Posts

Showing posts from October, 2020

Three main objectives of information security?

  The primary objective of the information security program is to implement the strategy in the most cost effective manner while at the same time maximizing support of business functions and minimizing operational disruptions. In Information Security Governance (ISG) and Information Risk Management (IRM) the governance and risk objectives for a security program were defined and incorporated into an overall strategy. The level of understanding that candidates need to have obtained in ISG and IRM will determine the degree of clarity in understanding information security program development objectives. For example, if candidates are able to come up with a well-developed security strategy, it would be less stressful for them to turn a high-level strategy into a meaningful, logical and physical reality. Despite a well-formed security strategy, candidates must be able and prepared to modify or reconsider certain elements during the program design, development and administration, depending on

how technology trends changing humanlives

  Even as new technologies are developed, innovation around the application of existing technology is rapidly changing how organisations operate and how we interact with the world. Leaps in computing capacity, data capture and connectivity are accelerating this change. Here are five areas to watch in 2019 and beyond… Artificial intelligence AI is about machines with human attributes - speaking, reading, seeing and even recognising emotion - completing tasks while also "learning" from repeated interactions. Using algorithms that adapt to location, speech or user-history machines can perform tasks that are dangerous or tedious, more accurately or much faster than humans. Within a few years, analysts predict that all software will use AI at some level, according to US research and advisory firm Gartner. Importantly AI offers the opportunity to continuously tailor products and services providing a competitive advantage over rivals that is not easily copied. The question to ask is

Wireless Security for wireless network

  When it comes to having a wireless network at your home or business, having wireless security is essential. Having good wireless security can make your wireless network less susceptible to hackers and can make connecting to the network difficult for those who you do not want to have access. Regardless of your wireless router, configuring wireless security on your router merely requires going to the correct section of the administration control panel. Step 1 Type your router's administration control panel address into Internet Explorer. For Linksys/Cisco routers, the address is 192.168.1.1. For D-Link and Netgear routers, the address is either 192.168.0.1 or 192.168.1.1. For other routers the address may be 192.168.1.1, 192.168.0.1 or 192.168.2.1. If none of these work for you, consult your router's user manual. Step 2 Type in your user name and password for the administration control panel of your router, and click "OK." For Linksys/Cisco routers, the default user n

LAN Connector Role in Networking

  Local Area Networks (LANs) are the small networks to which many business and home computer user initially connect. These networks enable such functions as file, drive, and printer sharing while also directing traffic to and from the Internet. Depending on the age and type of computer, network users may be connecting with one of several different types of LAN connectors, and may be subject to some interesting considerations. Function Regardless of the type of connector, LAN connectors serve the same general purpose: transferring data between the individual computer and the network to which it is connected. By passing data through the LAN connector, the computer is able to exchange information and share resources with other nearby computers as well as access information on machines located around the world (assuming the LAN has a gateway to the Internet). The protocol used by the LAN connector depends entirely on the type of network to which the computer is connected, though most moder

Connect the incoming network by network switches

  Network switches for home and small office use are typically stand-alone units, while switches for larger networks are usually rack-mounted. Either way, they typically use either Cat5 or Cat6 ethernet cables. Switches allow multiple computers to connect to a single Internet connection, but rather than simply passing the signal through, like a network hub, a switch can manage that network traffic. Switches differ in the way they handle network traffic, but all of them are installed in a very similar way. Step 1 Provide power to the switch, if required. For a stand-alone switch, this simply means plugging in the power supply. For rack-mounted switches, this means using a slot that has power supplied to it. Step 2 Connect the incoming network cable to the switch. Although any slot can be used on most network switches, it is a good idea to use the first slot so anyone can quickly identify the incoming cable. For home and small office applications, the incoming cable will be the one comin

Is Wireless Network runs slow the Internet speed

  The holy grail of networking is speed, and we’re all on our own quests for it. The greatest laid plans can be thwarted by the slightest oversight, mistake, or even necessary processes (like security). Internet speed is the most forward-facing utility that you provide, so you better get it right. If your network runs slow, you’re never going to hear the end of it. 1. It’s all about placement It’s the central fact of real estate, it’s the core principle of sales, and it’s a central lesson in wireless access points: location, location, location. Obvious, right? Where you put the broadcast device really matters for your network speed. 2. Configurable settings: configure them. Most WAPs come out-of-the-box with the settings they need to do their job. But so does every Windows installation and your newest phone. Did you leave those settings the same? Of course not. (You did? You monster.) Default settings will work fine. But they’re everything for everyone. You may be unnecessarily slowing

