DataFort E-Series appliance uses the following network ports and protocols

Port ID Port Protocol Appliance Interface Communication Interface Communicate over VIP Programmable Port ID 21 TCP FTP For data access over FTP Management Client Yes No 22 TCP SSH Secure Shell Management Client No No   53 UDP DNS DNS network client Management client Storage Yes No 69 UDP TFTP TFTP Traffic Management Client Storage… Continue reading DataFort E-Series appliance uses the following network ports and protocols

Evaluating a Vendor product

1) Provide a high level overview of what the product is marketed to do. 2) Now, provide the details of what “you” (the buyer) are expecting it to do. 3) Find someplace where the product can be installed and tested. Before you begin, document what your expectations of how the install will go, and your… Continue reading Evaluating a Vendor product

RSA 7.x – Port Usage

  RSA 7.x – Port Usage Port Protocol Description 1161  UDP  SNMP agent – Used to communicate with a Network Management Server using the Simple Network Management Protocol.  1162  UDP  SNMP agent -Used to communicate with a Network Management Server using the Simple Network Management Protocol.  1645  UDP  RADIUS authentication (legacy port) – Used for… Continue reading RSA 7.x – Port Usage

Sample Excel – SQL Patch sets – Serious – Critical – Urgent listings

Free Spread Sheet Document download: SQL Patch sets – Serious – Critical – Urgent Details.xls https://www.bestitdocuments.com/Samples

Sample Web Monitor Content Considerations

Web Monitor HTTP_Servers This rule logs URLs and hosts in the URL Log. This rule, like LogUnmatched, does not match connections. It is used for data collection only, not for blocking or allowing. When adding this rule, some options in the Rule Properties window are unavailable. It is recommended that you place this rule near… Continue reading Sample Web Monitor Content Considerations

Default Oracle Ports

 Default Oracle TCP / UDP Ports usage Description Port Application Actions Oracle HTTP Server listen port / Oracle HTTP Server port  80 Oracle Application Server  Edit httpd.conf and restart OHS Oracle Internet Directory(non-SSL) 389 Oracle Application Server   Oracle HTTP Server SSL port 443 Oracle Application Server Edit httpd.conf and restart OHS Oracle Internet Directory(SSL)… Continue reading Default Oracle Ports

MS Word 2003 How to turn OFF Delete Block dialogue in Microsoft Word

MS Word 2003 How to turn OFF Delete Block dialogue in Microsoft Word MS word 2003 To turn OFF “Delete Block?”  (no / yes) Tool / Options / General Uncheck 2 boxes pertaining to “Word Perfect help and Navigation” Outlook Repair. Then, please type the following at “Start” “run”: Regsvr32.exe  %Windir%System32Ole32.dll Once doing this, you… Continue reading MS Word 2003 How to turn OFF Delete Block dialogue in Microsoft Word

Oracle 8 -9 Vulnerabilities Patches

Priority Oracle 8 -9 Vulnerabilities Patches Security Alert Number And Description   MetaLink Note ID   Latest Version/Date Alert 68, Oracle Security Update 281188.1 Rev 4, 2 March 2005 Alert 67, Unauthorized Access Vulnerabilities in Oracle E-Business Suite 274356.1 Rev 1, 3 June 2004 Alert 66, Security Vulnerabilities in Oracle Application Server Web Cache 265308.1 Rev 2,… Continue reading Oracle 8 -9 Vulnerabilities Patches

Web Server Security – Suggestions

Common Web Vulnerabilities Buffer Overflow Attacks Denial of Service Attacks on vulnerable scripts URL Manipulation Sniffing / Spoofing Credentials Client Parameter Manipulation Brute Force Attacks Web Server Fingerprinting Web Defacements Take web servers seriously, server security is essential for web security, recommendations: Harden servers from attack • Use a hardening guide like CIS or MS… Continue reading Web Server Security – Suggestions

