Tag it

IT Monitoring Applications

This post features monitoring tools of IT. List of IT Monitoring Applications List of monitoring tools: Prometheus Prometheus is FOSS, under an Apache 2 license. Prometheus at Wikipedia Prometheus source code repository Nagios Core Nagios Core is developed by Ethan…

Linux Endpoint Security

This post talks about endpoint security on Linux OS. Linux Endpoint Hardening Tools Lynis Lynis is free and open source software (FOSS) tool to audit Unix-like OSs. It is developed by Dutch company CISOfy. Lynis official website Lynis code repository…

Voice over IP

Voice over IP (VoIP) is a multilayer protocol that encapsulates in a tunnel audio video into IP packets to support voice calls an multimedia collaboration. VoIP is an alternative to the traditional public switched telephone network (PSTN). VoIP Protocols VoIP…

IT Quality Assurance

IT quality assurance (QA) encompasses not only software testing but also other activities that ensure the overall quality of IT systems, including requirements analysis, process improvement, and various testing types such as system testing, integration testing, and user acceptance testing.…

Telecommunication Cabling

This post is about telecommunication cabling. Telecommunication Cabling Standards Telecommunication Cabling Standards: ISO/IEC 11801 ISO/IEC 11801 Versions ISO/IEC 11801 Versions: ISO/IEC 11801 Classes ISO/IEC 11801 defines the level of service, despite the cable technology. Class Max frequency Use Example A…

IT Configuration Management

IT configuration management (ITCM) configures software and systems on already provisioned infrastructure. According to ITIL, configuration management is a process of IT Service Management (ITSM). ITCM is also a common practice within DevOps, a movement within software development industry. You…

DNS Security

This post provides resources to security aspects of domain network system (DNS). This post assumes that you already know how a DNS works. You can read an introduction to DNS on this post. Security Controls for DNS Security controls specific…

Supply Chain IT Security

Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics and transportation. Its goal is to identify, analyze and mitigate the risks inherent in working with other organizations as…