Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
application , networking

Quality of Service (QOS) Considerations

March 25, 2011

Performance – ability to deliver results (throughput or bandwidth) within the least response time (latency). Scalability – ability to cater to greater demands imposed upon the system (e.g.: support increased number of users, products) without affecting any of the other QoS parameters. Reliability – ability to function with the...

Img
application , compliances , networking , security , web-services

OWASP TOP 10

March 22, 2011

Issues and suggested remediation: ISSUE Explanation 6.5.1: Cross Site Scripting (XSS) Testing of parameters before inclusion. 6.5.2: Injection Flaws Testing of input to verify user data cannot modify meaning of commands and queries. 6.5.3: Malicious File Execution Validate input to verify application does not accept filenames or files from...

Img
application , visio-stencils , web-services

Sample Visio – Web / Server Architecture Visio drawings

March 22, 2011

Sample Visio Document download, Web / Server Architecture drawings: Sample Shared Web Tiers.vsd Sample Server Architecture.vsd  www.bestitdocuments.com

Img
application

DataFort E-Series appliance uses the following network ports and protocols

March 14, 2011

Port ID Port Protocol Appliance Interface Communication Interface Communicate over VIP Programmable Port ID 21 TCP FTP For data access over FTP Management Client Yes No 22 TCP SSH Secure Shell Management Client No No   53 UDP DNS DNS network client Management client Storage Yes No 69 UDP...

Img
application , web-services

Key Test Planning Concepts an Considerations

March 13, 2011

  Test Planning Area Key planning concepts to consider Testing Overview     Purpose and scope of the plan  Provide a brief statement of what systems and test phases (e.g., integration, system, alpha, beta) are addressed in the test plan. Reference the requirements which will be verified by this testing. ...

Img
application

Evaluating a Vendor product

March 10, 2011

1) Provide a high level overview of what the product is marketed to do. 2) Now, provide the details of what “you” (the buyer) are expecting it to do. 3) Find someplace where the product can be installed and tested. Before you begin, document what your expectations of how...

Img
application

RSA 7.x – Port Usage

March 8, 2011

  RSA 7.x – Port Usage Port Protocol Description 1161  UDP  SNMP agent – Used to communicate with a Network Management Server using the Simple Network Management Protocol.  1162  UDP  SNMP agent -Used to communicate with a Network Management Server using the Simple Network Management Protocol.  1645  UDP  RADIUS...

Img
application , sample-it-spreadsheets

Sample Excel – SQL Patch sets – Serious – Critical – Urgent listings

March 2, 2011

Free Spread Sheet Document download: SQL Patch sets – Serious – Critical – Urgent Details.xls https://www.bestitdocuments.com/Samples

Img
application

Sample Web Monitor Content Considerations

February 18, 2011

Web Monitor HTTP_Servers This rule logs URLs and hosts in the URL Log. This rule, like LogUnmatched, does not match connections. It is used for data collection only, not for blocking or allowing. When adding this rule, some options in the Rule Properties window are unavailable. It is recommended...

Img
application , compliances , networking , security , web-services

Sample Web Content Filtering Catagories

February 14, 2011

Filtering – Catagories Advertisement This category is a list of servers used for ad banners and other forms of advertising. Examples: Accept, DoubleClick, Just Web Ads. Arts & Entertainment This category contains media sites that promote and provide information about television, movies, music, and video, broadcasting firms and technologies,...

Img
application

Default Oracle Ports

February 10, 2011

 Default Oracle TCP / UDP Ports usage Description Port Application Actions Oracle HTTP Server listen port / Oracle HTTP Server port  80 Oracle Application Server  Edit httpd.conf and restart OHS Oracle Internet Directory(non-SSL) 389 Oracle Application Server   Oracle HTTP Server SSL port 443 Oracle Application Server Edit httpd.conf...

Img
application

MS Word 2003 How to turn OFF Delete Block dialogue in Microsoft Word

February 9, 2011

MS Word 2003 How to turn OFF Delete Block dialogue in Microsoft Word MS word 2003 To turn OFF “Delete Block?”  (no / yes) Tool / Options / General Uncheck 2 boxes pertaining to “Word Perfect help and Navigation” Outlook Repair. Then, please type the following at “Start” “run”:...

Img
application

Oracle 8 -9 Vulnerabilities Patches

February 6, 2011

Priority Oracle 8 -9 Vulnerabilities Patches Security Alert Number And Description   MetaLink Note ID   Latest Version/Date Alert 68, Oracle Security Update 281188.1 Rev 4, 2 March 2005 Alert 67, Unauthorized Access Vulnerabilities in Oracle E-Business Suite 274356.1 Rev 1, 3 June 2004 Alert 66, Security Vulnerabilities in Oracle Application...

Img
application

Web Server Security – Suggestions

January 7, 2011

Common Web Vulnerabilities Buffer Overflow Attacks Denial of Service Attacks on vulnerable scripts URL Manipulation Sniffing / Spoofing Credentials Client Parameter Manipulation Brute Force Attacks Web Server Fingerprinting Web Defacements Take web servers seriously, server security is essential for web security, recommendations: Harden servers from attack • Use a...

Img
application , compliances , networking , security , web-services

Web Server Security Guidelines

January 2, 2011

A web server is a program, which listens for http requests on a TCP/IP port (normally either port 80 or port 443) and serves html pages in response. There are several web servers currently in the market. The most popular are: Apache SunONE Internet Information Server (IIS 6/7/8) NCSA...

