Cisco Stealthwatch Basic Interview Questions

Stealthwatch Overview Stealthwatch provides enterprise-wide visibility, from the private network to the public cloud, and applies advanced security analytics to detect and respond to threats in real-time. It continuously analyses network activities and creates a baseline of normal network behavior and then uses this baseline, along with advanced machine learning algorithms, to detect anomalies. However, … Read more

How to Upgrade Checkpoint Firewall VSX cluster from R77.20 TO R77.30 with Jumbo HFA installation

Upgrade Checkpoint Firewall VSX cluster from R77.20 TO R77.30 with Jumbo HFA installation. Upgrading a firewall is a tedious task for any operations engineer. This article will help you plan and execute your next implementation better. following article demonstrates the steps to how to take the backup, how to upgrade both gateways with the latest … Read more

Hackers Infect 50,000 MS-SQL and PHPMyAdmin Servers with Rootkit Malware

Cyber Security researchers at Guardicore Labs today published a detailed report on a widespread cryptojacking campaign attacking Windows MS-SQL and PHPMyAdmin servers worldwide. Dubbed Nansh0u, the malicious campaign is reportedly being carried out by an APT-style Chinese hacking group who has already infected nearly 50,000 servers and are installing a sophisticated kernel-mode rootkit on compromised systems to prevent … Read more

What is Shell?

what is shell

Shell is a user interface for access to an operating system‘s services. Shells use either a command-line interface (CLI) or graphical user interface (GUI), depending on a computer’s role and particular operation. When we speak of the command line, we are really referring to the shell.Shell was founded by Stephen R. Bourne and It is … Read more

What is Domain Name System (DNS)?

domain name system dns

Domain Name Resolution Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize long strings of numbers. There are two common methods for implementing name resolution: A static file on each host on the network, containing all the name-toaddress translations (examples include the HOSTS … Read more