25 July 2011

Detecting and Removing Vulnerabilities

Vulnerability management has evolved from simply running a scanner on an application, computer, or network to detect common weaknesses. Scanning is an essential element of vulnerability management, but VM includes other technologies and workflow that contribute to a bigger picture required for controlling and removing vulnerabilities. The primary objectives of VM are to:

Where do vulnerabilities come from?

Programming mistakes cause most vulnerabilities in software. A common mistake is failing to check the size of data buffers – a kind of storage bin of memory where a computer process executes its functions. When a buffer overflows, it overwrites data in adjacent memory buffers. This corrupts the stack or heap areas of memory, which may allow the execution of an attacker’s code on that machine via a virus, worm, or other unpleasant exploit.

Linux and the GPL

Linux is distributed under the GNU General Public License (GPL), which, in essence, says that anyone may copy, distribute, and even sell the program, so long as changes to the source are reintroduced back to the community and the terms of the license remain unaltered. Free means that you are free to take Linux, modify it, and create your own version. Free means that you are not at the mercy of a single vendor who forces you into a kind of corporate servitude by making sure that it is extremely costly to convert to another environment. If you are unhappy with your Linux vendor or the support you are getting, you can move to the next vendor without forfeiting your investment in Linux.

Content Management System

When the World Wide Web was born, creating even the simplest web page required learning the language of the Web: HTML. Since then, great strides in the power of web authoring software have been made with the availability of professional web editors such as Adobe Dreamweaver and Microsoft FrontPage. These types of editors have made the creation and maintenance of a web site much easier by providing a graphical user interface for web construction and minimizing the amount of HTML coding required by the webmaster.

24 July 2011

Is Linux Really FREE?

In any discussion of what free means in relation to software, you'll often see the expressions "free as in speech" or "free as in beer." In this case, free isn't a question of cost, although you can get a free copy (as in free beer) of Linux and install it on your system without breaking any laws. As Robert A. Heinlein would have said, "There ain't no such thing as a free lunch." A free download will still cost you connection time on the Internet, disk space, time to burn the CDs, and so on. In the case of Ubuntu Linux, you can have a free CD mailed

23 July 2011

VoIP Hardware for experienced Users

Once you are experienced in using softphone, you may start wondering whether there is an easier way to communicate through VoIP, as using softphone via a computer is not practical—you need to turn on your computer each time you want to communicate through VoIP or keep your computer running for a long duration just to receive incoming call. This may not be prudent at all, since the purpose of using VoIP is to minimize your cost. Besides wasting electrical energy, the computer in which the softphone is running could crash.

PC to PC Internet Telephone Call

This part will explain the simplest VoIP call technique using a computer to call another computer or VoIP network. All you need is a computer with a sound card, headset, microphone and internet connectivity. How much these equipments will cost depend on the specification you use. But sinceVoIP for personal use does not require sophisticated equipment, these equipments will not cost much. Of these requirements, bandwidth is perhaps the most important, as it determines how good the voice quality of your VoIP communication.

What Is Internet Telephony ?

In a simple definition, Voice over Internet Protocol (VoIP) or internet telephony is a telephone network over the internet (TCP/IP) network. Thus, you could use VoIP anywhere as long as you are connected to the internet.

There are two main internet telephony technology, i.e., H.323 and Session Initiation Protocol (SIP) that are frequently used. The former is an older standard developed by the International Telecommunication Union

How VoIP Works for Dummies ??

The heart of VoIP network is the softswitch. It stores all information on the subscribers. In a simple view, a VoIP softswitch basically has a table mapping the phone number of the subscriber and the computer or IP address of the subscriber.

Everytime, a subscriber wants to make a call to another subscriber. The client equipment will ask the softswitch the destination address of the other subscriber. The destination address can be an IP address. Thus, the