Informations technologies
All about informations technologies
Saturday, January 30, 2021
Odoo 14 requirements installation - the easy way !!! one command solution !!!
›
To install odoo 14 requirements (python 3 libraries ) you need a lot off work , installing other dev headers to compile python code source...
Wednesday, April 27, 2016
How an IDS Works
›
Now that we have looked at some of the capabilities of an IDS as far as alerting on malicious traffic, it’s time to take a closer look at w...
Tuesday, April 26, 2016
Creating a Strong Firewall Security Policy:in checkpoint firewall product
›
Using the Firewall Rule Base The firewall is the core of a well-defined network security policy. The goal of the Check Point Firewall Rule ...
SOFTWARE-DEFINED PROTECTION Modern security architecture powered by collaborative intelligence
›
Business today is driven by free-flowing information. Corporate data travels through the cloud and mobile devices and radiates through idea...
Tuesday, February 10, 2015
GHOST critical liux security hole
›
Description Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allow...
›
Home
View web version