What’s HPE iLO?

2021-02-27T06:34:09+00:00Categories: Computer & Network Concepts, Networking|Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

Integrated Lights-Out, or iLO, is a proprietary embedded server management technology by HP (Hewlett-Packard) which provides out-of-band management facilities. HP iLO is combination of the iLO ASIC that is part of the server-board and the firmware that powers the ASIC. iLO is key to make the server operational and boot and it helps simplify server [...]

Auvik

2020-12-22T10:19:58+00:00Categories: Network Administration, Network Monitoring|Tags: , , , , , , , , , , , , , , , , |

In this post, we are going to introduce you to a powerful tool in the field of network monitoring. It is better to read this blog first of all: Network Monitoring. The tool we are going to discuss is called Auvik network management and monitoring. It is a cloud-based software. Official site of the manufacturer [...]

8-Steps to Secure Your Computer

2020-09-23T04:09:03+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

8-Step to Secure Your Computer Whether you use your computer primarily for work tasks or personal use or both, it’s highly likely you want to keep it and its contents safe and secure. Keeping your computer secure helps you avoid malware and direct hacking attempts designed to steal your personal information. In this post, we’ll [...]

Properties of a Strong Password

2020-09-20T09:07:01+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , |

One of the most important ways to ensure that your online interactions are safe and secure is to protect your passwords. Also, the more powerful your password, the harder it is for a hacker to invade your system. A strong password: Is at least 12 characters long Is a combination of uppercase letters, lowercase letters, [...]

Brute Force Attack

2020-08-14T07:31:06+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , |

A brute force attack (exhaustive search) is a cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered. This attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Brute force attacks don’t employ an intellectual strategy. These attacks simply try using [...]

Authentication Methods

2020-09-02T05:32:17+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

Authentication is the process of verifying the identity of a person or device. In fact, Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server. The authentication process always runs at the start of the [...]

Biometric Authentication Methods

2020-09-20T05:04:56+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , |

In recent years, issues such as Multi-Factor Authentication (MFA) and Biometric Authentication have become more common due to problems in traditional authentication methods. In fact, biometric methods can be considered a subset of  MFA. In this post, we take a look at the most common methods used in biometric authentication. There are a number of [...]

Manage Identification and Authentication

2020-07-16T06:39:28+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Manage Identification and Authentication of People, Devices, and Services In this part of this tutorial, we'll take a look at Manage Identification and Authentication of People, Devices, and Services to help you understand the different aspects of authentication. Identity Management Implementation The core activity within identity and access management (IAM) is the management of [...]

Go to Top