trunking

Trunking on Check Point SecurePlatform

Trunking on Check Point SecurePlatform. Trunking is a feature that will pass the VLAN database between network devices. Usually this mechanism is used between switches-routers or switches-switces. Maybe ...
asa5550

Configure IP Spoofing and IPS Protection With a Cisco ASA 5500 Firewall

Configure IP Spoofing and IPS Protection With a Cisco ASA 5500 Firewall The Cisco ASA firewall appliance provides great security protection out-of-the box with its default configuration. ...

Knowing Unified Threat Management (UTM)

What You Should Know About Unified Threat Management (UTM) Unified Threat Management eliminates the need for machine to machine protection. It is the combination of multiple security ...

[IT Network] Configuring IP Address and DNS via Windows Command Line

Usually when we want to change the IP address and DNS on P C / Notebook which is using Windows-based operating system, we always go to control panel then go to the network. For those ...

[RedHat Enterprise Linux] How to secure your Redhat Enterprise Linux 5 by User or Host

Besides using a firewall, and SELinux, there are many ways to make our RHEL servers secure from crackers that are trying to break into our RHEL system, one of which is to use tcp_wrapper. ...
Page 1 of 11