What Is VMware Site Recovery Manager (SRM)? VMware SRM is a disaster recovery solution to protect the virtual machine-based workloads running on top of the virtualized host (vSphere-ESXi). The disaster recovery solution is the essential requirement for every organization to meet their mission-critical application’s SLA in case of complete Data Center failure due to many […]
As we learned in the previous blog about the basic concept of vPC (Virtual Port Channel) and their terminology like the use of vPC, vPC peer-link, vPC peer-keepalive, and Deployments methods architecture wise. In this blog, we learn advance concepts of background working of vPC and what are some best practices to configure the Role […]
In the previous blog, we explained the configuration process of DNS Server in Linux OS, and in this blog we will explain the configuration and installation of Openldap server on CentOS. LDAP stands for Lightweight Directory Access Protocol, is a protocol for managing related information from a centralized location through the use of a file […]
SQL injection attacks are a type of injection attack in which SQL commands are injected into input fields for execution. SQL Injection is listed as the most vulnerable threat for website applications as it can interfere with the queries that an application makes to its database. What Is The Impact Of A Successful SQL Injection […]
We will be continuing with our security point of view and this time we bring you a new blog on how you can prevent password attacks. In our previous blog, we discussed the issues of cybersecurity and how they can create havoc on the security of an organization. Let’s know something about passwords There is […]
Open web application security project (OWASP) is a non-profit organization that works with the goal of helping website owners and security experts to protect web applications from cyber-attacks. For the purpose to perform security assessments and research OWASP has more than 30,000 volunteers around the world. It represents a broad consensus about the most critical […]
Hello friends, today we will look at a very important part of Content security which is critical to a firm. We use DLP (Data Leak Prevention) to prevent data leakage and in this blog, we will work on Data Resolve inDefend DLP. The DLP (Data Leak Prevention) are of two types: – Endpoint DLP (Data […]
Citrix has been in the Virtual Desktop Infrastructure (VDI) line of business for ages and has been securing its place in the Leaders in Gartner’s Magic Quadrant for a very long time now. Citrix’s offering for Virtual Desktop Infrastructure is known as Citrix Virtual Apps & Desktops. Before we begin, if VDI happens to be […]
Extra AD domain controllers are not recommended because they are hard to administer. However, you may need an extra domain (Child domain controller) in the following scenarios. In this blog, we will explore adding a child domain to an existing forest. The Active Directory Domain Services (AD DS) design teams have finished the design phase […]
The ILS – Intercluster Lookup Service feature enables different CUCM Cluster to exchange directory URI with other clusters in an ILS network. URI Replication provides support for intercluster URI dialing. ILS runs as a service only on the Publisher node of a cluster. ILS works like Voice Routing Protocol because it behaves like a dynamic […]