Vulnerability management has evolved from simply running a scanner on an application, computer, or network to detect common weaknesses. Scanning is an essential element of vulnerability management, but VM includes other technologies and workflow that contribute to a bigger picture required for controlling and removing vulnerabilities. The primary objectives of VM are to:
25 July 2011
Detecting and Removing Vulnerabilities
Where do vulnerabilities come from?
Programming mistakes cause most vulnerabilities in software. A common mistake is failing to check the size of data buffers – a kind of storage bin of memory where a computer process executes its functions. When a buffer overflows, it overwrites data in adjacent memory buffers. This corrupts the stack or heap areas of memory, which may allow the execution of an attacker’s code on that machine via a virus, worm, or other unpleasant exploit.
Labels:
Buffer Overflow,
Computer,
Exploit,
General Public License,
Network,
Online,
Programming,
Software,
Virus,
Vulnerabilities,
Worm
Linux and the GPL
Linux is distributed under the GNU General Public License (GPL), which, in essence, says that anyone may copy, distribute, and even sell the program, so long as changes to the source are reintroduced back to the community and the terms of the license remain unaltered. Free means that you are free to take Linux, modify it, and create your own version. Free means that you are not at the mercy of a single vendor who forces you into a kind of corporate servitude by making sure that it is extremely costly to convert to another environment. If you are unhappy with your Linux vendor or the support you are getting, you can move to the next vendor without forfeiting your investment in Linux.
Content Management System
When the World Wide Web was born, creating even the simplest web page required learning the language of the Web: HTML. Since then, great strides in the power of web authoring software have been made with the availability of professional web editors such as Adobe Dreamweaver and Microsoft FrontPage. These types of editors have made the creation and maintenance of a web site much easier by providing a graphical user interface for web construction and minimizing the amount of HTML coding required by the webmaster.
Labels:
CMS,
content,
content management system,
erp,
HTML,
Joomla,
Programming,
Web,
World Wide Web
24 July 2011
Is Linux Really FREE?
In any discussion of what free means in relation to software, you'll often see the expressions "free as in speech" or "free as in beer." In this case, free isn't a question of cost, although you can get a free copy (as in free beer) of Linux and install it on your system without breaking any laws. As Robert A. Heinlein would have said, "There ain't no such thing as a free lunch." A free download will still cost you connection time on the Internet, disk space, time to burn the CDs, and so on. In the case of Ubuntu Linux, you can have a free CD mailed
23 July 2011
VoIP Hardware for experienced Users
Once you are experienced in using softphone, you may start wondering whether there is an easier way to communicate through VoIP, as using softphone via a computer is not practical—you need to turn on your computer each time you want to communicate through VoIP or keep your computer running for a long duration just to receive incoming call. This may not be prudent at all, since the purpose of using VoIP is to minimize your cost. Besides wasting electrical energy, the computer in which the softphone is running could crash.
PC to PC Internet Telephone Call
This part will explain the simplest VoIP call technique using a computer to call another computer or VoIP network. All you need is a computer with a sound card, headset, microphone and internet connectivity. How much these equipments will cost depend on the specification you use. But sinceVoIP for personal use does not require sophisticated equipment, these equipments will not cost much. Of these requirements, bandwidth is perhaps the most important, as it determines how good the voice quality of your VoIP communication.
Labels:
Access,
Bandwidth,
Computer,
Internet,
Network,
network protocol,
Server,
SIP Provider,
Telephone,
VoIP
What Is Internet Telephony ?
In a simple definition, Voice over Internet Protocol (VoIP) or internet telephony is a telephone network over the internet (TCP/IP) network. Thus, you could use VoIP anywhere as long as you are connected to the internet.
There are two main internet telephony technology, i.e., H.323 and Session Initiation Protocol (SIP) that are frequently used. The former is an older standard developed by the International Telecommunication Union
There are two main internet telephony technology, i.e., H.323 and Session Initiation Protocol (SIP) that are frequently used. The former is an older standard developed by the International Telecommunication Union
Labels:
Access,
Bandwidth,
Gateway,
Internet,
IP address,
IP Phone,
Network,
network protocol,
Online,
protocols,
Server,
SIP Provider,
Telephone,
VoIP
How VoIP Works for Dummies ??
The heart of VoIP network is the softswitch. It stores all information on the subscribers. In a simple view, a VoIP softswitch basically has a table mapping the phone number of the subscriber and the computer or IP address of the subscriber.
Everytime, a subscriber wants to make a call to another subscriber. The client equipment will ask the softswitch the destination address of the other subscriber. The destination address can be an IP address. Thus, the
Everytime, a subscriber wants to make a call to another subscriber. The client equipment will ask the softswitch the destination address of the other subscriber. The destination address can be an IP address. Thus, the