Monthly Archives: March 2012

CLUSIT Security Summit:domani al via l’edizione 2012!

CLUSIT Security Summit   Milano, 20-21-22 Marzo 2012 AtaHotel Executive – v.le Don Luigi Sturzo, 45 ore 9-18   Aggiornamento, formazione e informazione per manager e tecnici della ICT Security! Related posts: Security Summit :: Rapporto Clusit 2013 SECURITY SUMMIT MILANO 2014 The gag is back: let’s stop it now! Wanted Dead or Alive: The Human Factor Guida al GDPR per chi non ne vuol sapere: la vedi la luce in fondo al tunnel? … è il treno! Powered by YARPP.

Today ISE training day 1

Image by Getty Images via @daylife and the day is gonna be at its end for the first day of ISE training here, tomorrow I will have to talk about Profiling, we’ll see Related articles Configure cisco ISE for Cisco Access Points (aitechupdate.wordpress.com) Fab Site: ThisIsAuto.com (fabsugar.com) Canon Powershot SX210IS Best Buy (canondigitalslrcamerasbuy.wordpress.com) Good practice to delete rows from database by attribute(eg. is_removed) (stackoverflow.com) Squaring Numbers from 30-70 (mathema-tricks.blogspot.com) How We’re Going Fix Online Identity and Reputation (readwriteweb.com) Οι συζητήσεις μας (sxoliastesxwrissynora.wordpress.com) Method isEmpty for binary tree proble (stackoverflow.com) Double-Check the Accuracy of Your Clock at Time.is [Clocks] (lifehacker.com) It…

bad day :(

Ok some days are worse than others. I mean, it is not only that I felt sick tonight, and believe me kidney pain is really painful, and I will not speak about the other symptoms that required frequent visit at the restroom .   Is that sometimes I find really hard to cope with some people, well I hope at least he enjoyed the ride and felt superior (any sarcasm here is understandable).   sayonara Related articles bad day 🙁 (thepuchiherald.wordpress.com) Related posts: FW SPAM: My dear friend It’s Monday My right forearm’s tumor update Please take this survey ise…

Configure cisco ISE for Cisco Access Points

Let’s say you have been asked to configure ISE to allow secured network access for Cisco Wireless Access Points. To do so you should : · Enable the ISE endpoint profile for Cisco Access Points · Configure an Authorization Profile and Authorization Policy rule for Cisco Access Points · Review the access switch configuration to authorize an access point using MAC Authentication Bypass (MAB). · Verify proper authorization of a Cisco Access Point based on ISE policy   Login to ISE The ISE Home Dashboard page should display. Navigate the interface using the multi-level menus. Configure the Profiler Policy to…

Introduction To Network Security – Part 1

Introduction To Network Security – Part 1: Introduction By Sahir Hidayatullah – Firewall.cx Security Advisor As more and more people and businesses have begun to use computer networks and the Internet, the need for a secure computing environment has never been greater. Right now, information security professionals are in great demand and the importance of the field is growing every day. All the industry leaders have been placing their bets on security in the last few years. All IT venodors agree today that secure computing is no longer an optional component, it is something that should be integrated into every…

Introduction To Network Security – Part 2

Introduction To Network Security – Part 2: By Sahir Hidayatullah – Firewall.cx Security Advisor Tools An Attacker Uses Now that we’ve concluded a brief introduction to the types of threats faced by both home users and the enterprise, it is time to have a look at some of the tools that attackers use. Keep in mind that a lot of these tools have legitimate purposes and are very useful to administrators as well. For example I can use a network sniffer to diagnose a low level network problem or I can use it to collect your password. It just depends…

Posts navigation