×
What is Streaming technology?
Streaming is a technology that allows you to listen to the sound as soon as it is downloaded. Previously, you had to download the entire audio file to be able to listen to it. Streaming allows you to listen to the file before finishing the download. How does the Streaming service work?
Streaming is a service that has been designed for live Audio/Video broadcasts over the Internet. You send the audio/video signal to our streaming servers (broadcast servers) and your listeners connect to the streaming server over the Internet to listen to the live audio signal. The means by which your listeners can connect to your radio can be a web page that includes the audio player or they can also listen to it directly through Windows Media Player, Winamp, QuickTime or RealPlayer. You can have more information at http://www.idstt.org/

How do I control my streaming service?

All streaming plans include a control panel (centovacast), from this control panel you can, among other functions:

- Access your console using username and password.
- Check the number of connected listeners.
- Advanced graphical statistics.
- Ban an IP
- Activate Auto DJ.
- Manage your playlists
- Start/Stop the streaming server

Is there a cost to sign up?

No, all Gospel iDEA streaming plans have the setup cost included.

Is there a cost to sign up?

No, all Gospel iDEA streaming plans have the setup fee included.

What do I need to stream my radio online?

The minimum requirements are a PC (we recommend Windows XP), a properly installed sound card and an Internet connection. In addition, you need to have Winamp and the ShoutCast DSP plugin installed.

The minimum requirements for your computer are:

-Minimum Internet connection: 256 Kbps
-Sound Card: Any
-Pentium 100 Mhz processor

Cybersecurity is the area of ​​action that aims to guarantee the security and protection of information and the technological infrastructure generally associated with Internet Security. This technology can be corporate in nature, such as servers, databases, routers, firewalls, among others, but it also focuses on individual information, such as computers, mobile devices or even IoT (Internet of Things) devices.


Data protection is increasingly an area of ​​vital importance not only for companies, but also from a personal point of view, since the use of information technologies grows exponentially, thus increasing the need and risk of information security.

Cybersecurity is a very broad area of ​​action with application not only limited to information technologies, but also to the components of processes and people (users), since these are also potential vectors of attack and exploitation of potential vulnerabilities with techniques such as social engineering.


Cybersecurity is the practice that works consistently to assess risk and make structured risk management and mitigation decisions, in order to minimize them to an acceptable level, taking into account their benefit.


Who are the attackers?

Around 70% of attackers have the sole intention of cybercrime, and the rest are made up of online activists (hacktivism), espionage, among others.


In the context of cybercriminals, there is a growing trend of organized, structured and financed groups, with the purpose of obtaining economic gains. These groups act as a real company, with professionals dedicated to cybercrime and with areas of specialization, according to the different types of cyberattacks and objectives.

What types of cyber attacks exist?

Imagine a scenario in which there is a burglary in a house with the aim of taking your material goods. In common language, the attack would be described as a “home robbery”, however, the home robbery had an entry vector, imagine that it had been the breaking of the lock.

Thus, in terms of cyber attacks, the following attack vectors are very common:


- Exploitation of technological vulnerabilities (known and that could be solved with an update, or unknown and called 0-Day) - Exploitation of authentication weaknesses - Exploitation of insecure design of architectures and systems - Exploitation of weak processes - Exploitation of flaws in the means of access to the Internet - Exploitation of insecure code/applications - Exploitation of insecure protocols - Exploitation of absence of technological controls - Exploitation of the lack of knowledge or preparation of the human vector through social engineering attacks - Among others

The terms used to describe the most common attacks, specifically, Ransomware, Phishing, Malware, Eavesdropping, Sql Injection, Zero-Day, among others, always leverage one or more of the attack vectors detailed above.


×

Notice!!

IDSTT | Business Software development company