10 Hot Information Technology Security Certifications for 2017

10 Hot Information Technology Security Certifications for 2017

Data breaches are growing in number, size and criticality, the IT security gap is widening, a recent survey of IT decision makers shows most firms are aware and worried about vacant IT security posts and feel vulnerable to attack.
All of these signs are indicative that IT security skills are in remarkably high demand and are a good place to start for anyone looking to begin or advance a successful IT career path. Whether you’re seeking to land an exciting – and well-…

Read More
Share This.

How to Use Python to Ping all IP Addresses on a network

How to Use Python to Ping all IP Addresses on a network

One very important command line tool used in a computer network is the ping command. The ping tool is a software utility that enables system administrators to test the availability of computers on the network.
On windows and linux systems, simply run at the terminal, a ping x.x.x.x (where x.x.x.x is the ip address). For example to determine if a computer with the ip address of 192.168.100.50 is on the network, simply run ping 192.168.100.50 at the cmd terminal. The result will be as shown.

ON WINDOWS

Read More
Share This.

9 Computer Security Realities That You should Know

Every day, you hear about security flaws, viruses, and evil hacker gangs that could leave you destitute — or, worse, bring your country to its knees. But what’s the truth about these digital dangers? We asked computer security experts to separate the traditions from the facts. Below are the response gotten.

9 Computer security realities that you should know about

1. Having a strong password actually can prevent most attacks

The biggest problem is that the media focuses on stories about the deepest and most complicated hacks, leaving users feeling like there’s nothing they can do to defend themselves. But that’s just not true.

Users can protect themselves against the most likely and pernicious threat actors by taking two simple steps:

a) Installing a password manager and using it to create unique passwords for every service they use.

b) Activating second-factor authentication options (usually via text messages) on their email and social networking accounts.

Read More
Share This.

How To Install and Configure Vyos Router-Basic Settings

how to install and configure vyos router

Vyos is an open source network operating system that is based on debian, GNU/Linux. It uses a command line system as its sole configuration system. It can be installed on physical and virtual environments and in the cloud. Vyos compares directly with high end commercial hardware available routers. Because it can run on the x86 systems, it can be used as a router and firewall for cloud deployments. It can be deployed in a small office home office environment, and as an isp edge router in a

Read More
Share This.

HOW TO INSTALL AND CONFIGURE DHCP ON UBUNTU SERVER 16.04

Read More
HOW TO INSTALL AND CONFIGURE DHCP ON UBUNTU SERVER 16.04

DHCP stands for dynamic host configuration protocol and it is a network protocol that makes a server able to assign internet protocol(ip) addresses automatically to computers, printers, phones on the network from a predefined set of ip ranges.

BENEFITS OF DHCP

1. Automatic configuration and dishing of ip addresses to client comuputers from a central location, thereby reducing network administration.

2. DHCP eliminates errors in ip address configuration. If ip addresses are administered manually, there is a huge chance of errors occuring due to typos and ip address conflicts.

Remember that every device on a network requires a unique ip address (set of protocols) to be able to communicate effectively and access network resources. DHCP makes this process easy by automation the offering of ip addresses to equipments on the network.

Read More
Share This.