Network technologies and trends:


July 5, 2008  6:35 AM

Sample I.T Security Policy – Data Security

Posted by: Yasir Irfan
Backup, Data Security, DataCenter, Exchange, Linux, Microsoft Windows, Network Documentation Policy, Network Policies, Networking, Routers, Security, Switches

As we are proceeding ahead, and we have two more topics to be covered to complete this Sample I.T Security Policy, hope fully it will be good and useful to you all. I would like to have some comments which may boost my morale to take up more interesting things in future. Here we are with Data...

June 21, 2008  5:42 AM

What is SSH ? and how it can be configured in a Cisco Switch.

Posted by: Yasir Irfan
Cisco, Network Documentation Policy, Networking, Security, SSH, Switches

Secure Shell (SSH) - TCP Port 22 SSH stands for "Secure Shell". SSH commonly uses port 22 to connect your computer to another computer on the Internet. It is most often used by network administrators as a remote login / remote control way to manage their business servers. Examples would be:...

June 18, 2008  1:28 PM

Introduction to Free ware Bandwidth Monitoring software’s – Series 1

Posted by: Yasir Irfan
Bandwidth monitoring, Cacti, Networking

Cacti is one of the great free ware bandwidth monitoring software works with SNMP. It’s RRD based tool, which makes use of MySQL server as a database, and completely driven by PHP. What is Cacti? Cacti is a resource monitoring software which used RRDtool to store data &...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: