Network Security: Replicated Services (For Corporates)

One of the most convenient methods of securing private data is using ‘‘Replicated services”. This method is actually done for backing up your data. We have to create two or more systems (or networks) having same function. These are used for performing same work. Both the systems are exact replicas of each other. Advantages: 1. … Read moreNetwork Security: Replicated Services (For Corporates)

I am Surprised by the Lack of Awareness on Network Security at Corporate Level

network_security

Till today I never used a broadband connection other than the one they provide at my college. At college we are behind a proxy server, so we are not in direct connection with the computers outside our college. Today I happened to use BSNL dataone broadband internet connection at my uncle’s place, and I casually … Read moreI am Surprised by the Lack of Awareness on Network Security at Corporate Level

Telnet Lessons – Part 3

how to telnet learning lessons

Carolyn’s note: <CRLF> just means hit return. In case you can’t see that little period between the <CRLF>s, what you do to end composing your email is to hit enter, type a period, then hit enter again. Anyhow, try typing: This is a test. . 250 Requested mail action okay, completed quit 221 <techbroker.com> Service … Read moreTelnet Lessons – Part 3

Telnet lessons – Part 2

how to telnet learning lessons

The simplest use of telnet is to log into a remote computer. Give the command: C:/>telnet targetcomputer.com (substituting the name of the computer you want to telnet into for targetcomputer.com) If this computer is set up to let people log into accounts, you may get the message: login: Type your user name here, making sure … Read moreTelnet lessons – Part 2

How To Telnet | Learn – Lessons Part 1 of 3

how to telnet learning lessons

The Magic of DOS! In this guide you will learn how to telnet, forge email, and use nslookup with Windows XP. The key to doing amazing things with XP is as simple as DOS. Yes, that’s right, DOS as in MS-DOS, as in Microsoft Disk Operating System. Windows XP (as well as NT and 2000) … Read moreHow To Telnet | Learn – Lessons Part 1 of 3

What are Trojans? – History, Prevention, Explanation

what are trojans history prevention

Trojans History: According to the history, Trojans are the most harmful tool ever developed by the hackers, Back in 1998 the first Trojan named subseven was released and created a new history in the world of hackers. How Trojans Enter into System? Trojans actually comes from the file with dual extensions. Dual extensions mean one … Read moreWhat are Trojans? – History, Prevention, Explanation

9 Steps To Help In Keeping Your Organization Secure

steps to keep your organization secure

If the computer you use to run your online business is the same one your children use for homework and general surfing, this is potentially a very precarious circumstances. Learn how to keep your organization secure. The following are a few Anti-Hacking tips that will help in keeping your organization secure. Install Anti-Virus software and … Read more9 Steps To Help In Keeping Your Organization Secure

Start a Webserver with PHP and MYSQL support on your home Computer

webserver with php on home computer

Before we go on with the tutorial first let us see why would someone wants to start a webserver on his home computer: learn PHP and some other programming languages If you have a unique IP address you can begin your own site from your house To get used with Forum, blog, Photo sharing and … Read moreStart a Webserver with PHP and MYSQL support on your home Computer