Wednesday, December 29, 2010

Networking Articles and Tips

Networking Articles and Tips


Disaster Recovery Planning & Business Impact Analysis

Posted: 29 Dec 2010 06:38 AM PST

Disaster Recovery Planning & Business Impact Analysis Increased dependency by the business over recent years on computerized information systems  Increased recognition of the impact that a serious incident could have on the business   Need to establish a formal process to be followed when a disaster occurs  An intention to lower costs or losses arising from serious incidents   Need to develop [...]


What is Disaster Recovery Plan ?

Posted: 29 Dec 2010 06:30 AM PST

Disaster Recovery Plan  or DRP is  often referred to synonymously as a business continuity plan (BCP) — is a comprehensive set of measures and procedures put into place within an organization to ensure that essential, mission critical resources and infrastructures are maintained or backed up by alternatives during various stages of a disaster.   Disaster Recovery Plan [...]


What is Disaster Recovery ?

Posted: 29 Dec 2010 06:13 AM PST

Disaster Recovery is process for resuming business after a disruptive event which can include something as catastrophic as a earthquake or as relatively small as a computer virus. Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. [...]


Friday, December 24, 2010

Networking Articles and Tips

Networking Articles and Tips


Denial of Service Attacks

Posted: 24 Dec 2010 02:49 AM PST

Denial of service attacks are not new. However, the recent increase of their power and their use by organized criminal organizations make necessary to consider them as one of the major issues IT infrastructures will have to face in the next few years. Trying to defeat those attacks without understanding their technical aspects is illusory. [...]


How To Test Intrusion Prevention System

Posted: 24 Dec 2010 01:33 AM PST

Intrusion Prevention System or IPS are new technology-based products that intend to detect and block attacks before they reach the target network. As they are to be deployed inline into the internal network they must be tested. However the lack of standard methodology often lower the accuracy of tests, and several issues may be raised [...]


Monday, September 27, 2010

Networking Articles and Tips

Networking Articles and Tips


Understanding Syslog

Posted: 27 Sep 2010 03:45 AM PDT

SYSLOG Most Cisco devices use the Sys log protocol to manage system logs and alerts. But unlike their PC and server counterparts, Cisco devices lack large internal storage space for storing these logs. To overcome this limitation, Cisco devices offer the following two options: Internal buffer— The device’s operating system allocates a small part of [...]


Monday, September 20, 2010

Networking Articles and Tips

Networking Articles and Tips


Major Challenges for IT Department – Wireless Consumption

Posted: 20 Sep 2010 06:41 AM PDT

Major Challenges for IT Department – Wireless Consumption Wi-Fi has received, including smart phones, game consoles, digital cameras, DVD players and TV so a lot of consumer devices. It’s the native Connection Sharing feature is often used, although this is very good for consumers, but when such equipment downtime will bring security and performance issues. [...]


Thursday, September 16, 2010

Networking Articles and Tips

Networking Articles and Tips


VPN or Virtual Private Network

Posted: 16 Sep 2010 03:15 AM PDT

What is VPN or Virtual Private Network ? An encrypted connection between two or multiple private networks over public network is called VPN or Virtual Private Network.  It use to connect two private network over public network. In equation format it can be defined as VPN= Tunneling + Encryption In other words we can also [...]


Sunday, July 18, 2010

Networking Articles and Tips

Networking Articles and Tips


Editing the Registry

Posted: 18 Jul 2010 10:30 AM PDT

Editing The Registry The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won’t find it on the Start Menu) it enables you to view, search and edit the data within the Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select [...]