What is Physical Security ? Threats to Physical Security

PHYSICAL SECURITY BASICS The Physical Security addresses the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information. These resources include personnel, the facility in which they work, and the data, equipment, support systems, and media with which …

What is Ruby Programming Language – Basics

Ruby – Basics Ruby Programming Language : Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, extensible, and portable. I need …

What is IronPython ? History of IronPython

What is IronPython ? IronPython is an open source implementation of Python for .NET. IronPython isn’t cast in the same mold as traditional .NET languages, although there are similarities.   The .NET framework was launched in 2000 and has since become a popular platform for …

What is Malwares ? How to remove them ?

What is Malware ? Malware is known as “malicious software” or any type of malicious code that infiltrates a computer. This is software that is specifically designed to gain access or damage a computer without knowledge of the users. Types of Malwares Spyware, Keyloggers,Viruses ,worms, …

What is Splunk Technology ?

Splunk Technology Splunk Enterprise is a software platform to search, analyze, and visualize the machine-generated data (physical, virtual, cloud).   Feature Description Indexing Splunk indexes machine data. The maximum indexing volume depends on the Splunk  Enterprise license. Search Search is the primary way for navigating …

What is Unix/Linux ? Operating System

What is Operating System ? An operating system (OS) is software that manages the resources of a computer Like most managers, the OS aims to manage its resources in a safe and efficient way Examples of computer resources are: CPU,RAM, disk memory, printers, displays, keyboard, …

What is Penetration Testing ?

Penetration Testing “Penetration testing can be defined as a security-oriented probing of a system or network or application to seek out vulnerabilities that an attacker could exploit”. The purpose of this testing is to identify loopholes, methods of gaining access to a system, network and …

What is Mainframe Technology ?

Mainframe | Trenovision Time Sharing Option Time Sharing Option is an interactive time-sharing (Time sharing – is the sharing of a computing resource among many users by means of multiprogramming and multi-tasking) environment for IBM mainframe operating systems, including OS/360 MVT, OS/VS2 (SVS), MVS, OS/390, …

What is JScript ? | Basic of JScript

Basics on JScript JScript is the Microsoft implementation of the ECMA 262 language specification. It is a full implementation, plus some enhancements that take advantage of capabilities of Microsoft Internet Explorer. This tutorial is intended to help you get started with JScript. Easy to Use, …

Hadoop Big Data Technology

Some basic concept about Hadoop Technology Hadoop Overview: Apache Hadoop is a set of algorithms (an open-source software framework written in Java) for distributed storage and distributed processing of very large data sets (Big Data) on computer clusters built from commodity hardware. The core of …

Hadoop Distributed File System | HDFS

Hadoop Distributed File System | HDFS | Trenovision Design And Concepts Hadoop is based on work done by Google in the late 1990s/early 2000s Specifically, on papers describing the Google File System (GFS) published in 2003, and MapReduce published in 2004 Distribute the data and …

What is Financial Information eXchange Protocol (FIX)‏ ? – Network Communication

Financial Information eXchange Protocol (FIX) The Financial Information eXchange (FIX) protocol is an electronic communications protocol initiated in 1992 for international real-time exchange of information related to the securities transactions and markets. With trillions of dollars traded annually on the NASDAQ alone, financial service entities …

What is Lightweight Directory Access Protocol (LDAP)‏ ? – Network Communication

LDAP The Lightweight Directory Access Protocol, or LDAP, is an application protocol for querying and modifying directory services running over TCP/IP. A directory is a set of objects with attributes organized in a logical and hierarchical manner. A simple example is the telephone directory, which …

What is Simple Mail Transfer Protocol (SMTP) ? – Network Communication

SMTP Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. SMTP was first defined in RFC 821 (STD 15), and last updated by RFC 5321 (2008)[2] which includes the extended SMTP (ESMTP) additions, and is …

What is Secure Shell (SSH)‏‏ ? – Network Communication

Secure Shell (SSH) Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for Telnet …

What is Simple Object Access Protocol (SOAP)‏‏ ? – Network Communication

SOAP SOAP (Simple Object Access Protocol) is a protocol specification for exchanging structured information in the implementation of Web Services in computer networks. It relies on Extensible Markup Language (XML) as its message format, and usually relies on other Application Layer protocols (RPC and HTTP) …

What is Hypertext Transfer Protocol (HTTP)‏ ? – Network Communication

HTTP HTTP stands for Hypertext Transfer Protocol. Network protocol used to deliver virtually all files and other data (collectively called resources) on the World Wide Web, whether they’re HTML files, image files, query results…etc.. A browser is an HTTP client because it sends requests to …

What is Remote Procedure Call (RPC) ? – Network Communication

Remote Procedure Call (RPC) Remote Procedure call is a high-level model for the client server communication. A remote procedure call makes a call to a remote service look like a local call RPC makes transparent whether server is local or remote. RPC allows applications to …

‏ What is File Transfer Protocol (FTP) ? – Network Communication

File Transfer Protocol (FTP) File Transfer Protocol allows a user to copy files to/from remote hosts. Client program connects to FTP server It provides a login id and password It allows the user to explore the directories and download and upload files with the server …

What is Telnet ? – Network Communication

Telecommunication Network (Telnet)‏ TELNET is a client-server protocol, based on a reliable connection-oriented transport . This protocol establishes a connection to TCP port 23, where a getty-equivalent program (telnetd) is listening. Telnet is a protocol for remote computing on the Internet. It allows a computer …