Quantcast
Channel: Brain Book
Browsing all 195 articles
Browse latest View live

BURN ISO IMAGE USING LINUX TERMINAL

If you're running Linux and would like to use the terminal to burn the ISO image.##To open TerminalCtrl + Alt + TSwitch to the the directory you have downloaded the image to:##To Burn ISO to...

View Article


Image may be NSFW.
Clik here to view.

NAT / PAT ON CISCO

NAT / PAT Configuration on CiscoHow to configure NAT and PAT on Cisco?NAT/PAT Technique Behind Private and Public IP Communication:Network Address Translation (NAT) is the process of modifying IP...

View Article


IIS SERVER 8 SECURITY

Security Best Practices for IIS 8Installation and ConfigurationDo not run IIS on a domain controller or a backup domain controller.First, there are no local accounts on a domain controller. Local...

View Article

Image may be NSFW.
Clik here to view.

IIS SERVER INSTALLATION AND SECURITY

IIS Installation:Control Panel: select "Add/Remove Programs"then click on "Add/Remove Windows Components"The screen will appear that allows you to install new Windows components - this requires...

View Article

Image may be NSFW.
Clik here to view.

MPLS LAYER 3 VPN

How to Configure MPLS Layer 3 VPN?MPLS operates in the middle of the data link layer (Layer 2) and the network layer (Layer 3) hence it is considered to be a Layer 2.5 protocol. It operates using the...

View Article


JUNIPER JUNOS TIME ZONES

JUNIPER TIME ZONESJUNIPER JUNOS OS TIME ZONESTo import and install time zone files, follow these steps:Download the time zone files archive and untar them to a temporary directory such as /var/tmp:...

View Article

Image may be NSFW.
Clik here to view.

CISCO SWITCH PORT ACLs

How To Configure Switch Port ACLs?ACLs can also be used to control traffic on VLANs. Switch port ACLs can only be applied to Layer 2 interfaces in the inbound direction, and this controls traffic via...

View Article

Image may be NSFW.
Clik here to view.

ALIEN VAULT OSSIM INSTALLATION & CONFIGURATION

ALIEN VAULT OSSIM 4.3.4 INSTALLATION & CONFIGURATION1. Download OSSIM from the below mentioned URL.    http://www.alienvault.com/open-threat-exchange/projects#ossim-tab2. write iso to cd using any...

View Article


Image may be NSFW.
Clik here to view.

SHUN COMMAND TO BLOCK ATTACKER

Block Attacks with a Cisco ASA Firewall and IDS using the shun command:An Intrusion Detection system as we know can either work in Inline Mode (IPS) or in promiscuous mode (IDS). In inline mode, the...

View Article


DISABLE TOUCHPAD OF LAPTOP IN LINUX

How to disable TouchPad of Laptop in Linux?##use below command to list devicesxinput list⎡ Virtual core pointer                    id=2[master pointer  (3)]⎜   ↳ Virtual core XTEST pointer...

View Article

Image may be NSFW.
Clik here to view.

WiMAX

What is WiMAX?WiMAX stand for "Worldwide Interoperability for Microware Access", a modern wireless network technology that enables fast internet connection even in remote areas. with WiMAX technology...

View Article

Image may be NSFW.
Clik here to view.

DHCP RELAY ON CISCO ASA FIREWALL

How to Configure DHCP Relay on Cisco ASA Firewall?The ASA 5500 series firewall can work as DHCP relay agent which means that it receives DHCP requests from clients on one interface and forwards the...

View Article

Image may be NSFW.
Clik here to view.

NAT STATE FULL FAILOVER ON CISCO

CISCO NAT Stateful Failover:When the word "stateful" is mentioned in the networking world, it usually means that the router or a firewall keeps records of the sessions created. Stateful failover means...

View Article


INTEL 3RD AND 4TH GENERATION PROCESSOR COMPARISON

INTEL 3RD AND 4TH GENERATION MOBILE, DESKTOP AND SERVER PROCESSORS DETAILED COMPARISON.INTEL 3RD AND 4TH GENERATION MOBILE PROCESSOR COMPARISONBelow Intel url will provide you full list of processors...

View Article

MICROSOFT PATCH MANAGEMENT

Microsoft Patch ManagementPatch management is a circular process and must be ongoing. The unfortunate reality about software vulnerabilities is that, after you apply a patch today, a new vulnerability...

View Article


POPULAR ISO STANDARDS

POPULAR ISO STANDARDSISO 9000   Quality managementISO 14000 Environmental managementISO 3166   Country codesISO 26000 Social responsibilityISO 50001 Energy managementISO 31000 Risk managementISO 22000...

View Article

7 KEYS OF WORLDWIDE INTERNET SECURITY

Seven people who hold the keys to worldwide internet securityA group of people, from all over the world, who each hold a key to the internet. Together, their keys create a master key, which in turn...

View Article


ISO 27001:2005 VS 27001:2013

COMPARISON OF ISO 27001:2005 TO 27001:2013This is to show changes introduced in ISMS standard ISO 27001:2013 with respect to ISO 27001:200527001:200527001:2013A.5 Information Security PolicyA.5.1...

View Article

MSTSC - REMOTE DESKTOP SESSION

MSTSC - Remote AccessCreates connections to Remote Desktop Session Host (RD Session Host) servers or other remote computers, edits an existing Remote Desktop Connection (.rdp) configuration file, and...

View Article

PEN-TESTING

What is Pen-Testing?Penetration testing is the process of attempting to gain access to resources without knowledge of user-names, passwords and other normal means of access. If the focus is on computer...

View Article
Browsing all 195 articles
Browse latest View live