Blog Posts Tagged with "Configuration"

637466d18cc35f545740244d707c0482

Achieving Network Security

February 07, 2012 Added by:Kevin Somppi

Today's networks are complex, with most organizations supporting various server, operating system and Web platforms. This requires an accurate, comprehensive, and up-to-date way to identify the latest system vulnerabilities and configuration errors...

Comments  (0)

82ac4cd789b46af43c0cde730625317e

Common Errors in Firewall Configurations

December 06, 2011 Added by:Christopher Rodgers

With the "ANY" port accessible vulnerability, clear text protocols could be used when both a secure and less secure clear text service are running on the same system, and vulnerabilities found for specific services such as SMB could be launched against vulnerable machines...

Comments  (0)

69850a58aa122f9d42c80b2d502dec6a

Small Goals Lead to Bigger Results

November 01, 2011 Added by:Joshua Lochner

Based on application flows and the importance placed on a web presence, the goal is to configure notification level alerts to be sent to the System Administrators for security related events from the three servers in the front-end web server cluster, and configure emergency alerts...

Comments  (0)

C70bb5cfd0305c9d18312d92f820c321

Security Without Patches

October 12, 2011 Added by:Gabriel Bassett

The Fortification Principle implies that defense is at a disadvantage when using patches as mitigation. Instead, I propose you secure your network without patching. I don’t mean to never patch, but plan to only apply security patches and configuration changes for regular deployment cycles...

Comments  (1)

E973b16363b3de77b360563237df7e32

RAID and Disk Size - Search for Performance

August 30, 2011 Added by:Bozidar Spirovski

Centralizing your storage is always a very good idea - you can manage storage requirements of most servers through a central storage system, without the hassle of juggling local disks within servers. But centralizing a storage opens a whole new world of hassles...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part III

July 25, 2011 Added by:Dawn Hopper

One scenario in which asymmetric routing of packets is frequently seen is with topologies designed for load balancing. The unintended consequence of this behavior would be connectivity problems due to dropped packets not matching the device state table...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Trojan Utilizes Modified Security Solution Code

March 04, 2011 Added by:Headlines

"Kingsoft WebShield has the ability to lock the home page to a specific domain as well as to redirect URLs based entirely on plain text configuration files... a person with malicious intent can repackage it using malicious configuration files and use this as a home-made Trojan package..."

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Five Quick WLAN Configuration Tips

November 23, 2010 Added by:Global Knowledge

The consensus is that it’s a great technology with a few frustrating things. The good news is that the positives outweigh the negatives, otherwise people wouldn’t use it, right? The bad news is that direct information on simple config changes that might improve things can be hard to find...

Comments  (0)

Page « < 1 - 2 > »