In this article let us analyse the various technologies that ensure high data availability and redundancy. The following table makes a comparative analysis of clustering, mirroring, log shipping & data replication. Continue reading “Clustering vs. Mirroring vs. Log shipping vs. Data Replication”
A comparative analysis of MPLS, MLLN and ISDN
When talking about telecommunication, we hear a lot about leased lines, ISDN and MPLS.
This article makes a comparative analysis among MPLS, MLLN and VPN. The following table captures the differences.
Continue reading “A comparative analysis of MPLS, MLLN and ISDN”
ALICE – The Chat Bot
Human intelligence has always been trying to find newer ways of searching. With advancements in technologies such as voice recognition, Natural language processing and Artificial Intelligence, it shouldn’t surprise many if in the future, systems connected with the internet can be configured to respond to the user queries in a casual manner . Continue reading “ALICE – The Chat Bot”
A comparative analysis of IDS, IPS, firewalls & routers
When we speak about network security, we often hear about terms like firewalls, Intrusion Detection System and Intrusion Prevention System. In this article, let us gain some understanding of these jargons.
The following table brings out a comparative analysis of firewalls, IDS, IPS and routers:
Continue reading “A comparative analysis of IDS, IPS, firewalls & routers”
Understanding Demilitarized Zone in Networks
Demilitarized zone or DMZ as it is abbreviated is a firewall configuration for securing internal network of an organization.In any business environment a need arises to permit external access to some part of organization’s network, for example to enable external e-mail to be received and to provide public access to a web site. This introduces the concept of the “demilitarized zone”. Continue reading “Understanding Demilitarized Zone in Networks”
Audit of Solaris BSM – An Overview
Basic Security Module or BSM is the audit tool used by Solaris Operating System. The BSM files are located in the /etc/security directory. To enable the BSM, the administrator has to run the bsmconv script. This script creates a number of files in the /etc/security directory. In this article we shall discuss two important files that are created viz. Audit Control File and Audit User File Continue reading “Audit of Solaris BSM – An Overview”
US loses one laptop every 50 seconds in its airport!!
Imagine the situation of losing one’s laptop. What is the cost? It involves not only losing a significant expense but also the data stored in it which may range from personal data like photos, important numbers, music, software etc to corporate data where the cost involved could be unimaginable. A recent survey conducted by Dell and Ponemon Institute reveals that upto 12000 laptops are stolen in the United States Airport every week. This means one laptop is getting stolen every 50 seconds approximately!! Continue reading “US loses one laptop every 50 seconds in its airport!!”