Author: Ron

0

2015 a brand new year

Happy New Year Everyone, It has been quite some time since my last post here on my blog. The last time I posted anything was back in August of 2014. That was approximately 6 months ago. Many things have gone on since then. I was very busy. Between work and school, I did not have that much time to post anything. Now that the New Year has passed, I will try to do my best to update this blog regularly. In current news, I am 6 weeks into the January session in school. I am taking classes for Linux Administration...

0

Data Security and PKI

Data security is very important. Keeping sensitive data secure is essential to protecting a company’s proprietary data from rival companies or from hackers. The best way to keep data secure is to implement data encryption using a public key infrastructure system. By utilizing PKI standards in addition to utilizing proper security policies and procedures, data integrity can be kept while minimizing possible data breeches (Wikipedia, 2014). PKI utilizes two different types of keys. The key types are Asymmetric and Symmetric. Both key types are used to help validate users against and establish a trust between the certificate authority and the end...

0

Port Scans and Ping Sweeps

A ping sweep is a process in which a computer user runs a software utility to see how many computers are online within an IP address range (Wikipedia, 2013). This ping utility is useful when troubleshooting network connectivity when there are known connectivity issues. A system administrator can issue the ping command followed by a single IP address which sends out an ICMP Echo packet. The target computer will either reply back to the ICMP packet to indicate the device is online and accepting ICMP packets. If there is no response, that indicates either the target computer is either offline or...