Img
application

System and Application Unit Testing

December 20, 2010

Testing must be an on-going activity throughout all phases of a project and should be an integral component of quality assurance efforts. A complete testing strategy cannot be developed until after vendor selection, so this section contains suggestions for possible activities that could be included in a testing strategy,...

Img
application

SDLC – Application System Definition Model

December 14, 2010

Audience: Application & System Services Communication & Collaboration Service: Database Administration Desktop Computer Services Disaster Recovery & Business Continuity Services Facilities A formal model of a complete system All information pertinent to deployment and operations Machine-readable, capturing intent of developers and administrators System topology Developer constraints IT policy Installation...

Img
application

Testing Approach and Strategy

December 13, 2010

Testing Approach and strategy helps you prepare the list of testing requirements and the testing strategy for supporting the new corporate procurement and application module. Included are descriptions of the target audience, delivery method, and objectives. In addition, the testing approach and strategy identify: The high level objectives and...

Img
application

Sample SDLC Development Project Deliverables

December 12, 2010

Deliverables and Combined Processes Discovery Project Roadmap Planning Customer & Stakeholder requirements prioritization & signoff Internal Services Catalog Project Risks Identified UI Models List of Alternative Solutions Selection of Best Solutions for further research Hardware Solutions Demos Financial Approval Potential Solutions Modeled in Test Lab  Initial Security Requirements Definition...

Img
application

Basic Oracle Hardening

December 11, 2010

Disable install and demo accounts: Disallow default user/password PUBLIC has execute System privilege PUBLIC has execute Object privilege PUBLIC has execute UTL_FILE privilege PUBLIC has execute UTL_SMTP privilege PUBLIC has execute UTL_HTTP privilege PUBLIC has execute UTL_TCP privilege PUBLIC has execute DBMS_RANDOM Password complexity Restrict number of failed login...

Img
application

Datacenter – Application Lifecycle Considerations

December 10, 2010

Service Monitoring • Availability• Logging• Auditing• Performance Metrics• Debugging & Tracing• Synthetic Transactions Exception Management • Error Trapping• Root Cause Analysis• Notification Services Version Management • Data Contracts• Message & Operation Contracts• Endpoints (Addresses)• Policies• Internal Dependencies• Claims• Service Retirement• Dependency Analysis Service Delivery • Methodology• Standardized Service Delivery...

Img
application , web-services

Apache Webserver Diagnostics

December 7, 2010

Couple Options / utilities can help with debugging transient problems: o Curl o Dtrace Check the error_log when Apache misbehaves $ kill -SIGSEGV `pgrep httpd | tail -1` $ tail -100 error_log Curl · Versatile command line utility that can be used to debug web-based problems · Curl contains several advanced...

Img
application

Guiding Principles for Software Security

June 29, 2010

Behind every attack & security problem is – bad software A major concern is that security professionals are often un-aware the problem is – bad software Encrypt your data lines? The riskiest category of software today is Internet-enabled apps “Using encryption on the Internet is the equivalent of arranging...

Img
application

Principles of Software Security

June 29, 2010

Secure the weakest link Low-hanging fruit is picked first, I.e. Attack end points, not encrypted links Risk analysis ID’s the weakest link Apportion resources according to risk Practice defense in depth One layer is never enough Overlapping & redundant    Fail securely Failure is unavoidable Allow least privilege Only...

Img
application

eGIS Technical Needs

May 25, 2010

High speed access into Data Center (Large Spatial Data Loads) Administrative privileges over eGIS database schema’s Security Requirements for  tGIS (external to Collaboration site) Database user  privilege and security requirements Requirements for eGIS data in other systems Data Change Management  process and procedures https://www.bestitdocuments.com/Samples

Img
application

eGIS Imagery Hosting Considerations

May 17, 2010

Goal to have all imagery served to all A -B Corporate users from a single location Evaluation Outsource to Spatial Energy Host Internal via ESRI Image Server www.bestitdocuments.com

Img
application

Sample eGIS Collaboration

May 16, 2010

Single storage location for all eGIS data Access for Corporate Users Web Based Mapping Access to all Geo-spatial Data Compliant with Corporate Security Policy Subscription Service to Download Geo-spatial Data Map based access to Documents in Document Management System Map based access to Permits including geographic coverage Collaboration Geo-spatial...

Img
application

Sample Application Hosting Services

April 24, 2010

  Server Administration Application Support Infrastructure Support Upgrades DB Overlays, Cloning, creation and data population         Database Maintenance         Patch Management         Middleware Optimization and Mnagement         Databased Backup Administration         Database Security Administration...

Img
application , business , compliances

Knowledge Lake Imaging Server

April 21, 2010

KnowledgeLake Imaging Server eliminates the costs and challenges of using paper documents, as well as the limitations it puts on your business processes. Built on Microsoft® SharePoint®, KnowledgeLake Imaging Server uses the latest technology to provide features that extend SharePoint’s enterprise content management capabilities throughout your organization.   With KnowledgeLake...

Img
application , compliances , security , visio-stencils , web-services

Sample Visio – Java Components

April 8, 2010

Free Visio document download Java Components.vsd https://www.bestitdocuments.com/Samples

Img
application , policies

GEO Science Dependencies – Standard * Interoperability

April 1, 2010

 

Img