Features
Features
-
Understanding security risk management: Criticality categories
Security risk management involves a sober assessment of your client's business operations and the relative security risks of each. Once the need for security risk analysis has been recognized by your client, the next step is to establish catageories... Continue Reading
-
Verify the CEF Forwarding Information Base table
Learn how to take a stepwise approach to troubleshooting the Cisco Express Forwarding FIB table, a critical part of any methodology for resolving Cisco IP connectivity issues. Continue Reading
-
Managed services, your business plan and you
Learn why a business plan is an essential part of any reseller's successful managed services business. Discover how to use a business plan as the impetus for refining your marketing strategy, locating sources of revenue and sizing up the competition. Continue Reading
-
Snort.conf output options
Snort offers functional equivalents for FAST, FULL and SYSLOG command line output modes, as shown here. Continue Reading
-
Oracle RAC: Log directory structure in cluster ready services
When diagnosing Oracle 10g problems in cluster ready services do what Oracle support does -- examine installation log files and respective directories. Learn more in this book excerpt from "Oracle Database 10g: Real Application Clusters Handbook." Continue Reading
-
Oracle RAC: Debugging node eviction issues
Oracle RAC's node eviction root cause analysis (RCA) is common and complex. This excerpt from "Oracle Database 10g: Real Applications Clusters Handbook" shows you how to recover from a communication failure in Oracle 10g. Continue Reading
-
Oracle RAC: ON and OFF
Disabling Oracle's RAC options may be necessary when testing the Oracle Database 10g. Steps are outlined in this excerpt from "Oracle Database 10g: Real Application Clusters Handbook." Continue Reading
-
Ethical hacking tools and techniques: Password cracking
In this portion of a tip on network penetration testing and ethical hacking tools and techniques, security consultants and value-added resellers (VARs) will learn about password cracking. Continue Reading
-
Ethical hacking tools and techniques: Information gathering
This portion of a tip on network penetration testing and ethical hacking tools and techniques discusses information gathering for security consultants and value-added resellers (VARs). Continue Reading
-
Partnering with a managed service provider (MSP) vendor
Managed service provider (MSP) partnerships are rarely as fruitful as both sides would like. When choosing an MSP vendor, ask these questions to determine if your partnership will be a good one. Continue Reading
-
Storage area network (SAN) risks
Storage area network (SAN) security risks manifest as easily infiltrated gaps in your customers' storage; learn where weaknesses lie in a SAN architecture as outlined in this book excerpt from "Securing Storage:A Practical Guide to SAN and NAS ... Continue Reading
-
Common SQL Server Integration Services (SSIS) package management scenarios
Whether connecting to SQL Server Integration Services (SSIS), running packages or viewing package summaries, these scenarios will answer basic SSIS package management questions, from the book "Inside Server SQL Tools." Continue Reading
-
Scripting creation of virtual machines in ESX shell
Scripting the creation of virtual machines using VMware power tools is simpler that you might think. This book excerpt tells you how. Continue Reading
-
Creation of virtual machines utilizing command-line tools
Creating virtual machines for your customers is useful for them and lucrative for you. This excerpt outlines VMware ESX Server's creation and cloning tools. Continue Reading
-
Configure USB devices to Linux: task 2.4
Configuring USB devices to a Linux system important because most accessories now interface through computers with them. Learn more here. Continue Reading
-
Set BIOS options for Linux: task 2.1
Setting BIOS options correctly ensures that a computer will boot-up and initialize hardware properly. Get the necessary tools for a smooth Linux installation here. Continue Reading
-
Using MySQL licensing: Open source license vs. commercial license
Get an overview of the MySQL open source licensing options in this excerpt from "The Definitive Guide to MySQL 5". Continue Reading
-
What are the top MySQL features?
Find the most important MySQL properties listed in this book excerpt from "The Definitive Guide to MySQL 5". Continue Reading