ISMS - INFORMATION SECURITY MANAGEMENT SYSTEM
What is an ISMS?An ISMS (Information Security Management System) is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT...
View ArticleWINDOWS 8 - BOOT DESKTOP DIRECTLY INSTEAD METRO
Boot to the windows 8 desktop instead of MetroYou can configure a simple script to run every time you log in. Simply copy the text below into Notepad and save it as a .bat file (any name you want -...
View ArticleCONFIGURE PORT SECURITY IN CISCO SWITCH
How to Configure Port Security in Cisco Switch?By default, the switchport security feature is disabled on all switchports and must be enabled.1. It shows the steps required to enable the switchport...
View ArticleMICROSOFT FOREFRONT TMG - BEST PRACTICE ANALYZER
TMGBPA - THREAT MANAGEMENT GATEWAY BEST PRACTICE ANALYZERINTRODUCTION:You can use TMGBPA to analyze your Forefront TMG environment for security holes, performance problems and configuration mismatches....
View ArticleNTOP - Traffic Analysis and Flow Collection
NTOP - High-Speed Web-based Traffic Analysis and Flow CollectionThe current version of ntop features both command line and web-based user interfaces, and is available on both UNIX and Win32 platforms....
View ArticleLINUX VIRTUAL FILESYSTEMS
Linux has several virtual filesystems that serve various purposes. DebugFS, SecurityFS, PipeFS, and SockFS are four important filesystems.DebugFSDebugFS is a RAM-based filesystem that is used for...
View ArticleInstall CentOS Packages on Red Hat Enterprise Linux
Installing CentOS packages on Red Hat Enterprise LinuxAre you registered to the Red Hat Network (RHN)?If not, you will see messages like this when trying to use the “yum” package...
View ArticleLINUX KERNEL TYPES
Two main types of kernels exist - monolithic kernels and microkernels. Linux is a monolithic kernel and Hurd is a microkernel. Microkernels offer the bare essentials to get a system operating....
View ArticleUSING WIRELESS TECHNOLOGY SECURELY
How to use wireless securely?Home Wireless SecurityWhen you use a wireless router or access point to create a home network, you trade wired connectivity for connectivity delivered via a radio signal....
View ArticleSQL INJECTION ATTACK
SQL Injection AttackStructured Query Language (SQL) injection is an attack technique that attempts to subvert the relationship between a webpage and its supporting database, typically in order to trick...
View ArticleDISABLE USB STORAGE DEVICE
HOW TO PREVENT USERS FROM CONNECTING USB STORAGE DEVICES?If a USB storage device is not already installed on the computerIf a USB storage device is not already installed on the computer, assign the...
View ArticleIntel's new 800 Gbps MXC cable for DataCenters
Intel's new 800 Gbps MXC cableNew cable technology from Intel will soon be available to data centers and supercomputers, providing significant speed increases over what is already available. Known as...
View ArticleLAN SECURITY: In-Band Versus Out-of-Band Solutions
In-Band In-band appliances sit in the flow of live network traffic, frequently close to where endpoints access the network (potentially in the access layer switch itself), so that all client-side...
View ArticleCLOUD COMPUTING
CLOUD COMPUTING BASICSCloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications,...
View ArticleAccidentally Locked Yourself out of the sudoers group?
Have you accidentally locked yourself out of the sudoers group? Don't worry, here's a way to fix it.If you don't have a root user that you could use to log in with to fix this issue, so. what you have...
View ArticleVoIP - Voice Over IP
What is VoIP? Voice over Internet Protocol (VoIP) is a form of communication that allows you to make phone calls over a broadband internet connection instead of typical analog telephone lines. Basic...
View ArticleINTEL SSD PRODUCTS COMPARISON
Intel® SSD Product ComparisonProduct NameCapacity (GB)Sequential Read/Write (up to MB/s)Random 4KB Read/Write (up to IOPS)Form FactorInterfaceData Center ProductsIntel® SSD DC S3700 Series100 / 200 /...
View ArticleISO 27001:2005 VS 27001:2013
COMPARISON OF ISO 27001:2005 TO 27001:2013This is to show changes introduced in ISMS standard ISO 27001:2013 with respect to ISO 27001:200527001:200527001:2013A.5 Information Security PolicyA.5.1...
View ArticleMS EXCEL ACTIVX CHECKBOX CODING
To add activx check box in Microsoft Excell then follow below simple steps:1. Enable developer tab in Microsoft ExcelGoto: File → Option → Customize Ribbon → Main Tabs → select “Developer” → Ok2. Goto:...
View ArticleOSPF AREA-0/BACKBONE NETWORK
Why Area 0 in OSPF is a Backbone Network? In OSPF, if there are more than 1 areas have to be configured always make area 0 as a backbone network, because while designing networks it is a best practice...
View Article