Wednesday, January 13, 2010

Networking Articles and Tips

Networking Articles and Tips


Site-to-Site IPSEC

Posted: 13 Jan 2010 10:31 AM PST

Site-to-Site IPSEC Below configuration is to configure Site-to-Site IPSEC over the PIX as shown in the diagram. Configuration for the Router-4 ====================== hostname r4 crypto isakmp policy 10 hash md5 authentication pre-share group 2 crypto isakmp key cisco address 45.1.1.5 ! ! crypto ipsec transform-set test esp-aes esp-md5-hmac ! ! crypto map test 10 ipsec-isakmp set peer 45.1.1.5 set transform-set test match address 100 interface Loopback0 ip address 10.1.1.1 255.255.255.0 ! interface Ethernet0/0 ip address 47.1.1.4 255.255.255.0 half-duplex crypto [...]


What is Spyware ?

Posted: 13 Jan 2010 07:18 AM PST

What is Spyware ? A spyware is a malware that monitors the activities on the computer which are illegally installed in computer without the user’s knowledge. The information is sent back to its creator. Examples , Collection or passwords and credit card numbers. Some spyware programs are designed to monitor the user’s surfing habits, like what websites [...]


10 tips to protect the security of an organisation

Posted: 13 Jan 2010 05:12 AM PST

10 tips to protect the security of an organisation Even in the economic development of the best of times, computers also need to update the rotation, and we also need to decide how to deal with them reasonably. In the era of economic crisis, people have laid off, running high-cost software system had to be eliminated, [...]


No comments:

Post a Comment