Assembling a security policy can be a difficult task without guidance.
The International Organization for Standardization (ISO) published a
security standard called ISO/IEC 27002. This document refers to
information technology related security issues and outlines a code of
practice for IT security management. ISO/IEC 27002 provides a guideline
for developing organizational security standards and security
management practices.
Technology
e-Portfolio for Don McClintock
CNT-2102 Switching & Wireless Fundamentals
Equipment 1 2912 or 2924 Switch (left), 1 2950 or 2960 Switch (right), 1Router with two FastEthernet interfaces and capable of trunking, 1 Cisco/Linksys Wireless Access Point, and 1 laptop with wireless capabilities. If available, and if time permits use a Cisco Wireless Card and its accompanying software.
RESULTS
Click on each link to review configs.
I have just today upgraded the site to version 6 !
This is a very significant upgrade, and some care was needed to avoid issues as I moved forward...
But the benefits are many, and I now look forward to playing with the theming modules (for developers) and so on...
Don
How Gmail destroyed Outlook.
- Google Desktop is now part of the Google Pack. Google Pack is a set of utilities that Google has packaged together into a single download. When you go to download the pack you can select all or just a single application. Even if all you use the pack for is Google Desktop it is a nice way to get it because Google Pack notifies you when there are updates available.
From: http://www.win.tue.nl/hashclash/rogue-ca/#sec71
In a statement made public on December 30th, the following researchers: Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger said:
Ramon Ray: Tech Basics
6 Technology Rules to Thrive
This year, consider implementing these rules that can give your business a boost.
By Ramon Ray
| January 31, 2008
Over the past few weeks, I've been thinking about the following six rules I created that I believe will really help you boost your business. There are plenty of other technology rules to keep in mind, but these six go beyond the traditional guidelines of having a website and making sure your technology is secure.1.Spend money on technology as an investment--not as a cost.
http://pigtail.net/LRP/printsrv/cygwin-sshd.html
See the above URL for this detailed description on how to install/use SSH for these O/Ses.