Quantcast
Channel: Brain Book
Browsing all 195 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

ISMS - INFORMATION SECURITY MANAGEMENT SYSTEM

What is an ISMS?An ISMS (Information Security Management System) is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT...

View Article


Image may be NSFW.
Clik here to view.

WINDOWS 8 - BOOT DESKTOP DIRECTLY INSTEAD METRO

Boot to the windows 8 desktop instead of MetroYou can configure a simple script to run every time you log in. Simply copy the text below into Notepad and save it as a .bat file (any name you want -...

View Article


Image may be NSFW.
Clik here to view.

CONFIGURE PORT SECURITY IN CISCO SWITCH

How to Configure Port Security in Cisco Switch?By default, the switchport security feature is disabled on all switchports and must be enabled.1. It shows the steps required to enable the switchport...

View Article

Image may be NSFW.
Clik here to view.

MICROSOFT FOREFRONT TMG - BEST PRACTICE ANALYZER

TMGBPA - THREAT MANAGEMENT GATEWAY BEST PRACTICE ANALYZERINTRODUCTION:You can use TMGBPA to analyze your Forefront TMG environment for security holes, performance problems and configuration mismatches....

View Article

Image may be NSFW.
Clik here to view.

NTOP - Traffic Analysis and Flow Collection

NTOP - High-Speed Web-based Traffic Analysis and Flow CollectionThe current version of ntop features both command line and web-based user interfaces, and is available on both UNIX and Win32 platforms....

View Article


LINUX VIRTUAL FILESYSTEMS

Linux has several virtual filesystems that serve various purposes. DebugFS, SecurityFS, PipeFS, and SockFS are four important filesystems.DebugFSDebugFS is a RAM-based filesystem that is used for...

View Article

Install CentOS Packages on Red Hat Enterprise Linux

Installing CentOS packages on Red Hat Enterprise LinuxAre you registered to the Red Hat Network (RHN)?If not, you will see messages like this when trying to use the “yum” package...

View Article

LINUX KERNEL TYPES

Two main types of kernels exist - monolithic kernels and microkernels. Linux is a monolithic kernel and Hurd is a microkernel. Microkernels offer the bare essentials to get a system operating....

View Article


USING WIRELESS TECHNOLOGY SECURELY

How to use wireless securely?Home Wireless SecurityWhen you use a wireless router or access point to create a home network, you trade wired connectivity for connectivity delivered via a radio signal....

View Article


SQL INJECTION ATTACK

SQL Injection AttackStructured Query Language (SQL) injection is an attack technique that attempts to subvert the relationship between a webpage and its supporting database, typically in order to trick...

View Article

DISABLE USB STORAGE DEVICE

HOW TO PREVENT USERS FROM CONNECTING USB STORAGE DEVICES?If a USB storage device is not already installed on the computerIf a USB storage device is not already installed on the computer, assign the...

View Article

Image may be NSFW.
Clik here to view.

Intel's new 800 Gbps MXC cable for DataCenters

Intel's new 800 Gbps MXC cableNew cable technology from Intel will soon be available to data centers and supercomputers, providing significant speed increases over what is already available. Known as...

View Article

LAN SECURITY: In-Band Versus Out-of-Band Solutions

In-Band In-band appliances sit in the flow of live network traffic, frequently close to where endpoints access the network (potentially in the access layer switch itself), so that all client-side...

View Article


CLOUD COMPUTING

CLOUD COMPUTING BASICSCloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications,...

View Article

Accidentally Locked Yourself out of the sudoers group?

Have you accidentally locked yourself out of the sudoers group? Don't worry, here's a way to fix it.If you don't have a root user that you could use to log in with to fix this issue, so. what you have...

View Article


VoIP - Voice Over IP

What is VoIP? Voice over Internet Protocol (VoIP) is a form of communication that allows you to make phone calls over a broadband internet connection instead of typical analog telephone lines. Basic...

View Article

INTEL SSD PRODUCTS COMPARISON

Intel® SSD Product ComparisonProduct NameCapacity (GB)Sequential Read/Write (up to MB/s)Random 4KB Read/Write (up to IOPS)Form FactorInterfaceData Center ProductsIntel® SSD DC S3700 Series100 / 200 /...

View Article


ISO 27001:2005 VS 27001:2013

COMPARISON OF ISO 27001:2005 TO 27001:2013This is to show changes introduced in ISMS standard ISO 27001:2013 with respect to ISO 27001:200527001:200527001:2013A.5 Information Security PolicyA.5.1...

View Article

Image may be NSFW.
Clik here to view.

MS EXCEL ACTIVX CHECKBOX CODING

To add activx check box in Microsoft Excell then follow below simple steps:1. Enable developer tab in Microsoft ExcelGoto: File → Option → Customize Ribbon → Main Tabs → select “Developer” → Ok2. Goto:...

View Article

Image may be NSFW.
Clik here to view.

OSPF AREA-0/BACKBONE NETWORK

Why Area 0 in OSPF is a Backbone Network? In OSPF, if there are more than 1 areas have to be configured always make area 0 as a backbone network, because while designing networks it is a best practice...

View Article
Browsing all 195 articles
Browse latest View live