Is Anti-virus software needed for Linux?

Linux is considered a very safe OS. This is mainly because there are more Windows machines than Linux boxes. For hackers it makes more sense to attack a wider population to get better results. As a result Linux has been spared of widespread virus attacks. This does not mean Linux has bullet-proof safety against viruses. The following table lists some linux viruses which necessiates administrators to consider anti-virus measures to be implemented. Continue reading “Is Anti-virus software needed for Linux?”

Technical guide on IT Migration Audit

The Committee on Information Technology of the Institute of Chartered Accountants of India has issued a technical guide on IT Migration Audit. We are pleased to have been involved in this initiative of the Institute.  We thank the Institute for acknowledging the contribution of the Qadit team comprising of CA N Venkatakrishnan (Special Invitee of the Committee on Information Technology of the Institute of Chartered Accountants of India), CA Mahesh Balan, CA V Vijayakumar, CA N Swameshwar and CA Suresh Rangarajan in the Preface of the publication.

 

Continue reading “Technical guide on IT Migration Audit”

SOA Security – Part 1 – Intro to SOA

SOA Security Model has been doing rounds in recent past in many forums. This prompted me to write on SOA security aspects through a 3 part article. Through this ‘Part 1’, let me introduce you to SOA. A Service Oriented Architecture (SOA) is a framework for integrating business process and supporting IT infrastructure as secure, standardized components services that can be reused and combined to address changing business priorities.

 

Continue reading “SOA Security – Part 1 – Intro to SOA”

Understanding RAID

RAID or Redundant Array of Inexpensive Disks is a technology for storing the same data across different disks to ensure data redundancy. RAID also employs data stripping (a process where data is divided into blocks and spread over several disks) which improves performance. A RAID appears to the operating system as a single logical hard disk. Continue reading “Understanding RAID”

MPLS Architecture – An Overview

As soon as the word ‘MPLS’ (Multi Layered Protocol Switching) is mentioned the term ‘MPLS VPN’ comes to everybody’s mind. This is soon followed by the thought of corporate offices spread across different cities being connected through an ‘MPLS VPN’. Your subconscious mind has also associated ‘confidentiality of my data probably using encryption’ to this whole concept as it is a VPN and VPNs are supposed to provide confidentiality and integrity of my data. Why else should they say ‘private’ in Virtual Private Networks?

 

Continue reading “MPLS Architecture – An Overview”