System and Application Unit Testing

Testing must be an on-going activity throughout all phases of a project and should be an integral component of quality assurance efforts. A complete testing strategy cannot be developed until after vendor selection, so this section contains suggestions for possible activities that could be included in a testing strategy, and a general description of the… Continue reading System and Application Unit Testing

SDLC – Application System Definition Model

Audience: Application & System Services Communication & Collaboration Service: Database Administration Desktop Computer Services Disaster Recovery & Business Continuity Services Facilities A formal model of a complete system All information pertinent to deployment and operations Machine-readable, capturing intent of developers and administrators System topology Developer constraints IT policy Installation directives Health model Monitoring rules Service… Continue reading SDLC – Application System Definition Model

Testing Approach and Strategy

Testing Approach and strategy helps you prepare the list of testing requirements and the testing strategy for supporting the new corporate procurement and application module. Included are descriptions of the target audience, delivery method, and objectives. In addition, the testing approach and strategy identify: The high level objectives and tasks of each testing phase The… Continue reading Testing Approach and Strategy

Sample SDLC Development Project Deliverables

Deliverables and Combined Processes Discovery Project Roadmap Planning Customer & Stakeholder requirements prioritization & signoff Internal Services Catalog Project Risks Identified UI Models List of Alternative Solutions Selection of Best Solutions for further research Hardware Solutions Demos Financial Approval Potential Solutions Modeled in Test Lab  Initial Security Requirements Definition Initial Project Plan & completion Estimate… Continue reading Sample SDLC Development Project Deliverables

Basic Oracle Hardening

Disable install and demo accounts: Disallow default user/password PUBLIC has execute System privilege PUBLIC has execute Object privilege PUBLIC has execute UTL_FILE privilege PUBLIC has execute UTL_SMTP privilege PUBLIC has execute UTL_HTTP privilege PUBLIC has execute UTL_TCP privilege PUBLIC has execute DBMS_RANDOM Password complexity Restrict number of failed login attempts Authentication protocol fallback Connect and… Continue reading Basic Oracle Hardening

Datacenter – Application Lifecycle Considerations

Service Monitoring • Availability• Logging• Auditing• Performance Metrics• Debugging & Tracing• Synthetic Transactions Exception Management • Error Trapping• Root Cause Analysis• Notification Services Version Management • Data Contracts• Message & Operation Contracts• Endpoints (Addresses)• Policies• Internal Dependencies• Claims• Service Retirement• Dependency Analysis Service Delivery • Methodology• Standardized Service Delivery Lifecycles Policy and Security Considerations •… Continue reading Datacenter – Application Lifecycle Considerations

Guiding Principles for Software Security

Behind every attack & security problem is – bad software A major concern is that security professionals are often un-aware the problem is – bad software Encrypt your data lines? The riskiest category of software today is Internet-enabled apps “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit… Continue reading Guiding Principles for Software Security

Principles of Software Security

Secure the weakest link Low-hanging fruit is picked first, I.e. Attack end points, not encrypted links Risk analysis ID’s the weakest link Apportion resources according to risk Practice defense in depth One layer is never enough Overlapping & redundant    Fail securely Failure is unavoidable Allow least privilege Only the minimum access is allowed For… Continue reading Principles of Software Security

Sample eGIS Collaboration

Single storage location for all eGIS data Access for Corporate Users Web Based Mapping Access to all Geo-spatial Data Compliant with Corporate Security Policy Subscription Service to Download Geo-spatial Data Map based access to Documents in Document Management System Map based access to Permits including geographic coverage Collaboration Geo-spatial Functionality Map based access to Environmental… Continue reading Sample eGIS Collaboration

Sample Application Hosting Services

  Server Administration Application Support Infrastructure Support Upgrades DB Overlays, Cloning, creation and data population         Database Maintenance         Patch Management         Middleware Optimization and Mnagement         Databased Backup Administration         Database Security Administration         Database Connection… Continue reading Sample Application Hosting Services

