An introduction to SOX compliance

Sarbanes Oxley Act also known as SOX was enacted in the year 2002 in the United States in response to various corporate scams. The objective of the enactment has been to protect the shareholders and the general public from accounting errors and fraudulent business practices. The Act is administered by the Securities Exchange Commission and is applicable to public companies.

Continue reading “An introduction to SOX compliance”

ALICE – The Chat Bot

Human intelligence has always been trying to find newer ways of searching. With advancements in technologies such as voice recognition, Natural language processing and Artificial Intelligence, it shouldn’t surprise many if in the future, systems connected with the internet can be configured to respond to the user queries in a casual manner . Continue reading “ALICE – The Chat Bot”

Understanding Demilitarized Zone in Networks

Demilitarized zone or DMZ as it is abbreviated is a firewall configuration for securing internal network of an organization.In any business environment a need arises to permit external access to some part of organization’s network, for example to enable external e-mail to be received and to provide public access to a web site. This introduces the concept of the “demilitarized zone”. Continue reading “Understanding Demilitarized Zone in Networks”

Audit of Solaris BSM – An Overview

Basic Security Module or BSM is the audit tool used by Solaris Operating System. The BSM files are located in the /etc/security directory. To enable the BSM, the administrator has to run the bsmconv script. This script creates a number of files in the /etc/security directory. In this article we shall discuss two important files that are created viz. Audit Control File and Audit User File Continue reading “Audit of Solaris BSM – An Overview”