Tags » IT Security

Tech Terms: Web Services

The term Web services describes a standardized way of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol backbone. 188 more words

ZEROFAIL Southeast

Tech Terms: Data Center Container

Also called a modular data center or data center-in-a-box. A data center container is a method of deploying data centers that is designed to add data center capacity and to reduce an organization’s cooling and power consumption costs. 111 more words

ZEROFAIL Southeast

Outsourcing IT Security: Is it worth the RISK?

In this fast changing world, most companies now integrate IT into their organization. So how will the company protect its highly sensitive data against attacks and damages? 52 more words

IT Security

Should Companies Outsource IT Security?

Should a company outsource Information Technology (IT) security?  My personal opinion is that it would pose a lot of risk on the part of the company to outsource their IT security to other service providers. 35 more words

IT Security

Tech Terms: Data Center Tiers

A four tier system that provides a simple and effective means for identifying different data center site infrastructure design topologies. The Uptime Institute’s tiered classification system is an industry standard approach to site infrastructure functionality addresses common benchmarking standard needs. 91 more words

ZEROFAIL Southeast

Function introduction: Disabling screenshots on iOS

CACHATTO’s ‘Screen Capture Disabled’ function prevents screenshots to be taken on mobile devices.

On iOS devices, screenshots are disabled after installing CACHATTO; on Android devices, screenshots are disabled whenever CACHATTO application is on-screen, but is enabled when CACHATTO is closed or running in the background. 117 more words

Knowledge Base

Kali Linux Day 2: Information Gathering tool: DMitry

What is DMitry?

DMitry or (Deepmagic Information Gathering Tool) is a tool found in Kali Linux that automates some of the commonly used methods in order to gather information about a specific host or target. 611 more words

Blog