praveenkommineni.wordpress.com
Security Tool for all our needs | kommineni's Blog
https://praveenkommineni.wordpress.com/2009/05/22/security-tool-for-all-our-needs
In search of solution. Security Tool for all our needs. A tool which promises to solve all the hassles of an organization. Though not much is given about the tool, but i have taken personal interest in exploring it…. The tool not only gives information about the hackers but, also comprises of features such as. CIM Central Intelligence Management. Tools which give a designated administrator information about the e-mails being sent out to any other anonymous person outside the organization. Keeping Server ...
praveenkommineni.wordpress.com
What are the different varieties of virtualization? | kommineni's Blog
https://praveenkommineni.wordpress.com/2009/05/22/what-are-the-different-varieties-of-virtualization
In search of solution. What are the different varieties of virtualization? Server virtualization is about consolidating servers to get more out of existing hardware and avoiding the capital expenditure involved in acquiring new hardware. The very nature of the technology helps increase flexibility, as new servers and additional capacity can be provisioned easily. Can mean any of the three fundamentally different types of technologies:. Which involves packaging an application, such that it operates as a s...
praveenkommineni.wordpress.com
High CPU Utilization on Cat 2900/3500 series switches | kommineni's Blog
https://praveenkommineni.wordpress.com/2009/05/21/high-cpu-utilization-on-cat-29003500-series-switches
In search of solution. High CPU Utilization on Cat 2900/3500 series switches. 2900/3500 switches have two separate hardware subsystems. 1) Switching subsystem : Controls receiving / forwarding of data traffic. 2) Internal CPU engine : implements higher-level protocols to control and monitor switch behavior. CPU Utilization does not reflect: Number of packets being switched and total load on switch. CPU Utilization does reflect the switch CPU processing, which includes. Use #show spanning-tree vlan. For m...
praveenkommineni.wordpress.com
Lessons From Fighting Cybercrime | kommineni's Blog
https://praveenkommineni.wordpress.com/2009/05/22/lessons-from-fighting-cybercrime
In search of solution. Lessons From Fighting Cybercrime. Source:darkreading by Gadi Evron. The history of anti-spam teaches us about half-baked ideas and how people succeeded or failed to implement them. The analogy of evolution, while limited, demonstrates how reactionary solutions can achieve strategic goals before they are made obsolete by countermeasures. How do you herd cats? Thus, by fighting criminals and forcing them to learn, we make our situation worse. I had the honor of being the first to...
yudhakurniawan.wordpress.com
Pembangkit Semangat – Ilmu harus dibagi
https://yudhakurniawan.wordpress.com/2011/07/02/pembangkit-semangat
Mainichi Benkyou Shinakereba Narimasen – Setiap Hari Harus Belajar. July 2, 2011. July 2, 2011. Hal2 spiritual perlu mendapatkan pembimbingan agar bisa tumbuh, berkembang,. Dan terjaga dari bahaya, hingga manusia meraih kesempurnaan hidupnya. Siapa saja yang berusaha menjadi orang beradab dengan menjadikan adab ilahi. Sebagai parameternya, dia pasti akan memperoleh kebahagiaan. Imam Ali(Bihar Al. Anwar, Jilid 92, halaman 214). Ia(Al Quran) ia adalah kalam rahman, penjaga dari setan, dan nilai lebih.
yudhakurniawan.wordpress.com
Daftar Isi…. – Ilmu harus dibagi
https://yudhakurniawan.wordpress.com/daftar-isi
Mainichi Benkyou Shinakereba Narimasen – Setiap Hari Harus Belajar. Catatan Threat Intelligence Researcher. Catatan Netcat (TCP/IP Swiss Army Knife). Catatan Nmap(Network Mapper) 2. Catatan Nmap(Network Mapper) 1. PAM (Pluggable Authentication Modules). Catatan Vi Editor Linux II. Catatan Vi Editor Linux. Redhat Linux v7 System Administration. Computer Hacking Forensic Investigator. ECDisasterRecovery and ECVirtualization Technology. Hadiah Menyambut Bulan Suci Ramadhan. Kawan Yang Baik Menurut Islam (2).
yudhakurniawan.wordpress.com
Doa Jawsyan Kabir – Ilmu harus dibagi
https://yudhakurniawan.wordpress.com/2011/07/31/doa-jawsyan-kabir-2
Mainichi Benkyou Shinakereba Narimasen – Setiap Hari Harus Belajar. July 31, 2011. July 31, 2011. Merupakan doa yang berisi seribu Asma Allah, rincian dari Asmaul Husna. Allah swt berjanji di dalam Al-Qur’an akan mengijabah permohonan hamba-Nya jika berdoa dan bertawassul dengan Asmaul Husna. Allah swt menyuruh kita bertawassul dengan Asmaul Husna:. 8220;Allah memiliki Asmaul Husna, maka hendaknya kalian berdoa dengannya.” (Al-A’raf: 180). Beliau menyebutkan keutamaan doa ini, antara lain:. 3 Jika dibaca...
praveenkommineni.wordpress.com
High CPU Utilization on Cat 3750 series switches | kommineni's Blog
https://praveenkommineni.wordpress.com/2009/05/21/high-cpu-utilization-on-cat-3750-series-switches
In search of solution. High CPU Utilization on Cat 3750 series switches. A) One of the common reasons for high CPU utilization is that the Catalyst 3750 CPU is busy with the processing storm of Internet Group Management Protocol (IGMP) leave messages(cisco Bug). B) Due to GRE Tunnel (not supported by 3750 switch, even though CLI shows this. No work around, hardware limitation). C) Configuration change ( no problem with this). E) IP SNMP process. Switch#show platform tcam utilization. Jump to comment form.
SOCIAL ENGAGEMENT