Knowledge Lake Imaging Server

KnowledgeLake Imaging Server eliminates the costs and challenges of using paper documents, as well as the limitations it puts on your business processes. Built on Microsoft® SharePoint®, KnowledgeLake Imaging Server uses the latest technology to provide features that extend SharePoint’s enterprise content management capabilities throughout your organization.   With KnowledgeLake Imaging Server, you can:  Provide easy… Continue reading Knowledge Lake Imaging Server

Application Fix Suggestions

Create or modify standardized processes or procedures for: Business requirements Project Management eCommerce Services Web Design (CSS) Development Coding Interdependent transactions Authentication Storybook’s Testing Use cases Acceptance processes Pre-production security scans and remediation Dependencies should be: Accurate Asset Management Accurate IP Control Reliable Network infrastructure Governance: Policies, Standard and Procedures Business processes Upstream / Downstream… Continue reading Application Fix Suggestions

Success of your Business

Outsourced solutions insure the success of your business The road to profitability is paved with criteria that, if achieved successfully, can ensure your site’s success. In today’s Intranet economy, whether you are a service or content provider, you need to differentiate your offering from your competitors’ by: · Building customer loyalty and strengthening relationships · Identifying… Continue reading Success of your Business

Application Development Services

ERP – CRM Sample details Common Corporate Departments: Application Architecture and Internal Consulting Application Development Tools Research and Deployment Application Development Training Coordination Application Needs Analysis and Project Identification Application Security and End User Access Control (Some Applications) Application Systems Development Application Systems Operational Support Applications Integration and Systems Interfaces Applications Systems Enhancement Application Vendor Support… Continue reading Application Development Services

Sample Visio – Application Testing

Unit Testing Unit testing of internal and external objects in the patch set or application release is conducted in the development environment by the application developers.  Unit testing ensures that the object will execute and desired outputs are produced.  Debugging and verification of output results are performed by the developer.  When unit testing has completed,… Continue reading Sample Visio – Application Testing

Sample Simple Coding Project Plan

Finalize Packaging Publish High Level Assessment Prepare Project Schedule Scope Closure & Exec Approval Analysis & Design Publish Design Documentation Code and Unit Test Perl or script Distribution Compilation Proxy Compilations for Design Application Create XML File Update Development Testing System Testing Availability of Contractor Test Planning & Preparation Test Strategy Document Test Strategy Document… Continue reading Sample Simple Coding Project Plan

Sample Directory Services Consolidation Project

Directory Services is an integral component of the solutions an enterprise data center should offer its clients.  It is advisable to initiate a project to migrate and consolidate the Corporate departments, existing directory services, including Windows, Netware, and any others.  It is recommended to consolidate all directory services to a single platform, like Microsoft Active… Continue reading Sample Directory Services Consolidation Project

Sample Application Server Consolidation

File / Print / Utility Servers Ability to provide a more predictable and dense application consolidation which will result in a further reduction of server footprint Save time and money by accelerating costs savings through deeper consolidation Lower the risks involved in a higher density of applications per server in a consolidated environment Provides the… Continue reading Sample Application Server Consolidation

Sample – Shared Application Development and Testing Environment Project

The availability of a shared application development and testing environment will provide agencies parallel production-like environments without having to maintain and purchase equipment for the department sites. Multiple standard environments can quickly be provisioned into a server partition in less than 15 minutes (based on predefined server builds and the proper tools) and can be tested… Continue reading Sample – Shared Application Development and Testing Environment Project

Software Security and SDLC Considerations

Technical security architecture Application security architecture Application security architecture document Architecture control board Data model Data security architecture document Data security architecture Platform security architecture Platform security architecture document Enterprise architecture governance Security in the system development lifecycle Security requirements of information systems Security requirements analysis and specification Define information system security requirements Information system… Continue reading Software Security and SDLC Considerations