Recent Posts

Become an Internet Web Browsing Anonymous – Anonymity in Web Surfing.
Posted in Network Security

Become an Internet Web Browsing Anonymous – Anonymity in Web Surfing.

What is Internet web surfing Anonymous? Anonymous mean is unspecified. Anonymous web browsing gives you privacy on the Internet. An anonymity network allows users to…

Continue Reading...
Cloud connecting with Cisco Cloud Services Router (CSR) 1000v - (MS-Azure & Amazon AWS)
Posted in Cloud Network Network Security NETWORK SECURITY Technology

Cloud connecting | Cisco Cloud Services Router (CSR) 1000v – (MS-Azure & Amazon AWS)

Cisco Cloud Services Router CSR 1000v As you may or may not be aware the Cisco Cloud Services Router (CSR) 1000v is now available on…

Continue Reading...
Posted in Interview Network Security Uncategorized

Internet Cyber Threat and Malicious Internet Functioning.

Internet Cyber Threat and Malicious Internet Functioning – DDoS ATTACKS , Ransomware , Virus , Malware and Malicious Activity. Internet is full of story on Malicious…

Continue Reading...
Posted in Interview Uncategorized

AWS Interview Questions and Answers for Certified Solutions Architect – Associate Job

AWS Interview Questions and Answers – EC2 , VPC , S3 and Network and Security. Describe, What is EC2 instance ? An EC2 instance is…

Continue Reading...
Posted in F5 LBR BIG-IP

F5 Big IP LTM Setup of Virtual Interface Profile and Pool

F5 Big-IP LTM Setup of Virtual Server , Pool and SNATs Configuration Overview.   Image Source – www.techmusa.com – virtual server with IP 200.100.0.1/32 that will…

Continue Reading...
Posted in Cisco IPsec site to site vpn Network Security

SITE TO SITE IPSEC VPN PHASE-1 AND PHASE-2 TROUBLESHOOTING STEPS

SITE TO SITE IPSEC VPN PHASE-1 AND PHASE-2 TROUBLESHOOTING STEPS , NEGOTIATIONS STATES AND MESSAGES MM_WAIT_MSG   (Image Source – www.Techmusa.com)   Network Troubleshooting is…

Continue Reading...
Posted in NETWORK SECURITY Technology

PENETRATION TESTING – SECURITY VULNERABILITY ASSESSMENT OVERVIEW

Penetration Assessment A penetration test (pen testing) is an initiative to determine and evaluate the network and system security assessment of an IT infrastructure.Such network assessment test…

Continue Reading...
Posted in Linux Technology

CONFIGURATION BACKUP PROCEDURE FOR QLOGIC SANBOX 5802 FC SWITCH

STEPS TO CREATE AND DOWNLOAD CONFIGURATION FILE BACKING UP ON QLOGIC SANBOX 5802 FC SWITCH   Creating the Backup File on Qlogic SANbox switch Step…

Continue Reading...