تبلیغات
اگر تنهاترین تنهایان شوم باز هم خدا هست - مطالب فروردین 1390
جمعه 19 فروردین 1390  01:45 ب.ظ    ویرایش: - -

IT Administrator should know about all the possible security attacks and also know their solutions. IT Administrator should look for the viruses from the Internet, Malware, Adware, Trojan horses, E-mail attachments, Floppy disk, CD or any infected computer that is attached to the network. Spyware and network intrusions are specifically designed to get the secret information from their target companies, which can do harm for the company. Everyday security threats are refined as hackers designed new security threats.

The main cause of a security threat in the small companies is the misuse of the internet without proper anti virus, anti spyware installed on the every PC of the company’s network. For example if a company’s employees browse an inappropriate website, sends or receives the infected data, leaks company’s secret information, then there are greater chances for a possible virus/malware attack.

 

In my opinion, the end user’s education on the security threats, preventions and precautionary measures are must. They should be trained about the possible and easy virus attacks from the internet if they browse the inappropriate sites.

Another important thing is the insider’s attack e.g if the company’s employee leave the company for any reason, then its very important that all the computer and other company’s sensitive assets access should be revoked by him immediately. I have personally seen a situation, when a company’s network administrator was dismissed and he access the company’s server by VPN and send harmful viruses to the server and the entire computer network, and it was impossible for the IT manager to control all the security attacks in one time.

It’s the responsibility to keep a closer eye on the new employee’s activities, their access to the sensitive data, and computers servers. IT managers should bring it in the knowledge of the employees that any change in their computer will be logged. So that nobody can even try to do anything that is not permitted.

There are six basic security steps for the Windows platforms. If a network administrator can follow these steps then he/she can save the computerss from all the possible security threats and virus or malware attacks.

First the IT managers should divide the computer network into the segments. They should filter the access to the internet with the help of a firewall by blocking TCP port 1433 and TCP port 1434. Internet access from the outside should be allowed to the SQL systems. All the unwanted ports should be blocked and only the required ports should be open for access.

Second, moderate the affect of the spoofed ports. The port 80 is the most commonly used port.

Third, as network administrator you should install the current patches to you’re your server computer and client’s up to date. Patches can prevent the systems from the known vulnerabilities. Latest patches can be downloaded from the Windows website. You can also configure to automatically update. Also third party patches products are also available that can be tested and installed. Additionally, by strengthening the user authentication process can be very helpful for security purposes.. You can use password security and other technological methods for the authenticate purpose.

Fourth, you can limit the number of the network administrators it can also be helpful for security a computer network. Admin rights should not be given to the local PC, until and unless it is the requirements for the applications that are installed on the local PCs.

Fifth, protect computers against the known attacks. Don’t disable any Windows known service such as clipbook, Telnet etc. Set the powerful permission the shared network resources.
Last, you can configure the security policies. Implement the security policies on your network.
Security measures and methods have expenses with their purchases. Deployment, maintenance and the implementations of these methods can increase the security cost. Some other things which a IT administrator or a IT manager should keep in mind are the education of the employees about the computer networking, security, use of the encryption and digital right management software, block the unwanted emails and audit security on the regular basis. Network security methods should be used and implemented in order to prevent your computer network from the unauthorized access.

In this article you have discovered the Computer Network Security Overview More topics to come are Cisco Labs, Routing, IP addressing & Free IT resources.

   


نظرات()  
جمعه 19 فروردین 1390  12:57 ب.ظ    ویرایش: - -

Exhibition in Barcelona Explores the Realist Movement through Courbet's Paintings

BARCELONA.- The French Painter Gustave Courbet rocked the art world in the 19th century. Through his brush, reality entered painting: Realism was born. With the aim of tracing his footsteps in this country, the MNAC is exhibiting a selection of his most outstanding works, most of which are being shown in Spain for the first time. The exhibition reveals Courbet’s influence on Catalan painting in the period, most of all through the work of Ramon Martí Alsina, the man responsible for the renewal of painting and who introduced Realism to the Spanish art scene. It is an ambitious exhibition, produced by the MNAC, that invites the public to gain greater in-depth knowledge of Realism and at the same time discover its precedents and its legacy, in a show that deliberately goes beyond the temporal limits of this movement: from the Spanish Golden Age, with paintings by Murillo, Ribera and Velázquez, to contemporary art, through the

   


نظرات()  

اگر تنهاترین تنهایان شوم باز هم خدا هست

مــتـنــفــرم از خــاطــره هـــایــی کــه وقــتــی بــهـــشــون فــکــر مــی کــنــم ، مــیــگـــم: وای مـــن چــقـــدر احــ