We came across a challenge in one of our deployments where we had provisioned the virtual machines and handed them over to the application team to work on deploying their application on the VMs. The issue that we faced is that VM – A was able to ping VM – B but it was happening […]
Basically, Logical Volume Management (LVM) introduces an extra layer between the physical disk and the file system, it can create “virtual” disk partitions out of one or more physical hard drives. It also allows you to create larger partitions, then you could achieve with a single drive allowing the file system to be – Resized […]
NCR Corporation/AT&T in the Netherlands invented Wi-Fi, a popular wireless networking technology that stands for WIreless FIdelity, in 1991. We can exchange information between two or more devices that have been developed for mobile computing, such as laptops, mobile phones, and so on, using this technology. The data is converted into radio signals by the […]
Data loss prevention, sometimes referred to as data leak prevention is the practice to ensure that there are no data breaches and sensitive data is not lost or misused. DLP is defined as technologies to perform both content inspection and contextual analysis of data sent via messaging applications, in use on a managed endpoint device, […]
Our goal as a Network Security Engineer is to be able to provide secure channels of communication over unsecured networks. E.g., the Internet. We have 2 remote offices we are trying to connect or remote users and a central office that we are trying to connect, and we want to make sure that we have […]
What do you understand by the term CYBERSECURITY? Novices may think about a group of hackers wearing masks of anonymous and breaking in a website to steal the data. This might be the scene and we are not denying it, but they might be hidden in plain sight. They may be people with who you […]
Cisco Meeting Server is a Secure on-premises Video Conferencing solution that is easy to configure and for that, you just need to have some understanding of CMS components. Most new users get confused with what all is required to know and configure. In this blog, we will cover the deployment models and basic configuration to set up […]
What Are Modern Applications? The applications which are loosely coupled, lightweight, easy to scale, designed to run on container-based platforms are known as modern applications. By using these types of applications, organizations can easily achieve availability, reliability, scalability, portability & security. Why Storage And Backup Play A Major Role In Modern Applications? The are many […]
ACI (Application Centric Infrastructure) and NX-OS (Nexus Operation System) both are the very advance technology which is mostly used in Cisco Nexus Switches in Data Center. With this technology, most of the customers are shifting from a legacy network to ACI and VXLAN concepts. As we know the VXLAN protocol overcomes this limitation by using […]
This blog post will give you a brief introduction to what Snort Engine is and most importantly enable you to understand what new features and changes you can expect in Snort Engine 3.0. This blog will not detail each new technical aspect of Snort Engine 3.0 as the team at Snort does it best. After […]