How to identify Local Web Page

  Before purchasing a domain name and setting up a website with an Internet Service Provider (ISP), consider using local web pages to perform simple web-related tasks. Local web pages allow you to create useful web applications, photo galleries and media players that run in your browser. You can even bookmark them for quick access. Local web pages are also useful for dissecting other websites and enhancing your web development skills. Step Open an HTML editor or Notepad and paste the following code into a new document. !DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> http://www.w3.org/1999/xhtml"> This will create an empty HTML document with no elements or controls. know more :  lanmanserver windows 7

Network switches for larger networks

  Network switches for home and small office use are typically stand-alone units, while switches for larger networks are usually rack-mounted. Either way, they typically use either Cat5 or Cat6 ethernet cables. Switches allow multiple computers to connect to a single Internet connection, but rather than simply passing the signal through, like a network hub, a switch can manage that network traffic. Switches differ in the way they handle network traffic, but all of them are installed in a very similar way. Step 1 Provide power to the switch, if required. For a stand-alone switch, this simply means plugging in the power supply. For rack-mounted switches, this means using a slot that has power supplied to it. Step 2 Connect the incoming network cable to the switch. Although any slot can be used on most network switches, it is a good idea to use the first slot so anyone can quickly identify the incoming cable. For home and small office applications, the incoming cable will be the one comin

LAN Connector uses

  Local Area Networks (LANs) are the small networks to which many business and home computer user initially connect. These networks enable such functions as file, drive, and printer sharing while also directing traffic to and from the Internet. Depending on the age and type of computer, network users may be connecting with one of several different types of LAN connectors, and may be subject to some interesting considerations. Function Regardless of the type of connector, LAN connectors serve the same general purpose: transferring data between the individual computer and the network to which it is connected. By passing data through the LAN connector, the computer is able to exchange information and share resources with other nearby computers as well as access information on machines located around the world (assuming the LAN has a gateway to the Internet). The protocol used by the LAN connector depends entirely on the type of network to which the computer is connected, though most moder

Wireless Security settings

  When it comes to having a wireless network at your home or business, having wireless security is essential. Having good wireless security can make your wireless network less susceptible to hackers and can make connecting to the network difficult for those who you do not want to have access. Regardless of your wireless router, configuring wireless security on your router merely requires going to the correct section of the administration control panel. Step 1 Type your router's administration control panel address into Internet Explorer. For Linksys/Cisco routers, the address is 192.168.1.1. For D-Link and Netgear routers, the address is either 192.168.0.1 or 192.168.1.1. For other routers the address may be 192.168.1.1, 192.168.0.1 or 192.168.2.1. If none of these work for you, consult your router's user manual. Step 2 Type in your user name and password for the administration control panel of your router, and click "OK." For Linksys/Cisco routers, the default user n

Simple Method to Learn How to Extract Encrypted RAR Files

  It's possible to force the user to supply a password to encrypt RAR archives so a file can be extracted. If you have an encrypted archive for which you don't know the password, or if you've simply forgotten a password you assigned yourself, there are a handful of tricks you can attempt. Step 1 Check the source of the archive. If you downloaded it from a website, look around the site for a mention of the password (after all, it's unlikely someone offered an unopenable archive for download.) If the person you downloaded it from can be contacted, send them an email asking for the password. Step 2 Try a few likely-seeming passwords. The name of the source website may work, as may the name or Internet handle of the archive creator. Step 3 Try a brute-force approach. This involves simply cycling through every possibility, one by one, until something works. You can technically do this yourself, but it would take forever and be extremely tedious. Fortunately there's a pro

How to Install and Configure Routers and Switches

  Network switches for home and small office use are typically stand-alone units, while switches for larger networks are usually rack-mounted. Either way, they typically use either Cat5 or Cat6 ethernet cables. Switches allow multiple computers to connect to a single Internet connection, but rather than simply passing the signal through, like a network hub, a switch can manage that network traffic. Switches differ in the way they handle network traffic, but all of them are installed in a very similar way. Step 1 Provide power to the switch, if required. For a stand-alone switch, this simply means plugging in the power supply. For rack-mounted switches, this means using a slot that has power supplied to it. Step 2 Connect the incoming network cable to the switch. Although any slot can be used on most network switches, it is a good idea to use the first slot so anyone can quickly identify the incoming cable. For home and small office applications, the incoming cable will be the one comin

