Welcome to Maxi‑Pedia. We are dedicated to providing expert and practical knowledge, and answers to your intriguing questions. Maxi‑Pedia: Your trusted resource for finance and IT!



FollowSymLinks

FollowSymLinks is a directive in your web server configuration that tells your web server to follow so called symbolic links. As one would expect, FollowSymLinks is an acronym for Follow Symbolic Links. FollowSymLinks is a very important setting that plays a role in your website security.

.


ISO 27001 (ISO/IEC 27001:2005)

ISO 27001 is a standard providing model for an implementation of an effective Information Security Management System (ISMS). ISO 27001 is also known under its more precise name ISO/IEC 27001:2005 and is closely related to another norm known under the name ISO 27002. Both ISO 27001 and ISO 27002 are together the standards that are used by organizations to implement systems to improve the security of their information and data.

.


Grid computing - distributed computing

Grid computing can be defined as a type of parallel and distributed system that enables sharing, selection, and aggregation of geographically distributed autonomous resources. Grid resources are assigned dynamically at runtime depending on their availability and capability.

.


ISMS Information Security Management System

ISMS is short for Information Security Management System. ISMS is a documented system to provide security for information and data in your company. ISMS is a vital management concept in today's information intensive businesses. The goal of ISMS is to eliminate possible loss or destruction of information.

.


Blade server

Blade server or a blade-server system is a self-contained system including a number of computer units designed for high-performance and high-capacity computing. A blade server can be seen as a bare-bones stripped-down computer. A blade server is a solution suitable for applications needing a lot of computing horse power.

.


How to find MAC and IP addresses in network data

How easy is it to obtain MAC address and IP address from wireless network traffic? We have asked this question and now provide this writeup to demonstrate how vulnerable MAC addressing is as a security measure. Even though the number of users protecting their wireless networks with the MAC filtering technique as the only measure is decreasing, there are still many of them.

.


How to set up and configure WPA-PSK in Windows?

Setting up and configuring WPA security depends on the scale of your network and the robustness of security that is sought to be implemented. Setting up WPA for a large corporation that most likely involves also authentication services is a different story than setting up WPA for a small business or home network. Enabling WPA for your home or small business network can be accomplished relatively easy. This page describes setting up WPA-TKIP in Windows with emphasis on Windows XP.

.


Secure your WLAN (wireless security tutorial - part 4)

Implementing the proper wireless security standard, devising a sound wireless architecture plan, and setting up a VPN and tunneling protocols is a very good way to tackle the task of keeping your wireless network and data secure. There are even more wireless security configurations that can be done to strengthen your security even further.

.


IPSec, VPN, architecture (wireless security tutorial - part 3)

IPSec, VPN, and wireless architecture are the words that take wireless network security to the next level. Securing your wireless network is as important as having a good lock on your office door. Getting data or services from unsecured (open) networks is very easy, and breaking into WEP secured networks is fairly accomplishable. The current wireless security WPA and WPA2 standards provide relatively good security layer; however, it is only a matter of time before the community of hackers develops approaches to get into WPA networks as well.

.


WPA and WPA2 (Wi-Fi security tutorial - part 2)

WPA (or Wi-Fi Protected Access) is today the security standard in wireless networking that is rapidly replacing the older WEP (Wired Equivalency Privacy) standard. WPA and its younger sibling WPA2 are newer standards based on the IEEE 802.11i ratified amendment set out to improve some of the disadvantages of WEP. This wireless security standard is playing today a vital role in the security of wireless networks.

.
.