buzz-networksecurity.blogspot.com
.:: NetWork SecuRity ::.: FIREWALL
http://buzz-networksecurity.blogspot.com/2009/10/firewall.html
Selamat Datang Ke Laman Blog buzz-networksecurity! WELCOME TO MY BLOG. View my complete profile. Wednesday, October 28, 2009. If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have probably heard the term firewall used. For example, you often hear people in companies say things like, "I can't use that site because they won't let it through the firewall." . Subscribe to: Post Comments (Atom). Shall not b...
buzz-networksecurity.blogspot.com
.:: NetWork SecuRity ::.: October 2009
http://buzz-networksecurity.blogspot.com/2009_10_01_archive.html
Selamat Datang Ke Laman Blog buzz-networksecurity! WELCOME TO MY BLOG. View my complete profile. Thursday, October 29, 2009. Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Cracking methods have become much more sophisticated and innovative with wireless. Cracking has also become much easier and more accessible with easy-to-use Windows or Linux-based tools being made available on the web at no charge. 54Mbps in 5Ghz range. Signal week by 3 factor:.
buzz-networksecurity.blogspot.com
.:: NetWork SecuRity ::.: Week 4: Authentication & Access Control
http://buzz-networksecurity.blogspot.com/2009/10/authentication-access-control.html
Selamat Datang Ke Laman Blog buzz-networksecurity! WELCOME TO MY BLOG. View my complete profile. Sunday, October 25, 2009. Week 4: Authentication and Access Control. How basic authentication works. When a particular resource has been protected using basic authentication, Apache sends a 401 Authentication Required header with the response to the request, in order to notify the client that user credentials must be supplied in order for the resource to be returned as requested. Fortunately, the browser take...
buzz-networksecurity.blogspot.com
.:: NetWork SecuRity ::.: Intrusion Detection System
http://buzz-networksecurity.blogspot.com/2009/10/intrusion-detection-system.html
Selamat Datang Ke Laman Blog buzz-networksecurity! WELCOME TO MY BLOG. View my complete profile. Thursday, October 29, 2009. INTRUSION DETECTION SYSTEM (IDS). Types of Intrusion-Detection systems. There are three main types of systems in which IDS can be used : network, applications and hosts. Network intrusion detection system (NIDS). It is an independent platform which identifies intrusions by examining network traffic and monitors multiple hosts. Network I...
buzz-networksecurity.blogspot.com
.:: NetWork SecuRity ::.: July 2009
http://buzz-networksecurity.blogspot.com/2009_07_01_archive.html
Selamat Datang Ke Laman Blog buzz-networksecurity! WELCOME TO MY BLOG. View my complete profile. Tuesday, July 21, 2009. Week 1: Introduction to Information Security. This is our first class. Inside this class, Encik Zaki have explained Introduction to Information Security. Before he keeps on lesson, he gave us quiz 1. The quiz question quite difficult to answer, because it uses crossword.The quizzes more to what we understand about network security. In this modul will be covered 14 lectures. Malicious p...
buzz-networksecurity.blogspot.com
.:: NetWork SecuRity ::.: Week 1: Introduction to Information Security
http://buzz-networksecurity.blogspot.com/2009/07/week-1-introduction-to-information.html
Selamat Datang Ke Laman Blog buzz-networksecurity! WELCOME TO MY BLOG. View my complete profile. Tuesday, July 21, 2009. Week 1: Introduction to Information Security. This is our first class. Inside this class, Encik Zaki have explained Introduction to Information Security. Before he keeps on lesson, he gave us quiz 1. The quiz question quite difficult to answer, because it uses crossword.The quizzes more to what we understand about network security. In this modul will be covered 14 lectures. Malicious p...
buzz-networksecurity.blogspot.com
.:: NetWork SecuRity ::.: SeLaMaT DaTaNg Ke LaMaN bLoG sAyA
http://buzz-networksecurity.blogspot.com/2009/07/selamat-datang.html
Selamat Datang Ke Laman Blog buzz-networksecurity! WELCOME TO MY BLOG. View my complete profile. Wednesday, July 15, 2009. SeLaMaT DaTaNg Ke LaMaN bLoG sAyA. Blog ini dibangunkan supaya kita boleh berkongsi maklumat tentang Network Security dan secara tak langsung kwn2 dpt mempelajarinya . So sy harap kawan2 dpt berkongsi tentang ape yg kwn2 tahu mengenai subjek ini. Subscribe to: Post Comments (Atom). My Friends Blog List. Intrusion Detection System : . BiTS 3413 Network Security.
buzz-networksecurity.blogspot.com
.:: NetWork SecuRity ::.: NETWORK IN SECURITY
http://buzz-networksecurity.blogspot.com/2009/10/network-in-security.html
Selamat Datang Ke Laman Blog buzz-networksecurity! WELCOME TO MY BLOG. View my complete profile. Wednesday, October 28, 2009. The specialist area of network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together. My Friends Blog List.
buzz-networksecurity.blogspot.com
.:: NetWork SecuRity ::.: WIRELESS SECURITY
http://buzz-networksecurity.blogspot.com/2009/10/wireless-security.html
Selamat Datang Ke Laman Blog buzz-networksecurity! WELCOME TO MY BLOG. View my complete profile. Thursday, October 29, 2009. Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Cracking methods have become much more sophisticated and innovative with wireless. Cracking has also become much easier and more accessible with easy-to-use Windows or Linux-based tools being made available on the web at no charge. 54Mbps in 5Ghz range. Signal week by 3 factor:.