ITperfection-admin21

About Ali Hassani

This author has not yet filled in any details.
So far Ali Hassani has created 158 blog entries.

Network Switching: Part 3: Types of Categories of Switches, Such as Stackable Switches, or Access Layer Switches

2021-02-21T08:10:43+00:00Categories: Computer & Network Concepts, Networking|Tags: , , , , , , , , , , , , , , , , , |

Now, Categories of Switches. To make you more familiar with the concepts of network switching and to get acquainted with the reputable vendors of network switches, we have prepared a number of blogs as a series, the different parts of which are as follows: Part 1 - What is a Network Switch? Switching Terms (Such [...]

Network Switching: Part 2: What is a Network Switch? Switching Terms (Such as PoE, VLAN, and STP)

2021-02-21T08:08:52+00:00Categories: Computer & Network Concepts, Networking|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

To make you more familiar with the concepts of network switching and to get acquainted with the reputable vendors of network switches, we have prepared a number of blogs as a series, the different parts of which are as follows: Part 1 - What is a Network Switch? Switching Terms (Such as Blade Server, Half [...]

Network Switching: Part 1: What is a Network Switch? Switching Terms (Such as Blade Server, Half Duplex, and Full Duplex)

2021-02-21T07:40:54+00:00Categories: Computer & Network Concepts, Networking|Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

To make you more familiar with the concepts of network switching and to get acquainted with the reputable vendors of network switches, we have prepared a number of blogs as a series, the different parts of which are as follows: Part 1 - What is a Network Switch? Switching Terms (Such as Blade Server, Half [...]

TDoS Attack

2021-01-30T09:10:30+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , |

In this post, we are going to talk about TDoS attack. First of all, we recommend that you read our other post, in which we describe the DoS and DDoS attacks: DoS and DDoS Attacks In its annual report "Internet Crime Report" for 2019, the U.S. Federal Bureau of Investigation (FBI) estimated that TDoS attack [...]

What is John the Ripper and How Does it Work?

2021-01-26T12:13:56+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , , , , , , , |

John the Ripper is a free password cracking software tool. It was designed to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary attacks. John the Ripper is a part of the Rapid7 family of penetration testing/ hacking tools. Also, John is already installed on Kali Linux. First, we advocate for ethical [...]

What is Kali Linux?

2021-01-20T13:55:44+00:00Categories: Network Administration, Network Security|Tags: , , , , , , , , , , , , , , |

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security,a leading information security training company. In fact, it’s a Debian-based rewrite of their previous Knoppix-based digital forensics and penetration testing distribution BackTrack. One of the biggest reasons cyber professionals use Kali Linux is [...]

What is NESSUS and How Does it Work?

2021-01-18T11:20:10+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , , , , , |

Nessus is a proprietary vulnerability scanner developed by Tenable, Inc. Tenable.io is a subscription-based service. Tenable also contains what was previously known as Nessus Cloud, which used to be Tenable’s Software-as-a-Service solution.  Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. In [...]

Vulnerability Scanning Tools

2021-01-14T11:10:02+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , |

We discussed vulnerability scanning in recent blog. Now in this blog we are going to introduce a number of vulnerability scanning tools. What is Network Vulnerability Scanning? Among the famous tools in this area are the following: SolarWinds MSP OpenVAS Nikto Retina products Solarwinds Network Configuration Manager Nexpose Community Edition ManageEngine Vulnerability Manager Plus ImmuniWeb [...]

What is Network Vulnerability Scanning?

2021-01-13T09:34:02+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , , , |

Vulnerability management is a key responsibility of any IT security team or managed security service provider. This scanning is an inspection of the potential points of exploit on a computer or network to identify security holes. Vulnerability scanning is an integral component of vulnerability management. In fact, a scanner is an application that identifies and [...]

Go to Top