TECHNIG
Gateway for IT Experts and Tech Geeks
Browsing Tag

Information Security

How to Configure DHCP Snooping in Cisco Switches?

In the network switching, you can easily configure DHCP snooping to prevent DHCP spoofing attack and DHCP starvation attack. Before you mitigating DHCP attacks in the network, you need to know about DHCP functions and features. The DHCP…

What is a Person Identity and How to Protect it?

How much you know about a person identity? Did you ever ask yourself the question, what is my identity? Did you ever attempt to protect your personal identity? This article helps you know your identity and the ways to protect it. Your…

How to Configure PAP and CHAP in Cisco Router?

It's a simple way you can learn to configure PAP and CHAP in Cisco router using this packet tracer lab. Just download the lab or create your own lab with packet tracer and follow the instruction to easy configure PAP and CHAP authentication…

SSL2BUY Review: A Look on Their Pros and Cons

Do you want to buy an SSL certificate(s) for your company but are unable to choose a reliable reseller? Are you delaying your purchase decision just because you’ve not yet been able to finalize a good company from where you can compare and…

How to Fix Unable to Locate Package Update in Kali Linux

We received many questions about Kali Linux apt-get update not working. Let's fix unable to locate package update in Kali Linux correctly. The single most common causes of a broken Kali Linux installation are following unofficial advice,…

How to Remove Malware from Windows 10?

A virus protection software always protects your system from infected by viruses, malware, and any malicious software. This article focus on how to remove malware from Windows 10 protect any other operating systems with malware protection…

Vulnerability Assessment vs Penetration Testing

The simple to guide to Vulnerability Assessment vs Penetration Testing. The penetration testing services test the security of your information systems, by identifying and exploiting weaknesses. A security penetration tester test and analyze…