Linux is considered a very safe OS. This is mainly because there are more Windows machines than Linux boxes. For hackers it makes more sense to attack a wider population to get better results. As a result Linux has been spared of widespread virus attacks. This does not mean Linux has bullet-proof safety against viruses. The following table lists some linux viruses which necessiates administrators to consider anti-virus measures to be implemented. Continue reading “Is Anti-virus software needed for Linux?”
Banks responsible for hacked customer accounts
A recent ruling by consumer court in Mumbai, India has held the bank responsible if it has not complied with regulations and the account holders money is fraudently transferred. Continue reading “Banks responsible for hacked customer accounts”
Tech Terminology Demystified – UTM
Unified Threat Management (UTM) is a comprehensive solution that has gained widespread currency as a primary network gateway defense solution for organizations.
SOA Security – Part 2 – Basics
In this article, we examine how security applies to Service Oriented Architecture (SOA). Continue reading “SOA Security – Part 2 – Basics”
Technical guide on IT Migration Audit
The Committee on Information Technology of the Institute of Chartered Accountants of India has issued a technical guide on IT Migration Audit. We are pleased to have been involved in this initiative of the Institute. We thank the Institute for acknowledging the contribution of the Qadit team comprising of CA N Venkatakrishnan (Special Invitee of the Committee on Information Technology of the Institute of Chartered Accountants of India), CA Mahesh Balan, CA V Vijayakumar, CA N Swameshwar and CA Suresh Rangarajan in the Preface of the publication.
SOA Security – Part 1 – Intro to SOA
SOA Security Model has been doing rounds in recent past in many forums. This prompted me to write on SOA security aspects through a 3 part article. Through this ‘Part 1’, let me introduce you to SOA. A Service Oriented Architecture (SOA) is a framework for integrating business process and supporting IT infrastructure as secure, standardized components services that can be reused and combined to address changing business priorities.
Tech Terminology Demystified – The CPU
The most general description of the CPU is that it is the brain of the computer. This is what everyone is familiar with. Let’s delve a little deeper.
Understanding RAID
RAID or Redundant Array of Inexpensive Disks is a technology for storing the same data across different disks to ensure data redundancy. RAID also employs data stripping (a process where data is divided into blocks and spread over several disks) which improves performance. A RAID appears to the operating system as a single logical hard disk. Continue reading “Understanding RAID”
XBRL – An introduction
XBRL or eXtensible Business Reporting Language is an XML dialect developed for business reporting purposes. It is increasingly becoming the standard for communication of information between businesses on the internet. Continue reading “XBRL – An introduction”
MPLS Architecture – An Overview
As soon as the word ‘MPLS’ (Multi Layered Protocol Switching) is mentioned the term ‘MPLS VPN’ comes to everybody’s mind. This is soon followed by the thought of corporate offices spread across different cities being connected through an ‘MPLS VPN’. Your subconscious mind has also associated ‘confidentiality of my data probably using encryption’ to this whole concept as it is a VPN and VPNs are supposed to provide confidentiality and integrity of my data. Why else should they say ‘private’ in Virtual Private Networks?
