Understanding the VDOMS? Virtual domains (VDOMS) are a way to divide physical FortiGate devices into multiple Logical devices with different configurations. Each logical device can have completely different configurations, routes, NAT, and users. By default, every FortiGate device is in default VDOM “root”. All the configuration of the FortiGate device is saved in “root” VDOM. […]
What is a Linux NFS server? Network File Sharing (NFS) is a protocol that allows you to share directories and files with other Linux clients over a network. Shared directories are typically created on a file server, running the NFS server component. Users add files to them, which are then shared with other users who […]
We all have heard the phrase “Sharing is Caring” but not in the case of your digital information which is to be kept personal. You don’t share your bank details, passwords, name, DOB, address, and other details with an unknown person. The hacker is that unknown person who plants himself in the middle of the […]
Host Intrusion Prevention System solutions protect the computer against known and unknown malicious attacks. In case of attempted major changes by a hacker or malware, HIPS blocks the action and alerts the user so an appropriate decision about what to do can be made. This helps to keep your system secure without having to rely […]
What is FTP? File transfer protocol is used to transfer the files between two systems over a TCP/IP network, it uses port numbers 20 & 21, the users that have been granted access to transfer or receive the files in the File transfer protocol server. Using an FTP client we also can download, upload, delete, […]
In this article, we are going to discuss the VSS feature which is a Cisco proprietary. The following topics will be covered in this blog: What is VSS? Benefits of VSS How VSS works? What is VSS? VSS stands for Virtual Switching System. It is used to create one logical switch by combining two physical […]
In today’s time, big corporate companies pay a lot on network security appliances to get the best security for their network, but the small business companies overlook it or may not use it in a better way. Introducing this blog to get the best security for your corporate network whether it is small or large. […]
Dell EMC Compellent series storages are enterprise grade storages which are also referred to as SC series more commonly. SC series offers modern architecture storage arrays which optimize your data center for saving costs and deliver transformational SSD, HDD, or tiered performance at the same time. It comes in two variants, All-Flash and Hybrid Flash. […]
When two people are sharing information or just talking with each other but suddenly a third person comes and stands between the two, silently hearing the conversation. Then he uses the information against them, creating misunderstandings and problems. This is exactly Man in the middle situation. In our previous blog, we learned about the prevention […]
In the last blog, we explained managing network in CentOS with NetworkManager Services. In this blog, we will explain the benefits of the Top command inside CentOS or any Linux machine. The Top command is used to show the Linux processes. The Top command provides a dynamic real-time view of the running system. Usually, this […]