I think Marcellus’s blog is the most useful to other because he can explain the complicated idea in a way I am able to understand. The well-structured writing can make people read his blog easily and the writing style he used also people read in a joyful feeling. His blog not only cover topic inContinue reading “RES701 Most useful Blog”
Author Archives: Albert
Lab 16: Backup and Recovery
Before using the windows server backup, I have setup a Hyper-V virtual machine on target computer and install the software of Windows Server Backup on both domain controller and domain member computer. First, created a virtual hard disk on a Hyper-V virtual machine, these steps are strict forward, just created a virtual hard disk andContinue reading “Lab 16: Backup and Recovery”
Lab 15: Data Encryption
In the lab, I establish an encrypted drive on the computer by using bitlocker. First, using group policy management to create GPO in the domain computer, plabwin810, this can set the security filtering on the target computer. After enable the functionality of bitlocker on the target computer, I have created a new partition on theContinue reading “Lab 15: Data Encryption”
Lab 14: Implementing DNSSEC
The Domain Name System Security Extensions (DNSSEC) is using public key cryptography to increase the security during user requesting IP address for a server for the DNS name space. It allows DNS zone to be digitally singed to protects it from attacks and improve the security of the DNS environment. In the DNSSEC, it involvesContinue reading “Lab 14: Implementing DNSSEC”
Lab 13: Implementing a Network Policy Server
In the lab exercise, I have used the network policy server to setup the Radius clients for implementing a network policy server. During the setup process, I have come across several step, one of them are selecting the authentication methods. As the default setting of the authentication method are extensible authentication protocol (EAP)and Microsoft encryptedContinue reading “Lab 13: Implementing a Network Policy Server”
Lab 12: Wi-Fi Access Point Security
Introduction Network security is very important every organization to provide a safe, stable and reliable for internet connection by wireless network. The level of security varies in different organization by the way they use the network and the number of users in the organization. The most comment are needed to consider for Wi-Fi network securityContinue reading “Lab 12: Wi-Fi Access Point Security”
Lab 11: Firewall Rule Based Management
While visiting website, Hypertext Transfer Protocol (HTTP) is used to send and receive data from the server. The general port used for HTTP is port number 80. An extension version of HTTP is Hypertext Transfer Protocol Secure (HTTPS). The data during commutation is a encrypted to increase the security and usually using port number 443.Continue reading “Lab 11: Firewall Rule Based Management”
Lab 10: Implementing NAT and OpenSSH
Network Address Translation (NAT) translate internet address to private address. Because there are limited number of internet TCP/IP addresses, so many devices on the private network can use only one access point to connect to the internet. In this is setting, all the devices will have a single public IP address and usually the routerContinue reading “Lab 10: Implementing NAT and OpenSSH”
Lab 9: Managing Certificates
To maintain secure network connection, public key infrastructure (PKI) usually used to maintain the security of the data transfer by the network and very useful in many commerce areas such as e-commerce and internet banking and sending email. In the PKI involve different roles, software and digital certificates need to be created, distributed and storedContinue reading “Lab 9: Managing Certificates”
RES701 Blog READING ACADEMIC PAPERS
Research article I have selected to read is colorectal cancer (CRC) research paper published in 2011 (Ho et al 2011). The author of this paper is a group of researcher or doctor working in university and Hospital in Hong Kong. The title of the paper is “Replication study of SNP associations for colorectal cancer inContinue reading “RES701 Blog READING ACADEMIC PAPERS”