Informations technologies

All about informations technologies

Saturday, January 30, 2021

Odoo 14 requirements installation - the easy way !!! one command solution !!!

›
To install odoo 14 requirements (python 3 libraries )  you need a lot off work , installing  other dev headers to compile python code source...
Wednesday, April 27, 2016

How an IDS Works

›
Now that we have looked at some of the capabilities of an IDS as far as alerting on malicious traffic, it’s time to take a closer look at w...
Tuesday, April 26, 2016

Creating a Strong Firewall Security Policy:in checkpoint firewall product

›
Using the Firewall Rule Base The firewall is the core of a well-defined network security policy. The goal of the Check Point Firewall Rule ...

SOFTWARE-DEFINED PROTECTION Modern security architecture powered by collaborative intelligence

›
Business today is driven by free-flowing information. Corporate data travels through the cloud and mobile devices and radiates through idea...
Tuesday, February 10, 2015

GHOST critical liux security hole

›
Description  Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allow...
›
Home
View web version

about me ?

My photo
ibrahim debeche
Information Technologies professionnel
View my complete profile
Powered by Blogger.