Jul 26, 2022Guide to Device Link(Connection) MonitoringWhen working in a large enterprise or Telecom network, the most difficult part of diagnostics, is finding where the fault happened on the network. Different network-device vendors like Cisco, HP and more, provide policy configurations on their devices that provide a top-level view on the complete network. Policies by different…Cisco3 min readCisco3 min read
Feb 2, 2022Detecting Sweet32 vulnerability in a Web-ApplicationIntroduction: Protocols like TLS and OpenVPN commonly use block cipher algorithms, such as AES, Triple-DES or 3DES or Blowfish, to encrypt data between clients and servers.Ciphers such as Triple-DES and Blowfish use a block size of 64 bits, whereas AES uses a block size of 128 bits. …Cybersecurity3 min readCybersecurity3 min read
Jun 30, 2021Achieve 99%+ Uptime in a Distributed EnvironmentDistributed Software Development (DSD) has evolved, resulting in an increase in the application uptime and better User Request Handling. Organizations now tend to make greater development efforts in more attractive geographical zones or deploy directly on-premise. …Software3 min readSoftware3 min read