Dell EMC Compellent series storages are enterprise grade storages which are also referred to as SC series more commonly. SC series offers modern architecture storage arrays which optimize your data center for saving costs and deliver transformational SSD, HDD, or tiered performance at the same time. It comes in two variants, All-Flash and Hybrid Flash. […]
When two people are sharing information or just talking with each other but suddenly a third person comes and stands between the two, silently hearing the conversation. Then he uses the information against them, creating misunderstandings and problems. This is exactly Man in the middle situation. In our previous blog, we learned about the prevention […]
In the last blog, we explained managing network in CentOS with NetworkManager Services. In this blog, we will explain the benefits of the Top command inside CentOS or any Linux machine. The Top command is used to show the Linux processes. The Top command provides a dynamic real-time view of the running system. Usually, this […]
What Is VMware Site Recovery Manager (SRM)? VMware SRM is a disaster recovery solution to protect the virtual machine-based workloads running on top of the virtualized host (vSphere-ESXi). The disaster recovery solution is the essential requirement for every organization to meet their mission-critical application’s SLA in case of complete Data Center failure due to many […]
As we learned in the previous blog about the basic concept of vPC (Virtual Port Channel) and their terminology like the use of vPC, vPC peer-link, vPC peer-keepalive, and Deployments methods architecture wise. In this blog, we learn advance concepts of background working of vPC and what are some best practices to configure the Role […]
In the previous blog, we explained the configuration process of DNS Server in Linux OS, and in this blog we will explain the configuration and installation of Openldap server on CentOS. LDAP stands for Lightweight Directory Access Protocol, is a protocol for managing related information from a centralized location through the use of a file […]
SQL injection attacks are a type of injection attack in which SQL commands are injected into input fields for execution. SQL Injection is listed as the most vulnerable threat for website applications as it can interfere with the queries that an application makes to its database. What Is The Impact Of A Successful SQL Injection […]
We will be continuing with our security point of view and this time we bring you a new blog on how you can prevent password attacks. In our previous blog, we discussed the issues of cybersecurity and how they can create havoc on the security of an organization. Let’s know something about passwords There is […]
Open web application security project (OWASP) is a non-profit organization that works with the goal of helping website owners and security experts to protect web applications from cyber-attacks. For the purpose to perform security assessments and research OWASP has more than 30,000 volunteers around the world. It represents a broad consensus about the most critical […]
Hello friends, today we will look at a very important part of Content security which is critical to a firm. We use DLP (Data Leak Prevention) to prevent data leakage and in this blog, we will work on Data Resolve inDefend DLP. The DLP (Data Leak Prevention) are of two types: – Endpoint DLP (Data […]