Using Quantitative Risk Assessment


One of the most difficult questions that has to be answered in implementing anything new in an IT infrastructure is what is the risk.  It doesn’t matter if it’s a few lines of code, a new server or a complete new department – there is a risk and assessing this is crucial to any implementation….

Read More

SNMP – the Management Protocol


SNMP (Simple Network Management Protocol) is very easy, yet powerful however once demystified it is far more accessible. SNMP was originally created back in 1988. The truth is that originally it was simply considered to be a fundamental method by which you can ascertain the use of bandwidth in addition to network data. Notwithstanding its name,…

Read More

Why You Should Use a VPN


There is one piece of software that almost every single global company installs on their laptops and mobile devices, it’s the VPN client software.   A Virtual Private Network is effectively an encrypted tunnel which operates between the client and a VPN server.   The reason that they are considered essential in the corporate world…

Read More

Using TCPdump on your Network


Tcpdump gives a review of the form of protocol related at a certain time to ping peaks, it works with most popular network cards(in regard to usage and options). At length, tcpdump prints some information concerning the packet and it’s content. TCPdump even displays the sequence numbers of the packets which is essential for being able…

Read More

Syn Flood – Simple DDoS Attacks


In case you are likely to protect against an attack, you first must understand how it works. It’s quite straightforward to detect SYN attacks. Since many logic attacks are strategic, it is feasible for an attacker to randomly select a server with software to find exploits on the net. The important thing to keep in…

Read More

Session Control Protocols – SCP


This degree of performance is accomplished by modifying the conventional TCP flow control systems in quite a few ways. It remains to be viewed whether the utility supplied by this protocol will wind up widely deployed within the online environment, or whether it is going to function as a catalyst for more growth of transport…

Read More

Protocol Verification Techniques


Any generic tunneling which happens at the circuit level such as SOCKS and SSL will allow any protocol to pass through proxies and VPN server gateways.   The implication is though that the proxy server itself does not either understand the protocol or how it actually works.  One important example is the SSL tunneling protocol,…

Read More

HTTP Requests and XML


The XMLHttpRequest object is employed to exchange data using a server. That’s the fundamental structure of HTTP. In case there’s an issue with the request, a HTTP error is going to be displayed within the browser. The remainder of this document tells the best way to upgrade your buyers and servers to utilize HTTP 1.1….

Read More

SGML and Multimedia Development


SGML can execute vast complicated troubles but simple identification of structure requires an excessive amount of effort which could be avoided by using XML. Unlike HTML, XML does not have any fixed tags. The subsequent document has got the advantage it can be validated by means of a SGML parser. Otherwise, SGML is frequently converted…

Read More

ISGMLUG Newsletter


SGML and XML are both languages that are used for defining markup languages. More specifically, they are metalanguage formalisms that facilitate the definition of descriptive markup languages for the purpose of electronic information encoding and interchange. SGML and XML support the definition of markup languages that are hardware- and software-independent, as well as application-processing neutral….

Read More

← OLDER POSTS NEWER POSTS →