiendo de su relación con Europa. Procurando destacar en la medida de lo posible aquellos puntos relacionados con la seguridad.

Cables UTP de sólo recepción y "Network Taps" - Última actualización: Julio 2004. [pdf]

Receive-only UTP Cables and Network Taps - Last update: July, 2004. [pdf]

Los cables de sólo recepción son especialmente útiles a la hora de utilizarlos conjuntamente con sniffers y hubs para monitorizar el tráfico de una red sin ser detectado, y sin afectar al rendimiento de la misma. También se comentan en detalle y con algunos ejemplos de implementación la alternativa a estos cables; los Network Taps, soluciones profesionales que permiten pinchar comunicaciones de red de forma similar a como se haría con un enlace telefónico.

Building a GenII Honeynet Gateway - Last update: August, 2004.

Guía paso a paso en inglés sobre la construcción de un "Honeywall" bajo GNU/Linux. En este documento se asume que el lector está familiarizado con los términos y conceptos discutidos en la serie de documentos Know Your Enemy.

Installing a Virtual Honeywall using VMware - Last update: September, 2004.

Guía en inglés para la implementación de un "Honeywall" Virtual utilizando VMware, reuniendo las ventajas ofrecidas por el Honeywall CDROM y los entornos virtuales.
Recursos

Guía en inglés para la implementación de un "Honeywall" virtual utilizando VMware, reuniendo las ventajas ofrecidas por el Honeywall CDROM y los entornos virtuales

Bolet�n OCS

Posted by AlPoza on 5.5.05 , under | comentarios (0)



Bolet�n OCS: "Jornadas: Democracia digital, e-administraci�n y participaci�n ciudadana a trav�s de redes telem�ticas (11.03.2005)"

Taller de Criptograf�a - Informes

Posted by AlPoza on 4.5.05 , under | comentarios (0)



Taller de Criptograf�a - Informes: "Informes y Expedientes de criptografia y seguridad en España (LSSI, FNMT, ENFOPOL, ECHELON, PGP, etc."

MANUAL DEL CONSULTOR EN P�RDIDA DESCONOCIDA. SEMINARIO PARA LA PREVENCI�N Y CONTROL DEL HURTO Y OTRAS V�AS DE P�RDIDA DESCONOCIDA

Posted by AlPoza on 27.4.05 , under | comentarios (0)


JRadius

Posted by AlPoza on 9.4.05 , under | comentarios (0)



JRadius: "Java to implement RADIUS business logic".
JRadius is not a stand-alone RADIUS server -- why reinvent the wheel especially when there are excellent open-source RADIUS servers, namely FreeRADIUS.
The basic components and data flow of JRadius using FreeRADIUS:

JSSE in Java 2 SDK, v1.5.0 Beta2

Posted by AlPoza on 6.4.05 , under | comentarios (0)



Documento para la creación de aplicaciones servidor que requieran utilizar SSL/TLS utilizando Non-blocking I/O (solo con j2sdk 1.5 o superior). Podemos utilizar kerberos utilizando o no JAAS programing:
JSSE in Java 2 SDK, v1.5.0 Beta2

Tambien es interesante la guía de referencia para JSSE (Java Secure Socket Extension) para el jsdk 1.5.0.

Para utilizar JSEE con kerberos se puede consultar los siguientes Links:
Use of JavaTM GSS-API for Secure Message Exchanges Without JAAS Programming
Use of JAAS Login Utility and JavaTM GSS-API for Secure Message Exchanges

Java server performance: A case study of building efficient, scalable Jvms

Posted by AlPoza on , under | comentarios (0)



Java server performance: A case study of building efficient, scalable Jvms: "
Java server performance: A case study of building efficient, scalable Jvms"

Raining Sockets - High Performance IO in Java

Posted by AlPoza on 5.4.05 , under | comentarios (0)


DSG

Posted by AlPoza on 25.3.05 , under | comentarios (0)



DSG Distributed Systems Group:
They activities focus on:

- Grid architectures for QoS aware content distribution in the University community
[see the IBM Faculty Award project page]

