Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
compliances , networking , security

DoS

February 22, 2010

Aurthor unknown Whether launched by high school novices or savvy cyber-terrorists, Denial-of-Service (DoS) attacks have become a threat to network reliability. These attacks often result in considerable loss of time and money since they consume scarce and expensive resources: network bandwidth, memory and disk space, CPU time, access to...

Img
networking

Sort IP Addresses in Microsoft Excel

January 15, 2010

Excellent excel tip for networking solutions. http://blog.zztopping.com/2009/02/05/how-to-sort-ip-addresses-in-microsoft-excel  

Img
networking , security

Next Generation Real-time Network Defense

January 11, 2010

Requirements: Near Continuous Scanning System Change Alerts Identify “unmanaged” nodes on network Receive frequent vulnerability updates Ongoing monitoring for baseline compliance, vulnerabilities, and threats Standards-based interface to firewall, anti-virus and intrusion prevention systems to support rapid shielding https://www.bestitdocuments.com/Samples

Img
networking , security

Sample RSA Server Architecture

January 10, 2010

Free – Document download Sample RSA Server Architecture https://www.bestitdocuments.com/Samples

Img
compliances , networking , sample-it-spreadsheets

Sample Excel – CA – Spectrum Polling spreadsheet

January 4, 2010

Free – Document download Spectrum Polling Collection Spreadsheet https://www.bestitdocuments.com/Samples

Img
application , networking , web-services

OS Jobs Scripts Can Do

October 14, 2009

Windows Script Host provides objects for manipulation of your scripts. Here are some of the tasks that these objects and services can do for you: Map network drives Connect to printers Modify environment variables e.g. Temp Run basic functions such as CreateObject and GetObject Print a message to a...

Img
networking

TCP and UDP ports

September 27, 2009

  Port Category Port Number Range Description Well-known ports 0 – 1023 Typically used by standard system processes or programs executed by users with administrator credentials. Assigned by IANA. Registered ports 1024 – 49151 Used by ordinary user processes or programs executed by ordinary users. IANA does not assign...

Img
networking , o-s

TCP/IP Address Resolution

May 10, 2009

Windows order of resolution: NetBIOS WINS Broadcast LM Hosts Hosts DNS Hosts Local Hosts DNS Cache WINS Broadcast LM Hosts https://www.bestitdocuments.com/Samples/

Img
networking

Tons of Bytes

May 4, 2009

Lots of Bytes When you start talking about lots of bytes, you get into prefixes like kilo, mega and giga, as in kilobyte, megabyte and gigabyte (also shortened to K, M and G, as in Kbytes, Mbytes and Gbytes or KB, MB and GB). The following table shows the...

Img
networking , security

Short list of IEEE Standards

February 26, 2009

802.1 Internetworking 802.2 Logical Link Control 802.3 CMSA/CD or Ethernet 802.4 Token Bus LAN 802.5 Token Ring LAN 802.6 Metropolitan Area Network or MAN 802.7 Broadband Technical Advisory Group 802.8 Fiber-Optic Technical Advisory Group 802.9 Integrated Voice/Data Networks 802.10 Network Security 802.11 Wireless Networks 802.12 Demand Priority Access LAN...

Img
business , networking , security

Liability of Internetwork Carriers

January 10, 2009

The Internet is undergoing a rapid transition.  Two key, interrelated trends are easily discerned.  First, commercial traffic is now being carried on and across many networks.  Second, many networks are being operated more like businesses than research experiments.  New entities have been created as profit-seeking enterprises.   In this environment,...

Img
networking

Net Time Servers

September 21, 2008

Time Servers                              time.nrc.ca       ntp0.fau.de       time.nist.gov       time-a.nist.gov       time-b.nist.gov       time-c.timefreq.bldrdoc.gov       time-b.timefreq.bldrdoc.gov       time-a.timefreq.bldrdoc.gov       nist1.datum.com Windows command to set / synchronize your time:                  net time /setsntp:time.nrc.ca

Img
information-rights-management , networking , security , web-services

Identity Compliance Described

May 17, 2008

Supports enterprise level monitoring of access for segregation of duty (SoD) and security policy conflicts Ability to define rules across any platform / database / application or user’s attributes Support for inter and intra application security policy enforcement Monitoring of SoD, role vs actual exceptions, and terminated users with...

Img
data-center-soc-noc , networking

Sample – Nokia IPSO Alert Table

March 27, 2008

NICAlert-Nokia IPSO (4.2) Conn Table Full: Host.Unix: Field Results View Name Nokia IPSO Conn Table Full Date / Time NIC Domain NIC Site / Location Event Category System.Errors Current Severity Low (1/5) Peak Severity Low (1/5) Peak Time Trend No Change (0.00%) Count 0 Device Name Device IP Device...

Img
compliances , networking , security

Common Referenced Related Laws, Regulations, and Policies

January 11, 2008

The following Federal laws, directives, regulations provide guidance pertaining to the security automated information systems: Privacy Act of 1974 (Public Law [PL] 93-579, United States Code [U.S.C.] 552A) Freedom of Information Act (5 U.S.C.522) Paperwork Reduction Act of 1986 (44 U.S.C. 35) Electronic Communications Privacy Act of 1986 (PL...

Img
compliances , networking , policies , security

Cellular / Mobile Standards History

November 17, 2007

Cellular / Mobile Standards History 0G MTS (1946 – US, Bell System) IMTS (1969 – US, Bell System) OLT (1966 – Norway) AMTS (Japan) ARP (1971 – Finland) MTD (1971 – Sweden) 1G 1G cell phone technology encompassed analog standards introduced in the 1980s and continued until replaced by...

Img