Posts

Showing posts from September, 2016

DOS & DDOS ATTACKS

Image
INTRODUCTION How they are performed and why they attract so much attention ! We won't be getting into much detail as we are just trying to give everyone a better understanding of the problem. Denial of Service attacks Denial of Service (DoS) attacks can be a serious federal crime with penalties that include years of imprisonment and many countries have laws that attempt to protect against this. At the very least, offenders routinely lose their Internet Service Provider (ISP) accounts, get suspended if school resources are involved, etc. There are two types of DoS attacks: 1) Operating System attacks:Which target bugs in specific operating systems and can be fixed with patches. 2) Networking attacks: Which exploit inherent limitations of networking and may require firewall protection. Operating System Attacks These attacks exploit bugs in a specific operating system (OS), which is the basic software that your computer runs, such as Windows or Mac OS. In gen...

BGP Loop Prevention & Next Hop Self

BGP Loop Prevention by NetProtocol Xpert on Scribd BGP Next Hop Self by NetProtocol Xpert on Scribd

why CISCO & what is CCIE?

Image
Why CISCO? There are so many companies available who produce various network devices such as router, switch, firewall etc. But Cisco devices are considered to be the best in the market in quality, security, troubleshooting point of view. More over Cisco’s training structure is the best in teaching as well as learning point of view. So if anyone has the knowledge about Cisco devices then he can cope up with any other device. What is CCIE ? The Cisco Certified Internetwork Expert (CCIE) certification is accepted worldwide as the most prestigious networking certification in the industry. CCIE is also known as Doctorate in Networking. Network Engineers holding an active Cisco CCIE certification are recognized for their expert network engineering skills and mastery of Cisco products and solutions. The CCIE community has established a reputation of leading the networking industry in deep technical  networking knowledge and are deployed into the most technically challenging ...

India’s digital revolution

Image
How India is alleviating the country’s digital divide  Once upon a time internet connectivity was a luxury for a nation. Today, in order to become economically stronger, countries need Wi-Fi, training and equipment. While India is a leader in IT, the country has a steep digital divide, due mainly to lack of internet penetration in rural areas. Without connectivity, farmers and small business owners in rural India don’t have access to proper healthcare, education or financial inclusion. For this reason, leaders of India are calling for a digital revolution. In 2014, less than 20% of India’s 1.2 billion population used the Internet. A major obstacle to access is cost. However, thanks to a new program, the Indian market is set to explode over the next few years as the country enters a new digitization phase. In July of 2015 the government of India launched the national "Digital India" initiative to make government services available to citizens elect...

Firewall - Failover & Transparent Firewall

ASA Failover by NetProtocol Xpert on Scribd

Enterprise Security is no longer just IT concern,It's also becoming a business concern!

Image
Today’s Organizations worldwide have ranked IT security as one of their priorities as increasingly sophisticated attacks, new data protection regulations, and most recently insider fraud and data breaches, threaten to disrupt and irreparably damage their businesses. With ever-changing technologies, IT teams can count on the amount of security challenges they have to deal with on daily basis. Today, apart from ensuring trusted interactions and protecting the information, IT managers have to create a secure environment for newly emerging technology like BYOD (Bring Your Own Device). More than 80% of IT managers think enterprises with a BYOD policy have a competitive advantage. Though each year, companies around the world spend a lot in buying new computers in bulk. But after the concept of BYOD has taken place among enterprises, companies are now allowing employees to bring their own products into the office and use them for corporate activities. This in turn help companies...