Author: Shreyash Sharma

0

Hardening Linux

Hardening Linux and Using iptables There’s tremendous value in isolating your bastion (Internet-accessible) hosts in a DMZ network, protected by a well-designed firewall and other external controls. And just as a good DMZ is...

0

DEBUNKING MOBILE DEVICE MYTHS

Mobile phones, these things have made our lives awesome, and its a little wrong if we fail to understand the basics of how these devices actually works, and what’s more worse is when we...

0

How to Work your Mac Security.

Apple’s Iphone Celebrated its 10th anniversary, so I’ve decided to articles, focusing on Apple’s product. I hope you will enjoy these, readers. So, how exactly you work security on your Mac, here is how....

0

Securing The Clouds

Technology is massively integrated with modern business, but many of those businesses still lack a modern security solution which helps protect against vulnerabilities in each layer of organisation. With the Protection Service for Business...

0

Reinventing The Server

At the recently concluded South Asia Dell Enterprise Forum (DEFSA), Dell unveiled a series of 13th Generation PowerEdge servers, designed to help customers worldwide address and optimise the evolving spectrum of application and workload...