- Multimedia Streaming in Wired and Wireless Networks
- Service-Oriented P2P Architecture [see also the FIRB Web Minds page]

- Parallel and Distributed Processing
[many projects]

Using the XML HTTP Request object

Posted by AlPoza on 22.3.05 , under | comentarios (0)



Using the XML HTTP Request object: "Using the XML HTTP Request object"

Java HotSpot VM Options

Posted by AlPoza on 14.3.05 , under | comentarios (0)



Java HotSpot VM Options: "JavaTM HotSpot VM Options"

Sobre Patterns for Concurrent, Parallel, and Distributed Systems

Posted by AlPoza on , under | comentarios (0)


HTMLWeb - Articulos sobre Seguridad Informatica, Criptografia, Criptoanalisis, SSL, SET, DES, RSA, PGP, encriptacion, cifrado simetrico, cifrado asime

Posted by AlPoza on 4.3.05 , under | comentarios (0)


Tutorial y Descripción Técnica de TCP/IP

Posted by AlPoza on 22.2.05 , under | comentarios (0)



index: "Tutorial y descripción técnica de TCP/IP"

Choosing the right workflow implementation with BizTalk Server 2004

Posted by AlPoza on 10.2.05 , under | comentarios (0)



Choosing the right workflow implementation with BizTalk Server 2004
BizTalk Server 2004 has a three-pronged strategy for integration of people inside processes, commonly termed workflow. The purpose of this document is to explain the three approaches and also to enable users to qualify which approach is most suitable for their particular workflow scenario.

Business processes invariably include interactions between applications, trading partners and people. While one of the key value propositions for business process automation is the reduction of unnecessary manual steps, even the most automated business processes require people to manage exceptions. For example, in a “fully automated” purchase order process, people may need to make decisions on whether a purchase order should be approved despite the fact the order may exceed a limit stored in a computer. For this reason, including people inside processes is very important in business process automation.

Typically the people involved in business processes are information workers who rely on productivity tools such as Microsoft Office for much of their work. Rather than requiring information workers to learn and maintain new technology, it is critical that business process automation technology leverage the desktop tools that are already in use.

As described below, the key qualification questions to determine which scenario is most appropriate are:
· Is the workflow structured and designed a priori or is it built adhoc on the fly within a set of parameters?
· Does the workflow involve specific users or user roles for a particular step?
· Is the user interface to the workflow a form, a portal or both?
· Who creates or modifies the workflow – is it a power user or a developer?

Solution I: Orchestration with user interfaces such as InfoPath and portals such as SharePoint.
BizTalk Server Orchestration enables developers to graphically create business processes which include steps that send and receive information from applications and people.

In combination with InfoPath, developers can design structured workflows including form based information. BizTalk Server has native support for InfoPath enabling users to:
· Submit InfoPath documents to BizTalk Server through web services
· Manipulate the InfoPath form contents to create new forms
· Update information in an existing form within BizTalk Server.

In combination with the SharePoint Portal Server adapter sample, available as a web download, developers can design structured workflows for collaborative portal scenarios. Specifically documents, such as InfoPath documents, can be sent to or retrieved from SharePoint document libraries as part of a business process.

Solution I enables a significant number of workflow scenarios including:
I) Simple Expense report approval. For example an email notification is sent to Scott referring him to a SharePoint site containing an expense report for approval. The expense report is opened inside InfoPath, the approved flag is set on the form, the document is saved back into Sharepoint and the business process takes the approved report and automatically updates the reporting system.
II) Simple Purchase order approval. Jane uploads a purchase order to a SharePoint site for approval. The business process retrieves the order and sends it to Jane’s manager for approval.
In these scenarios there is no role-based hierarchical escalation, nor any visibility into the process outside of orchestration.

It is expected that orchestrations will migrate to future product versions.

Solution II: HWS with user interfaces such as InfoPath
Human workflow services (HWS) build on top of the BizTalk Orchestration functionality specifically adding the ability to create workflow paths at runtime in an adhoc manner within specific constraints, and direct workflow to people in roles for role based hierarchical escalation.

