it

VPN Protocols

This post summarizes the most common Virtual Private Network (VPN) protocols. List of VPN Protocols VPN (Virtual Private Network) protocols: RADIUS AAA protocol can also establish a VPN. PPTP Deprecated Point to Point Tunneling Protocol (PPTP) is a legacy solution,…

Application Virtualization

This post explains some aspects of application virtualization. This is part of a series of article about virtualization. Application Virtualization Software Products Software Virtualization Software Products: Citrix Virtual Apps Citrix Virtual Apps, formerly known as Citrix XenApp, allows users to…

Robotic Process Automation

This post features Robotic Process Automation (RPA) tools. RPA Tools RPA tools featured on this post: UiPath Business Automation Platform UiPath Business Automation Platform is a suite of products related to RPA. All of these products are developed by American…

How to prepare CISSP Exam

CISSP (Certified Information Systems Security Professional) is a certification granted by the organization ISC2 (International Information System Security Certification Consortium). This post explains how you can prepare the exam to apply for CISSP certification. To find more information about the…

IPv6

IPv6 was developed to substitute IPv4, as it was expected to run out of addresses. IPv6 Characteristics IPv6 is more business-oriented, not defense-oriented like IPv4. It increases the number of nodes. IPv6 supports quality of services natively. IPv6 has a…