Posts

Showing posts from June, 2020

How to Make Monitoring Your Network

There are three major reasons for network monitoring: security threats, performance, and maintenance. The number and types of malware and network attacks continues to increase, and there’s no reason to think it will ever stop. Users expect high performance from applications and have little tolerance of network bottlenecks. Monitoring also provides status about the health of network devices, allowing preventative or just-in-time maintenance that minimizes impact. Make Monitoring Easier You can make monitoring easier and minimize the number of tools you need to use by: 1.Understanding your current network architecture. It’s impossible to monitor effectively if you don’t understand your network design. You should have inventory lists and network diagrams for both physical and virtual links. 2.Understanding your reasons for monitoring. Everything can be monitored, but everything doesn’t need to be monitored. You may want to focus on collecting data about the health and performance of the

What is Domain Security Management

The first domain I’d like to discuss has more to do with people and processes than it does with computers. Security management is one of the most overlooked domains, which I think is a shame because almost nothing we do in the other domains means anything without it. Security management is made up of several tasks: Risk assessments, which is the process we use to identify risks to the organization and systemically identify methods to combat those risks, usually relying on input from experts in the below domains Overseeing the processes for other security functions to ensure those align with business/operations processes Change management processes and procedures in place User security awareness training find more :  lm security

digital transformation on networks

Digital transformation has increased the importance of the network, particularly the edge, where customers, employees, cloud applications and IoT devices connect to the enterprise. The legacy static and non-differentiated network edge of years past is no longer sufficient for many reasons, so as companies embark on digital-transformation plans, their networks must evolve. Networking pros should be looking at, among other things, improving security and embracing software-defined networking (SDN) that supports propagating changes quickly across the network in order to accommodate the many challenges digital transformation creates. The internet of things (IoT) has moved out of the operational-technology shadows and has become a core component of most businesses’ digital-transformation strategies. As IoT adoption increases, so will the number of connected endpoints. Almost all of these devices connect at the network edge, so problems at the edge could significantly impair IoT applicat

What are the Components of a LAN Network

The components used to establish a local area network (LAN) have a variety of functions. The common unifying theme among them is that they facilitate communication between two or more computers. LAN components are configurable in a variety of ways, but a LAN always requires the same basic components. Network Cards At the most basic level, a network card is a component that allows the computer to communicate across a network. This component is frequently built into the motherboard of today's computers, but it can also be a separate card for use in a PCI slot, or part of an external unit that connects to the computer via a USB port. Network cards are further categorized according to whether they operate on wired or wireless networks. However, some cards do support both wireless and wired networking. Network Cables Network cables are the physical lines used to carry information between computers in a wired LAN. The cables are labeled by their category and are commonly referred to as

What are the steps of Invert Colors on Microsoft Office Picture Manager

Microsoft Office Picture Manager manages and edits digital pictures. This program includes "Hue and saturation" settings that allow you to adjust the color on a scale. Click and drag the slider on the "Amount" or "Hue" scale for a custom look. Saving this edited file as a separate copy from the original keeps the original file intact for reference. Step 1 Open the saved picture file in "Microsoft Office Picture Manager." Step 2 Click on "Edit Pictures" on the Formatting toolbar. Step 3 Click on "Color" in the "Edit Pictures" pane to the right of the picture. This pane includes "Hue and saturation settings." Step 4 Click on the "Hue and saturation settings," such as "Amount" or "Hue." Click on the slider to achieve the desired effect. You can also enter a value in the settings text box. Step 5 Save this file as a copy with a file name different from the original file. Click on

How Cracking Windows 2000 And XP Passwords With Only Physical Access

This article will cover how to crack Windows 2000/XP passwords with only physical access to the target box. I won't be covering into the internal structure of LM and NTLM hashes or what makes them so insecure, there are many other articles on the Internet that cover the basics of NT security so I would recommend that you Google for them. I will assume that the reader already knows the basics. There are a lot of articles floating around that tell interested parties how to use programs like PWdump to get NT password hashes. Using PWDump is what most folks recommend when Syskey is enabled on a system since the hashes in the SAM file are encrypted. The problem is PWdump only works if you can run it from an administrator level account, and if the reason an attacker is cracking the hashes in the first place is to get an administrator account then PWdump is of little use.           Another question I get is why crack the password at all since one can get access to the machine by just del