IP address

Guida al GDPR per chi non ne vuole sapere: a chi hai dato i dati (“so spariti i dati”)?

Se ricordi ho scritto nel post precedente (faccio finta che qualcuno li legga, sai) di cosa dovresti fare per iniziare ad affrontare questa rogna del GDPR. La prima era assumere un DPO, la seconda riguardava i dati… Ma che sono ‘sti dati? voglio dire tutti parlano di dati, ma cosa vuol dire? dove sono? chi sono? cosa fanno? Allora visto che sto scrivendo in italiano assumo che tu che leggi sia italiano e probabilmente interessato alla versione italiana della storia. Quindi vediamo cosa dice il garante al riguardo:   _______________________________________________________________________________________________ http://www.garanteprivacy.it/web/guest/home/diritti/cosa-intendiamo-per-dati-personali Sono dati personali le informazioni che identificano o rendono…

My Latest Article on Hakin9 is on Ddos

It has been released the latest edition of Hakin9 Magazine, and I’ve been so lucky to have another article published, this time on DDos. If you are interested on the subject or the issue just go to: https://hakin9.org/ddos-attacks-and-prevention/ Hope will be a pleasant reading 🙂 for any question do not hesitate to contact me. you can reach me on: twitter: @antonioierano and @thepuchiherald linkedin: it.linkedin.com/in/antonioierano/ as usual I’ll be glad if you join my networks. ciao Antonio Related articles FDL Under DDoS Attack: We Need Your Help Incapsula launches added protection against DDoS attacks DDoS Hosting Solutions Increases its DDoS Protection…

Nmap Guide Revisited – Hakin9 Tutorials | Magazine | Hackers about hacking techniques in our IT Security Magazine

Nmap Guide Revisited – Hakin9 Tutorials | Magazine | Hackers about hacking techniques in our IT Security Magazine The Right Tool NMAP Kung-Fu By Aamir Lakhani, DCUCD, DCUCI, CCNP, CCDP, Microsoft Certified Systems Engineer, IBM Cloud Computing Architect, CISSP, HP Open View Professional Nmap is a popular tool for network reconnaissance It usually one of the first tools a network penetration tester will use to determine the type of system they are targeting, what ports are open on the target system, and what services may be running on the system. Nmap stands for “network mapper” and is used to scan hosts and services on a network. Nmap…

ISE basic installation and configuration. Part 2

When something can go wrong it will, at the end our friend Murphy was right. So I passed the day to to solve a weird problem, and I have to thanks a couple of colleagues of mine that were able to sort out what was wrong. By the way at the end I survived the effort and after a whole day of troubleshooting I just reinstalled the appliance from scratch and everything worked. The Web Interface   Now we can go on and see what we can do. open a supported browser and go to: http://<IP address or host name>/admin/…

Introduction To Network Security – Part 1

Introduction To Network Security – Part 1: Introduction By Sahir Hidayatullah – Firewall.cx Security Advisor As more and more people and businesses have begun to use computer networks and the Internet, the need for a secure computing environment has never been greater. Right now, information security professionals are in great demand and the importance of the field is growing every day. All the industry leaders have been placing their bets on security in the last few years. All IT venodors agree today that secure computing is no longer an optional component, it is something that should be integrated into every…

SOA, Cloud and the network–part 1

Image via Wikipedia It is now a quite very long time we talk about new architectures for our environment. What is leading the way, nowadays, is talking about SOA and Cloud, but what do really means for us implementing those architecture in our networks? One of the problem I’ve noticed when talking with customers and partners is that they usually try to use the same techniques they used for the old network deployment to the new ones. this is a mistake for several reasons, but for a mere philosophical point of view make a little, if not at all, sense to apply…

Surviving Tips:Performance e DNS

Tra le cose piu spesso trascurate per quello che riguarda security e prestazioni, vi e’ sempre la struttura DNS. I DNS sono un elemento fondamentale per garantire prestazioni sia per quello che concerne il trasferimento delle mail sia per quello che concerne la navigazione Web. Anche utilizzando un SMTP Gateway o un Proxy non si puo’ prescidere dalle performance di un buon servizio di DNS. Paradossalmente poi in caso di uso di proxy un pessimo DNS puo’ dare origine ad una serie disparata di errori che, nei fatti, renderebbero la navigazione piu problematica e la use experience piu dura rispetto…

Posts navigation
Stop censorship
%d bloggers like this: