NETWORK SECURITY SCANNING TOOLS
Network Security Scanning ToolsVulnerability scanning of a network needs to be done from both within the network as well as without (from both “sides” of the firewall). The approach I would suggest is...
View ArticleVULNERABILITY ASSESSMENT TOOLS
Vulnerability scanning toolsVulnerability assessment tools1. Nessus (https://store.tenable.com)Nessus provides the largest collection of network security checks, extensive configuration and compliance...
View ArticleCOMMON STOLEN PASSWORDS FOR THE YEAR 2013
Adobe major security breach in October affected upwards of 48 million users. A list of passwords from the Adobe breach had “123456” on top, followed by “123456789” and “password.” Adobe passwords...
View ArticleAVERAGE EPS FOR SIEM
EPS for SIEM DeploymentSANS Baseline Network Device EPS Averages, provides a breakdown of Average, Peak and Averaged Peak EPS for different systems logs are collected from. Each total below is the...
View ArticleIPv6
IPv6 Addressing:IPv6 has moved from a 32-bit address space to a 128-bit address space. Therefore the need for Classless Inter-Domain Routing (CIDR) is no longer needed because the number of addresses...
View ArticleLTSP - Linux Terminal Server Project
The Linux Terminal Server Project adds thin client support to Linux servers. LTSP is a flexible, cost effective solution that is empowering schools, businesses, and organizations all over the world to...
View ArticleRHEV COMPARISON WITH VSPHERE 5.5 AND HYPER-V
RED HAT ENTERPRISE VIRTUALIZATION COMPARISON WITH VMWARE VSPHERE 5.5 AND MICROSOFT HYPER-V 2012FEATURESRED HAT ENTERPRISE VIRTUALIZATIONVMWARE VSPHERE 5.5MICROSOFT HYPER-V...
View ArticleHP SERVERS NIC TEAMING IN WINDOWS
HP Servers NIC Teaming in WindowsWhat is Teaming?Teaming NICs is used when you need to group several NICs and make them act as one, Teaming NICs provide fault tolerance, reduce network spikes and...
View ArticleVSAT - Very Small Aperture Terminal
VSAT - VERY SMALL APERTURE TERMINAL A very small aperture terminal (VSAT), is a two-way satellite ground station or a stabilized maritime VSAT antenna with a dish antenna that is smaller than 3 meters....
View ArticleDTH - Direct To Home
DTH (Direct To Home)DTH stands for Direct-To-Home television. DTH is defined as the reception of satellite programmes with a personal dish in an individual home.A designation broader than DBS would be...
View ArticleiSCSI, TARGET AND LUN
What is iSCSI?iSCSI - Internet SCSI (Small Computer System Interface) iSCSI is an IP-based storage networking standard for linking data storage facilities, developed by the Internet Engineering Task...
View ArticleINSTALL OPENOFFICE 4 ON LINUX MINT
How to Install Apache OpenOffice 4 on Linux Mint?Apache OpenOffice, commonly known as OpenOffice.org, OOo or OpenOffice, is an open-source office productivity software suite whose main components are...
View ArticleSQUID ON CENTOS
How to install and configure squid on Centos?How to install and configure squid on Fedora?1. Open terminal to install squidCtrl + Alt + T2. install as rootyum install squid3. Edit squid.confnano...
View ArticleCISCO IOS DHCP
How to Configure Cisco IOS DHCP ?DHCP:Dynamic Host Configuration Protocol is a protocol that allows you to automatically configure the settings of the devices on your network. For a device such as a...
View ArticleRSYNC BACKUP
rsync:rsync is a file transfer program for Unix systems. rsync uses the "rsync algorithm" which provides a very fast method for bringing remote files into sync. It does this by sending just the...
View ArticleCOMPUTER VIRUS, WORM, MALWARE AND TROJAN HORSE
What is Computer Virus?Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.A computer virus might corrupt or...
View ArticleREGEX - REGULAR EXPRESSIONS
What is REGEX?A regular expression (abbreviated regex or regexp) is a sequence of characters that forms a search pattern, mainly for use in pattern matching with strings, or string matching..Matches...
View ArticleEIGRP ON A Cisco ASA Firewall
How to Configure EIGRP on a Cisco ASA Firewall?The Cisco Adaptive Security Appliance is an integrated security equipment that can perform a variety of functions like firewall, intrusion prevention,...
View ArticlePORT SECURITY ON CISCO SWITCH
How to Enable or Disable Port Security on a Cisco Switch?The Basics:In its most basic form, the Port Security feature remembers the Ethernet MAC address connected to the switch port and allows only...
View ArticleDNS ON CENTOS 6
How to install and configure DNS on Centos?How to install and configure Bind on Centos?How to install and configure Caching only DNS Server?## Install bind on centos using 'yum'yum install bind*## edit...
View Article