Category Archives: CTO – Technical’s

“D” for Demonetization!

Demonetization! Breaking the grip of Corruption, Terrorism & Black Money.. really? Demonetization! Demonetization!! Demonetization!!! All news channels flooded up since 2nd week of November 2016! What is this Demonetization?? The recent announcement of 500 & 1000 rupees currency notes demonetization put everyone in our country in the life-size test due to the brutal suppression of… Read More »

How IoT is changing our World?

The Internet of Things has changed the dimensions of traditional Business IT. To tap the potential need for a highly scalable and reliable IT Infrastructure, they should be on standardized components and open protocols and include the three layer Devices, Controllers and Data Center or the Cloud solutions. The Internet of Things connected all of… Read More »

Port Security

You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the workstations that are allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If… Read More »

Steps to Secure VPS

Following are the steps to Secure VPS Hosting: Firewall Installation Installing firewall and various other related tools such as CSF, sim. These will prevent unauthorized access to your server and from brute force attacks. CSF (ConfigServer Firewall) http://www.configserver.com/free/csf/install.txt SIM (System Integrity Monitor) http://www.rfxnetworks.com/sim.php NSIV (Network Socket Inode Validation) http://www.rfxnetworks.com/nsiv.php LES (Linux Environment Security) http://www.rfxnetworks.com/les.php these… Read More »