ITperfection

How To Document BCP?

2020-09-02T05:46:34+00:00Categories: Computer & Network Concepts, Network Administration|Tags: , , , |

It is a good idea to read this post first about resuscitation as well as job continuity. As you can see, the process of business continuity involves several steps. In the fifth stage, called "BCP Implementation", one of important things that needs to be done is to document the business continuity plan (BCP). We discuss [...]

Spoofing Attacks

2020-09-24T06:16:42+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , |

Spoofing attacks are deliberately falsified to mislead and appear to be from a legitimate source. For example, spoofed phone numbers making mass robo-calls; spoofed emails sending mass spam; forged websites used to mislead and gather personal information. Spoofing can be used to gain access to a target’s personal information, spread malware through infected links or [...]

Hardware Firewalls

2020-09-11T12:49:43+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , |

Previously; We wrote an article as “All Things about Firewalls" earlier. Now, we want to discuss more about hardware firewalls. A hardware firewall is a physical device similar to a server that filters traffic to a computer. Hardware firewall has processor, memory, and sophisticated software, powerful networking components (hardware and software) and force all traffic [...]

What’s PCI DSS?

2020-09-23T14:14:28+00:00Categories: Network Compliances, Network Security|Tags: , , , , |

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards for organizations that handle branded credit cards. The PCI DSS applies to ANY organization that accepts, transmits or stores any cardholder data. The PCI Standard is administered by the Payment Card Industry Security Standards Council. This Council’s mission is to enhance [...]

Server virtualization

2020-09-02T05:46:42+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , |

Computer network administrators usually dedicate each server to a specific application or task. In most cases each application / task needs its own dedicated machine. There are a couple of problems with this approach, though. One is that it doesn't take advantage of modern server computers' processing power. Many of these servers sit idle as the [...]

Password Managers

2020-09-23T14:09:15+00:00Categories: Network Administration, Network Security|Tags: , , , , , , , , , , , , , |

Why is it recommended to use password managers? These days, every new website and application we sign up for is another password we have to remember. In fact, the number of passwords we need to remember is so high that we may forget all or part of them. If we write down passwords in a [...]

Veeam Backup & Replication

2020-09-23T14:05:09+00:00Categories: Backup|Tags: , , , , , , , , , , , , , , , , , , , , , , , |

First of all, it should be noted that in preparing this post, we have used a lot of contents from the veeam website help center. Sometimes we have copied and pasted the article, in most cases we have summarized the article, and sometimes, of course, we have written our own interpretation of that content. We [...]

Go to Top