• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

Site to Site VPN Between Cisco VPN Concentrator and Router

by wing

modify IKE proposal in concentrator

At times, it is economical to build a VPN tunnel with the available networking resources. For example, if you have a VPN concentrator and you need to connect a small office securely with your network, you can do so by installing a low priced Cisco router in the remote office. This post will demonstrate how you can build VPN using a VPN concentrator and a Cisco router. … [Read more...] about Site to Site VPN Between Cisco VPN Concentrator and Router

What is Digital Certificate?How it Works?

by wing

how digital certificate works

A digital certificate is a way to confirm the identity of a public key owner. Normally, a third party organization, known as CA (certification authority), is responsible for confirming or binding the identity of a digital certificate owner. It is used to establish secure communication between two parties who are unknown to each other or have lack of trust. Digital certificate … [Read more...] about What is Digital Certificate?How it Works?

What is Digital Signature and How it Works?

by wing

how digital signature works

A digital signature is an electronic equivalent of a physical signature. Just like the way a signature in a paper authenticates the signer, the digital signature also confirms the authenticity of the owner. Besides, it ensures that integrity of the data and non-repudiation. Non-repudiation means that the sender cannot later deny that he did not send the message. So, if you have … [Read more...] about What is Digital Signature and How it Works?

Webhosting Security-Best Practices and Concerns

by wing

To many IT professionals, webhosting security means protecting websites from hackers and malicious codes. But most of the time we forget to consider that  websites security depends on a number of components such  as server , application , database, scripts etc. One of the most important aspects of webhost security is to ensure continuous operation and disaster recovery of web … [Read more...] about Webhosting Security-Best Practices and Concerns

Types of Virtualization Technology-Advantages vs. Disadvantages

by wing

hypervisor type 1

Virtualization helps to integrate several servers into a  physical server in such a way that every server appears  as a standalone server to the users. The three types of  popular server virtualizations are OS virtualization, hardware emulation and paravirtualization. … [Read more...] about Types of Virtualization Technology-Advantages vs. Disadvantages

20 Forensic Investigation Tools for Windows

by wing

To investigate Windows system security breach for any potential security breach, investigators need to collect forensic evidence. Microsoft has developed a number of free tools that any security investigator can use for his forensic analysis. This post will give you a list of easy-to-use and free forensic tools, include a few command line utilities and commands. … [Read more...] about 20 Forensic Investigation Tools for Windows

Top 10 Cloud Computing Security Issues

by wing

cloud computing security

From security perspective, not all types of data of an organization are  equally important for successful  business operation. Depending on business criticality, some  data need to be more secured. The enormous computing power of cloud attracts businesses to put their data in the cloud, but many of the businesses do not have any decisive policy that defines  which data to put … [Read more...] about Top 10 Cloud Computing Security Issues

Cloud Privacy Issues and Questions for Users

by wing

cloud privacy issues

Though various types of cloud are available to serve various types of customers,  they all serve the same purpose-offer IT resources and services to customers accessible via web browser.  The hardware and software powering the clouds always stay behind the customer’s eye-thus when we hear the term “cloud” it papers to some of us as an black box. The aim of this post to help you … [Read more...] about Cloud Privacy Issues and Questions for Users

Types of Backup-Difference between full, incremental and differential backup

by wing

differential backup

Data backup gives us a sense of assurance that our data can come back to online no matter what happens to our system. Whether you are a backup administrator or a IT auditor, having a clear understating of the backup types will help you develop a strong backup strategy for your critical data and system files. This post aims to distinguish the difference between the major types … [Read more...] about Types of Backup-Difference between full, incremental and differential backup

How to Protect Networks against Advanced Evasion Techniques(AET)

by wing

advanced evasion technique

Evasion techniques evade the exiting network security devices such as signature based  IPS and firewalls to enter the internal network to deliver exploits in servers. Most of the Intrusion detection and prevention system rely on attack signatures to identify malicious strings in the traffic. The strings used to evade the devices are not malicious themselves. Their main purpose … [Read more...] about How to Protect Networks against Advanced Evasion Techniques(AET)

How to audit Linux CentOS Security with Lynis

by wing

lynis command for scan options

Hardening Linux security may seem to be a daunting task for new Linux administrator and security auditor if they try to do it manually. Lynis automates the process of Linux security audit, which is widely used by system administrator, IT security auditor and  security specialists. When you run Lynis to scan a system, it generates a report and suggestions that helps to patch up … [Read more...] about How to audit Linux CentOS Security with Lynis

« Previous Page
Next Page »

Primary Sidebar

Please help us sharing

Categories

  • AWS
  • Basics
  • Containers
  • Cryptocurrency
  • Cyber
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Law & Human Rights
  • Network Security Tips
  • Off Track
  • Social Media Governance
  • Tech Comparisons
  • Tech Stack Suitability
  • Telecom
  • Tutorial

CISSP Sample Test

Take a CISSP Sample Test

CISA Sample Test

CISA IT governance Sample test

Please Follow Us

Contact us for Ads

Go to Contact Form

Search

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

audit AWS backup basics browser check cisco cloud computer configuration cyber data database email gmail hsrp ids iis informaiton internet kubernetes linux load balancing malware microsoft network protection redundancy risk router security security tips server social media SSL switch test tools vpn vrrp web webserver website windows wordpress

Copyright © 2010-2025 ·All Rights Reserved · SecurityWing.com