LAMP Basic on Ubuntu 16.04. Short Essential Version

LAMP (Basic) on Ubuntu 16.04. Short Essential Version LAMP (Linux, Apache, MySQL, PHP) The more detailed version of this LAMP (Basic) Installation on Ubuntu 16.04 Server can be found here… Basic Server Configuration Set root password Enter sudo password, then new root password twice at each prompt Update Ubuntu 16.04 Check and Edit Network Configuration Restart Network Service Log Into… Read More »

Greg Palmer

LAMP Basic Installation on Ubuntu 16.04 Server

LAMP (Basic) Installation on Ubuntu 16.04 Server LAMP is a very popular server configuration already covered by countless tutorials and HowTo’s readily found with a basic web search. The following tutorial was constructed on request from several colleagues and fellow students who want to setup a basic LAMP server for lab, or home use. YES, I am well aware… Read More »

Greg Palmer

Routing Protocols. RIP, EIGRP, OSPF, IS-IS

Routing protocols are used to establish a path between routers. The most common routing protocols used are: Routing Information Protocol (RIP), Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF), and Intermediate System to Intermediate System (IS-IS). Which protocol to use with a Local Area Network (LAN) depends on the following Factors: Administrative cost of management. Administrative… Read More »

Greg Palmer

IDS / IDPS Detection Methods. Anomaly, Signature, and Stateful Protocol Analysis

IDS and IDPS detection methods include: anomaly detection, signature detection, and a newer method named stateful protocol analysis. Anomaly detection works using profiles of system service and resource usage and activity. The IDS/IDPS starts by creating a baseline also known as a training period. This baseline is used to compare to current usage and activity as a way to… Read More »

Greg Palmer

Bastion Host Overview

A Bastion Host (BH) is a computer on a network perimeter which is running a hardened Operating System (OS). This protection includes patches, authentication, encryption, and eliminates unnecessary software and services  (Weaver, Weaver, Farwood, & Weaver, 2012). Weaver et al.’s (2012) provides the following list of BH characteristics: A machine with adequate memory and processor speed. All patches… Read More »

Greg Palmer

Security+ Terms and Acronyms

Terms and Acronyms Used in Security+ Term Acronym Triple Digital Encryption Standard 3DES  Authentication, Authorization and Accounting AAA Access Control List ACL Advanced Encryption Standard AES Advanced Encryption Standards 256-bit AES256  Authentication Header AH  Annualized Loss Expectancy ALE  Access Point AP Application Programming Interface API Advanced Persistent Threat APT Annualized Rate of Occurrence ARO  Address Resolution Protocol ARP… Read More »

Greg Palmer

Security+ SY0-401 General Information & Characteristics

Security+ General Information The CompTIA Security+ Certification is often a first step towards more advanced security certifications.   About The CompTIA Security+ certification is a vendor-neutral, internationally recognized credential used by organizations and security professionals around the globe to validate foundation level security skills and knowledge. Candidates are encouraged to use this document to help prepare for CompTIA  security+… Read More »

Greg Palmer

Workload Distribution and Resource Pooling Architecture

Workload Distribution and Resource Pooling Architecture Cloud architects must implement several concepts and best practices to build highly scalable applications. These concepts are critical because of expanding datasets, unpredictable traffic patterns, and the demand for faster response times. Two common foundational cloud architecture models are workload distribution architecture, and resource pooling architecture.   Workload Distribution Architecture Workload distribution… Read More »

Greg Palmer

The Process of Migrating an Application to the Cloud

The Process of Migrating an Application to the Cloud Applications can be moved to the cloud quickly with little problem if the migration is planned correctly. The process of constructing a plan for migrating a system to the cloud generally includes the following steps: Define the system goals and requirements. This process includes considering several factors such as… Read More »

Greg Palmer

The Benefits & Disadvanatges of Mobile Cloud Computing

Benefits of Mobile Cloud Computing It has been estimated that within the next few years mobile computing using cloud-based systems will become a trillion dollar business. Currently, it is not clear whether mobile computing is driving the growth of cloud-based systems or vice versa. Either way most businesses understand that it is critical to have a mobile computing… Read More »

Greg Palmer