Monthly Archive: June 2017

0

How To Install and Configure MongoDB NoSQL Database To Linux, Ubuntu, Debian, CentOS, Fedora

Sql is very powerful language to query, insert, delete, modify data. Recents years the IT industry have developed some alternative ways to store and retrieve data. NoSQL type database servers become very popular. MongoDb is an NoSQL database server to store and retrieve data. In this tutorial we will look...

0

Security Roles and Responsibilities In Security Governance

Security role is the part where an individual plays in a complete organization security implementation and administration. In this tutorials different security roles and responsibilities in an organization. Senior Manager Senior Manager is responsible for all organization security. Senior Manager will have following roles and responsibilities Sign off all policy...

0

Alignment of Security Function To Strategy, Goals and Mission

Security management policy will contain following security policy related steps; Security Policy Creation Security Policy Implementation Security Policy Enforcement every organization have some strategy, goals, mission and objectives. Security management planning will align security function with these. While creating a security plan there are things we should be aware and...

0

Introduction To Security Governance with CIA – Confidentiality , Integrity, Availibility

Security Governance are implemented with management concepts, security policies, implementation etc. While working with these items we need some parameters to understand and describe security in IT environment. There is CIA which is actually the synonym of Confidentiality , Integrity and Availability . These are used to define the level and status of...

0

Linux Bash Exec Command Tutorial with Examples To Execute Command

Linux bash provides different commands for daily usage. execcommand is mainly used to run commands in a bash environment. We can also provide parameters to this command. Syntax Syntax of exec command is like below.

Run Program or Script Directly Without using exec we can run programs and scripts too....

2

Linux Ulimit Command Tutorial with Examples To Increase Open File Limit

Linux kernel provides some configuration about system related limits and maximums. These are like maximum file handler count, maximum file locks, maximum process count etc. These limits are used to stay in safe area and do not bottleneck system performance. But sometimes these limits should be decreased or increased. ulimit is...

0

Windows Mstsc Command Tutorial with Examples To Connect Remote Systems with Remote Desktop Protocol

Windows operating systems generally managed with RDP remotely. RDP or Remote Desktop Protocol Provides graphical remote management capabilities. Windows operating systems provides a tool named Remote Desktop Connection . This tool can be invoked with mstsc command. In this tutorial we will look different features of Terminal Server Connection or mstsc. Start...

0

Linux Chmod Command Tutorial with Examples To Change Permission of Files and Folders

chmod command is used to change access permission of files and directories in Linux operating systems. chmod stands for change mode. Access permissions specifies whether a user account or group can read, write or execute given file and directory. Syntax Syntax of chmod command is like below.

Roles While managing access...

Enjoy this blog? Please spread the word :)