VIPER IT PRODUCTS
http://viper.pk/viperpk/?page_id=1027GOOD TO SEE COMPACT IT PRODUCTS FROM VIPER....!Big performance in a small packageGeneral Specifications:CPU: Intel® Core i3/CeleronGraphics: Intel® HD 4000 Support...
View ArticleIBM Security QRadar SIEM
IBM Security QRadar SIEMSecurity intelligence for protecting assets and information from advanced threatsIBM® Security QRadar® SIEM consolidates log source event data from thousands of devices...
View ArticleSNORT - IDS
What is Intrusion Detection?Intrusion detection is a set of techniques and methods that are used to detect suspicious activity both at the network and host level.Intrusion detection systems fall into...
View ArticleAPACHE HADOOP
Apache™ Hadoop® project develops open-source software for reliable, scalable, distributed computing. The Apache Hadoop software library is a framework that allows for the distributed processing of...
View ArticleEVENTUM - INSTALLATION AND CONFIGURATION
Eventum is a user-friendly and flexible issue tracking system that can be used by a support department to track incoming technical support requests, or by a software development team to quickly...
View ArticleHYPER-V - FREE CERTIFICATION
MICROSOFT HYPER-V CERTIFICATION IS FREE (WITH VOUCHER) TILL JUNE 2014FOLLOW BELOW LINKhttp://www.virtualizationsquared.com/#section-introcreate your account and submit hyper-v training then you can get...
View ArticleSE-TOOLKIT CAN'T UPGRADE
social engineering svn 'http://svn.trustedesec.com/social_engineering_toolkit' path not founderror processing se-toolkitse-toolik was moved to gitAlter your vi...
View ArticleNTP DDos ATTACK
OverviewUDP protocols such as NTP can be abused to amplify denial-of-service attack traffic. Servers running the network time protocol (NTP) based on implementations of ntpd prior to version 4.2.7p26...
View ArticleVMWARE PLAYER ERROR
ERROR WHILE POWERING ON: INTERNAL ERROROpen ContolPanel --> Administrative Tools --> ServicesRun the "VMware Authorization Service" and set it to "Automatic"
View ArticleQRadar SIEM ARCHITECTURE
QRADAR QLABS SIEM ARCHITECTUREQRADAR SIEM APPLIANCES ARCHITECTUREQRadar SIEM (Security Information & Event Management) collects information that includes:Security events: Events from firewalls,...
View ArticleSSD Vs HDD Comparison
SSD Vs HDD ComparisonAttributeSSD (Solid State Drive)HDD (Hard Disk Drive)Power Draw / Battery LifeLess power draw, averages 2 – 3 watts, resulting in 30+ minute battery boostMore power draw, averages...
View ArticleSAN Vs NAS Comparison
SAN Vs NAS The primary difference between NAS and SAN solutions is the type of access protocol. NAS protocols such as NFS and CiFS provide shared file level access to storage resources. The management...
View ArticlePCoIP (PC over IP)
PCoIPPCoIP is a high performance display protocol purpose-built to deliver virtual desktops and to provide end users with the best, total rich desktop experience regardless of task or location. With...
View ArticleZERO CLIENT (UTC-ULTRA THIN CLIENT)
ZERO CLIENT (UTC - Ultra Thin Client)A zero-client is an I/O redirector device that allows peripheral devices to be deployed at the desired point of service without a dedicated PC or thin client at...
View ArticleNIKTO2 INSTALLATION & USAGE
NIKTO2Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/CGIs, checks for...
View ArticleEMAIL SYSTEM ARCHITECTURE WITH ACTIVE DIRECTORY
EMAIL SYSTEM ARCHITECTURE WITH AD & CYRUS-IMAPThe Cyrus-IMAP package is proven to be robust and suitable in large settings. It differs from other Maildir or mbox IMAP servers in that it is intended...
View ArticleWEB SECURITY SCANNING TOOLS
Web Security Scanning ToolsScanning websites is an entirely different ballgame from network scans. In the case of websites, the scope of the scan ranges from Layer 2 to 7, considering the intrusiveness...
View Article