Types of Wi-Fi Security Settings

  When it comes to having a wireless network at your home or business, having wireless security is essential. Having good wireless security can make your wireless network less susceptible to hackers and can make connecting to the network difficult for those who you do not want to have access. Regardless of your wireless router, configuring wireless security on your router merely requires going to the correct section of the administration control panel. Step 1 Type your router's administration control panel address into Internet Explorer. For Linksys/Cisco routers, the address is 192.168.1.1. For D-Link and Netgear routers, the address is either 192.168.0.1 or 192.168.1.1. For other routers the address may be 192.168.1.1, 192.168.0.1 or 192.168.2.1. If none of these work for you, consult your router's user manual. Step 2 Type in your user name and password for the administration control panel of your router, and click "OK." For Linksys/Cisco routers, the default user n

What Are the Different Security Protocols for Wireless Networks

  When it comes to having a wireless network at your home or business, having wireless security is essential. Having good wireless security can make your wireless network less susceptible to hackers and can make connecting to the network difficult for those who you do not want to have access. Regardless of your wireless router, configuring wireless security on your router merely requires going to the correct section of the administration control panel. Step 1 Type your router's administration control panel address into Internet Explorer. For Linksys/Cisco routers, the address is 192.168.1.1. For D-Link and Netgear routers, the address is either 192.168.0.1 or 192.168.1.1. For other routers the address may be 192.168.1.1, 192.168.0.1 or 192.168.2.1. If none of these work for you, consult your router's user manual. Step 2 Type in your user name and password for the administration control panel of your router, and click "OK." For Linksys/Cisco routers, the default user n

LAN Network Cable Media and Connectors

Local Area Networks (LANs) are the small networks to which many business and home computer user initially connect. These networks enable such functions as file, drive, and printer sharing while also directing traffic to and from the Internet. Depending on the age and type of computer, network users may be connecting with one of several different types of LAN connectors, and may be subject to some interesting considerations. Function Regardless of the type of connector, LAN connectors serve the same general purpose: transferring data between the individual computer and the network to which it is connected. By passing data through the LAN connector, the computer is able to exchange information and share resources with other nearby computers as well as access information on machines located around the world (assuming the LAN has a gateway to the Internet).  The protocol used by the LAN connector depends entirely on the type of network to which the computer is connected, though most modern

Extensible Authentication Protocol over LAN

  Most people are familiar with PPP - Point-to-Point Protocol. PPP is most commonly used for dial-up Internet access. PPP is also used by some ISPs for DSL and cable modem authentication, in the form of PPP over Ethernet. PPP is part of Layer 2 Tunneling Protocol, a core part of Microsoft's secure remote access solution for Windows 2000 and beyond. What is PPP PPP evolved beyond its original use as a dial-up access method and is now used all over the Internet. One piece of PPP defines an authentication mechanism. With dial-up Internet access, that's the username and password you're used to using. PPP authentication is used to identify the user at the other end of the PPP line before giving them access. What is EAP? Most enterprises want to do more for security than simply employing usernames and passwords for access, so a new authentication protocol, called the Extensible Authentication Protocol (EAP), was designed. EAP sits inside of PPP's authentication protocol and p

Network Security Solutions for Business

  Network Security Payoffs Network security has a number of benefits for defending your clients’ businesses against threats. Obviously the number one advantage is minimizing the level of risk for attacks, infections, and breaches. For most companies, reaching an acceptable level of security can be difficult, if not impossible, to achieve on their own, even for organizations that have their own IT staff and help desk. With the right network security tools, however, MSPs can offload the security yoke from organizations and protect their clients’ computer systems, networks, files, and data from attacks and breaches. Keeping files free from infection is particularly important in today’s collaborative workplace, where information is shared among co-workers inside a company as well as with partners, consultants, analysts, and others outside the company. Network security also keeps sensitive data, such as personal information and confidential business materials, away from unauthorized individ

Everything You Need to Know About 5G

  The latest CES 2019 set some trends for the future of technology and one of the most anticipated is the arrival of 5G Internet in the market. With the promise of being extremely fast and with double capacity for information transmission, the technology comes to revolutionize communication between everything connected to the internet. After the event, some innovation gurus say that from 2020 onwards we will live the “Data Age”, in which any electronic device will be able to analyze data that will be received via sensors or cloud. The big advantage of the 5G will be its simultaneous connection capability as the current 4G can handle a maximum of 10,000 gadgets within 1 km 2 . The arrival of 5G guarantees a range of 1 million devices within this same radius. And just as importantly, 5G will also bring data transfer capacity of up to 20gb, while 4G supports up to 10gb. And do you know where 5G technology will take immediate action? Obviously in smart cars, which are the future of transpo