Quantcast
Channel: Brain Book
Browsing all 195 articles
Browse latest View live

NETWORK SECURITY SCANNING TOOLS

Network Security Scanning ToolsVulnerability scanning of a network needs to be done from both within the network as well as without (from both “sides” of the firewall). The approach I would suggest is...

View Article


VULNERABILITY ASSESSMENT TOOLS

Vulnerability scanning toolsVulnerability assessment tools1. Nessus (https://store.tenable.com)Nessus provides the largest collection of network security checks, extensive configuration and compliance...

View Article


COMMON STOLEN PASSWORDS FOR THE YEAR 2013

Adobe major security breach in October affected upwards of 48 million users. A list of passwords from the Adobe breach had “123456” on top, followed by “123456789” and “password.” Adobe passwords...

View Article

Image may be NSFW.
Clik here to view.

AVERAGE EPS FOR SIEM

EPS for SIEM DeploymentSANS Baseline Network Device EPS Averages, provides a breakdown of Average, Peak and Averaged Peak EPS for different systems logs are collected from. Each total below is the...

View Article

IPv6

IPv6 Addressing:IPv6 has moved from a 32-bit address space to a 128-bit address space. Therefore the need for Classless Inter-Domain Routing (CIDR) is no longer needed because the number of addresses...

View Article


Image may be NSFW.
Clik here to view.

LTSP - Linux Terminal Server Project

The Linux Terminal Server Project adds thin client support to Linux servers. LTSP is a flexible, cost effective solution that is empowering schools, businesses, and organizations all over the world to...

View Article

RHEV COMPARISON WITH VSPHERE 5.5 AND HYPER-V

RED HAT ENTERPRISE VIRTUALIZATION COMPARISON WITH VMWARE VSPHERE 5.5 AND MICROSOFT HYPER-V 2012FEATURESRED HAT ENTERPRISE VIRTUALIZATIONVMWARE VSPHERE 5.5MICROSOFT HYPER-V...

View Article

Image may be NSFW.
Clik here to view.

HP SERVERS NIC TEAMING IN WINDOWS

HP Servers NIC Teaming in WindowsWhat is Teaming?Teaming NICs is used when you need to group several NICs and make them act as one, Teaming NICs provide fault tolerance, reduce network spikes and...

View Article


Image may be NSFW.
Clik here to view.

VSAT - Very Small Aperture Terminal

VSAT - VERY SMALL APERTURE TERMINAL A very small aperture terminal (VSAT), is a two-way satellite ground station or a stabilized maritime VSAT antenna with a dish antenna that is smaller than 3 meters....

View Article


Image may be NSFW.
Clik here to view.

DTH - Direct To Home

DTH (Direct To Home)DTH stands for Direct-To-Home television. DTH is defined as the reception of satellite programmes with a personal dish in an individual home.A designation broader than DBS would be...

View Article

Image may be NSFW.
Clik here to view.

iSCSI, TARGET AND LUN

What is iSCSI?iSCSI - Internet SCSI (Small Computer System Interface) iSCSI is an IP-based storage networking standard for linking data storage facilities, developed by the Internet Engineering Task...

View Article

INSTALL OPENOFFICE 4 ON LINUX MINT

How to Install Apache OpenOffice 4 on Linux Mint?Apache OpenOffice, commonly known as OpenOffice.org, OOo or OpenOffice, is an open-source office productivity software suite whose main components are...

View Article

SQUID ON CENTOS

How to install and configure squid on Centos?How to install and configure squid on Fedora?1. Open terminal to install squidCtrl + Alt + T2. install as rootyum install squid3. Edit squid.confnano...

View Article


Image may be NSFW.
Clik here to view.

CISCO IOS DHCP

How to Configure Cisco IOS DHCP ?DHCP:Dynamic Host Configuration Protocol is a protocol that allows you to automatically configure the settings of the devices on your network. For a device such as a...

View Article

RSYNC BACKUP

rsync:rsync is a file transfer program for Unix systems. rsync uses the "rsync algorithm" which provides a very fast method for bringing remote files into sync. It does this by sending just the...

View Article


COMPUTER VIRUS, WORM, MALWARE AND TROJAN HORSE

What is Computer Virus?Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.A computer virus might corrupt or...

View Article

REGEX - REGULAR EXPRESSIONS

What is REGEX?A regular expression (abbreviated regex or regexp) is a sequence of characters that forms a search pattern, mainly for use in pattern matching with strings, or string matching..Matches...

View Article


Image may be NSFW.
Clik here to view.

EIGRP ON A Cisco ASA Firewall

How to Configure EIGRP on a Cisco ASA Firewall?The Cisco Adaptive Security Appliance is an integrated security equipment that can perform a variety of functions like firewall, intrusion prevention,...

View Article

Image may be NSFW.
Clik here to view.

PORT SECURITY ON CISCO SWITCH

How to Enable or Disable Port Security on a Cisco Switch?The Basics:In its most basic form, the Port Security feature remembers the Ethernet MAC address connected to the switch port and allows only...

View Article

DNS ON CENTOS 6

How to install and configure DNS on Centos?How to install and configure Bind on Centos?How to install and configure Caching only DNS Server?## Install bind on centos using 'yum'yum install bind*## edit...

View Article
Browsing all 195 articles
Browse latest View live