HWS is an API exposed as a web-service and is very developer centric with typically a longer learning curve and development cycle than Solution I. HWS does not provide a design-surface targeting non-developers such as power-users. Customers requiring power user design tools should investigate option III below.

InfoPath SP1 provides support for HWS through a task-pane plug-in that enables users to surface workflow specific information directly inside the product. The ROI of an HWS and InfoPath solution is greater than a stand-alone HWS solution because of the built-in integration inside InfoPath SP1.

HWS functionality should be considered for tactical implementations with specific current requirements for the functionality described above. HWS will remain fully supported with no feature enhancements in the next version of Biztalk Server. The API set will be supported by PSS for at least ten years. However, the HWS APIs will likely be removed in the Longhorn Server timeframe. In the Longhorn Server timeframe concepts from HWS will be incorporated into the next generation orchestration technology for BizTalk Server and the broader platform. It is very likely that conversion from HWS to the Longhorn Server offering will be non-trivial as no automated migration is currently planned.

Scenarios for Solution II include:
I) Adhoc & Proposal Process with hierarchical roles using InfoPath: Jane, Scott and Imran collaborate on the contents of a proposal. The scenario involves multiple steps that are not predefined by the workflow model, but rather chosen by users as they progress through the workflow. The status of the workflow and participants involved can be queried at runtime and surfaced through the InfoPath taskpane.
II) Adhoc or Modeled Content approval Process with hierarchical roles: Content is uploaded to SharePoint and multiple users interact with the content to approve it. The user interface is a custom developed web part for SharePoint which in general is developer intensive.

Solution III: Workflow ISV Partner Offerings
ISV Partner offerings such as Sourcecode’s K2, Ultimus, and Captaris TeamPlate provide graphical design surfaces that target power users, rather than developers. In the case of K2 the product embeds BizTalk Server 2004 and therefore includes all of the capabilities described in solutions I and II and additional advanced Human Workflow capabilities. The key criteria for the choice partner products include: graphical design, graphical workflow debugging, Office integration, and in some cases a priori simulation.

Scenarios for workflow ISV partner offerings include:
I) Power-user graphical design, debugging and tracking of any of the workflow process described above.
II) Support for hierarchical roles: This is similar to scenario two for HWS but with the addition of graphical organization viewers, simulation and workload balancing.

With BizTalk Server 2004, Microsoft provides 3 levels of workflow support enabling people, trading partners and applications to be connected inside a single business process.

Ciencias de la Computación e Inteligencia Artificial.

Posted by AlPoza on 4.2.05 , under | comentarios (0)



Ciencias de la Computación e Inteligencia Artificial.: "Ingeniería en Informática: Universidad Sevilla"

Open Source Testing

Posted by AlPoza on 20.1.05 , under | comentarios (0)



Open Source Testing: "Open source tools for software testing professionals"

Sys-Security.com - Because Security is not Trivial

Posted by AlPoza on 13.1.05 , under | comentarios (0)


As� no son las cosas

Posted by AlPoza on 12.1.05 , under | comentarios (0)



Así no son las cosas
Un blog sobre las noticias de actualidad

dBpowerAMP

Posted by AlPoza on 10.1.05 , under | comentarios (0)



dBpowerAMP Music Converter: Often called a Swiss army knife of Audio. Support Mp3, Ogg Vorbis, WMA, FLAC and Monkeys Audio.

Revista - Horno Artesano

Posted by AlPoza on 3.1.05 , under | comentarios (0)



Recetas y reportajes de cocina
Revista - Horno Artesano

Últimas Tendencias de las Nuevas Tecnologías aplicadas a la Seguridad

Posted by AlPoza on 29.12.04 , under | comentarios (0)



Últimas Tendencias de las Nuevas Tecnologías aplicadas a la Seguridad:
Colaboraci�n para la Seguridad del Territorio Nacional

HowTo LiveCD

Posted by AlPoza on 20.12.04 , under | comentarios (0)



HowTo LiveCD: "Building a LiveCD with Mandrakelinux 10.0 OE"

Meebo Bar