Quantcast
Channel: kb.hurricane-ridge.com » security
Viewing all articles
Browse latest Browse all 4

Bookmarks for December 8, 2009 through December 10, 2009

$
0
0

Links for December 8, 2009 through December 10, 2009:

  • IPAM Freeware Download – "This IP address management freeware is a complete solution with the complete feature set of the Infoblox IP address manager, including Smart Folders, Network Map (with subnet management) and leading IPv6 capabilities."
  • Failover with ISC DHCP – "Starting with version 3.0, the ISC DHCP server offered failover capabilities that allow network administrators to offer a more robust DHCP service. A failover setup requires a little care, but it’s fairly straightforward to implement."
  • ratproxy – Project Hosting on Google Code – "A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex web 2.0 environments."
  • BigAdmin Feature Article: Patching Best Practices for the Solaris 10 OS (With Sam the Sysadmin) – "This Solaris 10 Patching Best Practices Course Reference Guide is a supplement to the web-based training course WS-2700-S10: Solaris 10 Patching Best Practices. The guide presents the key concepts of the course but it does not contain all the content presented in the course itself. The guide is intended to be used as a reference and refresher after having completed the online course."
  • vCenter Client Shortcuts – Keyboard shortcuts for the VMware vCenter (formerly Virtual Infrastructure) Client.
  • DMZ Virtualization with VMware Infrastructure – "As virtualization of network DMZs becomes more common, demand is increasing for information to help network security professionals understand and mitigate the risks associated with this practice. This paper provides detailed descriptions of three different virtualized DMZ configurations and identifies best practice approaches that enable secure deployment."

Viewing all articles
Browse latest Browse all 4

Trending Articles