I couldn’t resist myself from trying Google’s Chrome OS that got everyone buzzing. Engadget has a very helpful video – How-to: run Chrome OS as a virtual machine. The image they’ve used is from gdgt. Another useful how to is…
I couldn’t resist myself from trying Google’s Chrome OS that got everyone buzzing. Engadget has a very helpful video – How-to: run Chrome OS as a virtual machine. The image they’ve used is from gdgt. Another useful how to is…
Hurray…! My intense work for last couple of weeks has finally paid off. Yeah, I’ve just passed my SFCP (Source Fire Certified Professional) Certification Exam. First briefly about the company – Sourcerfire was founded by the author of Snort (an…
After a vigorous job hunt of little more than a week, I’m glad to let you all know that I’ve joined Vanco (Reliance Globalcom, Anil Dhirubhai Ambani Group) as a Security Engineer, which provides global managed network solutions with assets…
GFI LANguard Network Security Scanner is a very easy to use yet powerful commercial Network vulnerability scanning, patch management and auditing tool. If you have a small network with few computers then it’s easy to keep track of the softwares…
If you’re running a web site and have come to a point where a single web server cannot handle the traffic, then it’s time to get multiple web servers and share the loading. To do that you’ll need a load…
When I read Mahabir Pun’s story about how he brought the wireless technology to a remote mountainous village of Nepal called Nangi, I was amazed by his determination! What an inspirational story of a man with a noble cause. It…
How do you monitor your network traffic? Of course using MRTG, you might say. Yes, that’s true, MRTG does an excellent job of monitoring traffic across networks and devices (router/switches). But when you see an abnormal traffic in MRTG, how…
After switching to a mac, I tried many desktop password managers, and had written about Password Managers for OS X, which got a lot of attention. It’s needless to mention the importance of using a password manager since we use…
The benefits of designing and testing complex networks in simulated environments are obvious to network professionals and companies. It lets them test the network configurations before implementing it in the real world, and the good thing is that, they can…
There are many things you can and should do to keep your system and network secure. As the saying goes — “Security is not a single event or a product, it’s a process”. So, you’ve to keep up with all…
Recent Comments