BURN ISO IMAGE USING LINUX TERMINAL
If you're running Linux and would like to use the terminal to burn the ISO image.##To open TerminalCtrl + Alt + TSwitch to the the directory you have downloaded the image to:##To Burn ISO to...
View ArticleNAT / PAT ON CISCO
NAT / PAT Configuration on CiscoHow to configure NAT and PAT on Cisco?NAT/PAT Technique Behind Private and Public IP Communication:Network Address Translation (NAT) is the process of modifying IP...
View ArticleIIS SERVER 8 SECURITY
Security Best Practices for IIS 8Installation and ConfigurationDo not run IIS on a domain controller or a backup domain controller.First, there are no local accounts on a domain controller. Local...
View ArticleIIS SERVER INSTALLATION AND SECURITY
IIS Installation:Control Panel: select "Add/Remove Programs"then click on "Add/Remove Windows Components"The screen will appear that allows you to install new Windows components - this requires...
View ArticleMPLS LAYER 3 VPN
How to Configure MPLS Layer 3 VPN?MPLS operates in the middle of the data link layer (Layer 2) and the network layer (Layer 3) hence it is considered to be a Layer 2.5 protocol. It operates using the...
View ArticleJUNIPER JUNOS TIME ZONES
JUNIPER TIME ZONESJUNIPER JUNOS OS TIME ZONESTo import and install time zone files, follow these steps:Download the time zone files archive and untar them to a temporary directory such as /var/tmp:...
View ArticleCISCO SWITCH PORT ACLs
How To Configure Switch Port ACLs?ACLs can also be used to control traffic on VLANs. Switch port ACLs can only be applied to Layer 2 interfaces in the inbound direction, and this controls traffic via...
View ArticleALIEN VAULT OSSIM INSTALLATION & CONFIGURATION
ALIEN VAULT OSSIM 4.3.4 INSTALLATION & CONFIGURATION1. Download OSSIM from the below mentioned URL. http://www.alienvault.com/open-threat-exchange/projects#ossim-tab2. write iso to cd using any...
View ArticleSHUN COMMAND TO BLOCK ATTACKER
Block Attacks with a Cisco ASA Firewall and IDS using the shun command:An Intrusion Detection system as we know can either work in Inline Mode (IPS) or in promiscuous mode (IDS). In inline mode, the...
View ArticleDISABLE TOUCHPAD OF LAPTOP IN LINUX
How to disable TouchPad of Laptop in Linux?##use below command to list devicesxinput list⎡ Virtual core pointer id=2[master pointer (3)]⎜ ↳ Virtual core XTEST pointer...
View ArticleWiMAX
What is WiMAX?WiMAX stand for "Worldwide Interoperability for Microware Access", a modern wireless network technology that enables fast internet connection even in remote areas. with WiMAX technology...
View ArticleDHCP RELAY ON CISCO ASA FIREWALL
How to Configure DHCP Relay on Cisco ASA Firewall?The ASA 5500 series firewall can work as DHCP relay agent which means that it receives DHCP requests from clients on one interface and forwards the...
View ArticleNAT STATE FULL FAILOVER ON CISCO
CISCO NAT Stateful Failover:When the word "stateful" is mentioned in the networking world, it usually means that the router or a firewall keeps records of the sessions created. Stateful failover means...
View ArticleINTEL 3RD AND 4TH GENERATION PROCESSOR COMPARISON
INTEL 3RD AND 4TH GENERATION MOBILE, DESKTOP AND SERVER PROCESSORS DETAILED COMPARISON.INTEL 3RD AND 4TH GENERATION MOBILE PROCESSOR COMPARISONBelow Intel url will provide you full list of processors...
View ArticleMICROSOFT PATCH MANAGEMENT
Microsoft Patch ManagementPatch management is a circular process and must be ongoing. The unfortunate reality about software vulnerabilities is that, after you apply a patch today, a new vulnerability...
View ArticlePOPULAR ISO STANDARDS
POPULAR ISO STANDARDSISO 9000 Quality managementISO 14000 Environmental managementISO 3166 Country codesISO 26000 Social responsibilityISO 50001 Energy managementISO 31000 Risk managementISO 22000...
View Article7 KEYS OF WORLDWIDE INTERNET SECURITY
Seven people who hold the keys to worldwide internet securityA group of people, from all over the world, who each hold a key to the internet. Together, their keys create a master key, which in turn...
View ArticleISO 27001:2005 VS 27001:2013
COMPARISON OF ISO 27001:2005 TO 27001:2013This is to show changes introduced in ISMS standard ISO 27001:2013 with respect to ISO 27001:200527001:200527001:2013A.5 Information Security PolicyA.5.1...
View ArticleMSTSC - REMOTE DESKTOP SESSION
MSTSC - Remote AccessCreates connections to Remote Desktop Session Host (RD Session Host) servers or other remote computers, edits an existing Remote Desktop Connection (.rdp) configuration file, and...
View ArticlePEN-TESTING
What is Pen-Testing?Penetration testing is the process of attempting to gain access to resources without knowledge of user-names, passwords and other normal means of access. If the focus is on computer...
View Article