Security

HomeSecurity
In this post we will learn what is hashing or what is a hash? We will try to explain hash...
What is Multifactor Authentication? As you know password are one of the most used security mechanisms to secure a device....
Control Plane Policing (CoPP) is one of the mechanisms used for Control Plane defence against the Network Attacks that is...
Cyber Security is one of the most popular case of today’s information technology World. With the development of the information...
Cyber Security is a popular area of Information Technology (IT). Especially in recent years, with the development of the technology...
Cyber Attacks, Network Attacks, Threats, Vulnerabilitis and Mitigation   There are various Network Attacks and various ways to prevent yourself...
A Hacker is a highly skilled person on Cyber Security, Computer Systems and Networks. In other words, they are the...
EAPoL is the abbreviation of Extensible Authentication Protocol over LAN. EAPoL (Extensible Authentication Protocol over LAN) is a network authentication...
802.1x (Port Based Network Access Control) 802.1x is a LAN Security Mechanism that provides port based access control in the...
In this Huawei Port Security Configuration Example, we will configure Port Security on a Huawei switch. For our Huawei Port...