Lab 16: Backup and Recovery

Before using the windows server backup, I have setup a Hyper-V virtual machine on target computer and install the software of Windows Server Backup on both domain controller and domain member computer. First, created a virtual hard disk on a Hyper-V virtual machine, these steps are strict forward, just created a virtual hard disk andContinue reading “Lab 16: Backup and Recovery”

Lab 14: Implementing DNSSEC

The Domain Name System Security Extensions (DNSSEC) is using public key cryptography to increase the security during user requesting IP address for a server for the DNS name space. It allows DNS zone to be digitally singed to protects it from attacks and improve the security of the DNS environment. In the DNSSEC, it involvesContinue reading “Lab 14: Implementing DNSSEC”

Lab 13: Implementing a Network Policy Server

In the lab exercise, I have used the network policy server to setup the Radius clients for implementing a network policy server. During the setup process, I have come across several step, one of them are selecting the authentication methods. As the default setting of the authentication method are extensible authentication protocol (EAP)and Microsoft encryptedContinue reading “Lab 13: Implementing a Network Policy Server”

Lab 12: Wi-Fi Access Point Security

Introduction Network security is very important every organization to provide a safe, stable and reliable for internet connection by wireless network. The level of security varies in different organization by the way they use the network and the number of users in the organization. The most comment are needed to consider for Wi-Fi network securityContinue reading “Lab 12: Wi-Fi Access Point Security”

Lab 11: Firewall Rule Based Management

While visiting website, Hypertext Transfer Protocol (HTTP) is used to send and receive data from the server. The general port used for HTTP is port number 80. An extension version of HTTP is Hypertext Transfer Protocol Secure (HTTPS). The data during commutation is a encrypted to increase the security and usually using port number 443.Continue reading “Lab 11: Firewall Rule Based Management”

Lab 10: Implementing NAT and OpenSSH

Network Address Translation (NAT) translate internet address to private address. Because there are limited number of internet TCP/IP addresses, so many devices on the private network can use only one access point to connect to the internet. In this is setting, all the devices will have a single public IP address and usually the routerContinue reading “Lab 10: Implementing NAT and OpenSSH”

Lab 9: Managing Certificates

To maintain secure network connection, public key infrastructure (PKI) usually used to maintain the security of the data transfer by the network and very useful in many commerce areas such as e-commerce and internet banking and sending email. In the PKI involve different roles, software and digital certificates need to be created, distributed and storedContinue reading “Lab 9: Managing Certificates”

RES701 Blog READING ACADEMIC PAPERS

Research article I have selected to read is colorectal cancer (CRC) research paper published in 2011 (Ho et al 2011). The author of this paper is a group of researcher or doctor working in university and Hospital in Hong Kong. The title of the paper is “Replication study of SNP associations for colorectal cancer inContinue reading “RES701 Blog READING ACADEMIC PAPERS”

Design a site like this with WordPress.com
Get started