Quantcast
Channel: Brain Book
Browsing all 195 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

VIPER IT PRODUCTS

http://viper.pk/viperpk/?page_id=1027GOOD TO SEE COMPACT IT PRODUCTS FROM VIPER....!Big performance in a small packageGeneral Specifications:CPU: Intel® Core i3/CeleronGraphics: Intel® HD 4000 Support...

View Article


Image may be NSFW.
Clik here to view.

ISO/IEC 27001 DOMAINS

ISO 27001 DOMAINS CATEGORIZATION

View Article


IBM Security QRadar SIEM

IBM Security QRadar SIEMSecurity intelligence for protecting assets and information from advanced threatsIBM® Security QRadar® SIEM consolidates log source event data from thousands of devices...

View Article

Image may be NSFW.
Clik here to view.

SNORT - IDS

What is Intrusion Detection?Intrusion detection is a set of techniques and methods that are used to detect suspicious activity both at the network and host level.Intrusion detection systems fall into...

View Article

APACHE HADOOP

Apache™ Hadoop® project develops open-source software for reliable, scalable, distributed computing. The Apache Hadoop software library is a framework that allows for the distributed processing of...

View Article


EVENTUM - INSTALLATION AND CONFIGURATION

Eventum is a user-friendly and flexible issue tracking system that can be used by a support department to track incoming technical support requests, or by a software development team to quickly...

View Article

HYPER-V - FREE CERTIFICATION

MICROSOFT HYPER-V CERTIFICATION IS FREE (WITH VOUCHER) TILL JUNE 2014FOLLOW BELOW LINKhttp://www.virtualizationsquared.com/#section-introcreate your account and submit hyper-v training then you can get...

View Article

SE-TOOLKIT CAN'T UPGRADE

social engineering svn 'http://svn.trustedesec.com/social_engineering_toolkit' path not founderror processing se-toolkitse-toolik was moved to gitAlter your vi...

View Article


Image may be NSFW.
Clik here to view.

IDENTIFY PHISHING EMAIL

Be Careful....!

View Article


Image may be NSFW.
Clik here to view.

SECURE YOUR DEVICE

View Article

NTP DDos ATTACK

OverviewUDP protocols such as NTP can be abused to amplify denial-of-service attack traffic. Servers running the network time protocol (NTP) based on implementations of ntpd prior to version 4.2.7p26...

View Article

Image may be NSFW.
Clik here to view.

VMWARE PLAYER ERROR

ERROR WHILE POWERING ON: INTERNAL ERROROpen ContolPanel --> Administrative Tools --> ServicesRun the "VMware Authorization Service" and set it to "Automatic"

View Article

Image may be NSFW.
Clik here to view.

QRadar SIEM ARCHITECTURE

QRADAR QLABS SIEM ARCHITECTUREQRADAR SIEM APPLIANCES ARCHITECTUREQRadar SIEM (Security Information & Event Management) collects information that includes:Security events: Events from firewalls,...

View Article


SSD Vs HDD Comparison

SSD Vs HDD ComparisonAttributeSSD (Solid State Drive)HDD (Hard Disk Drive)Power Draw / Battery LifeLess power draw, averages 2 – 3 watts, resulting in 30+ minute battery boostMore power draw, averages...

View Article

SAN Vs NAS Comparison

SAN Vs NAS The primary difference between NAS and SAN solutions is the type of access protocol. NAS protocols such as NFS and CiFS provide shared file level access to storage resources. The management...

View Article


PCoIP (PC over IP)

PCoIPPCoIP is a high performance display protocol purpose-built to deliver virtual desktops and to provide end users with the best, total rich desktop experience regardless of task or location. With...

View Article

Image may be NSFW.
Clik here to view.

ZERO CLIENT (UTC-ULTRA THIN CLIENT)

ZERO CLIENT (UTC - Ultra Thin Client)A zero-client is an I/O redirector device that allows peripheral devices to be deployed at the desired point of service without a dedicated PC or thin client at...

View Article


NIKTO2 INSTALLATION & USAGE

NIKTO2Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/CGIs, checks for...

View Article

Image may be NSFW.
Clik here to view.

EMAIL SYSTEM ARCHITECTURE WITH ACTIVE DIRECTORY

EMAIL SYSTEM ARCHITECTURE WITH AD & CYRUS-IMAPThe Cyrus-IMAP package is proven to be robust and suitable in large settings. It differs from other Maildir or mbox IMAP servers in that it is intended...

View Article

WEB SECURITY SCANNING TOOLS

Web Security Scanning ToolsScanning websites is an entirely different ballgame from network scans. In the case of websites, the scope of the scan ranges from Layer 2 to 7, considering the intrusiveness...

View Article
Browsing all 195 articles
Browse latest View live