Block
- IT Technician at Jimma
- Lives in Jimma
- From Jimma
- Followed by 99 people
tele Badges






- What is IoT?It is Internet of Things. It is about things, I mean, devices... IoT is a term which is used to describe a system of interconnected computing devices that use the internet to send/receive data without human intervention or coordination. Internet of Things (IoT) basically encompasses a wide variety of technologies, vendors, and connectivity methods. While cameras, smart kitchen appliances...
Read More
- What is Datacenter Security?Datacenter security is an assortment of technological and physical measures which are used to protect a datacenter's assets and resources, thereby shielding it from all sorts of internal and external threats. You should always design a comprehensive security plan that covers all important aspects of your datacenter, e.g., the networks, servers, power-systems, and the DATA and the PROCESSES...
Read More
- What is DEVSECOPSDo you remember those times when IT companies used to release their Software or operating systems once in a while? For example, there were considerable gaps of years between the releases of Windows 97, 98, NT, XP, Vista, Windows 7, 8, etc . Similar practices were norm-of-the-day in case of all sorts of software/applications from most vendors... It was so because it provided enough time...
Read More
- Advantage and Disadvantages Of FirewallsEvery security device has advantages and disadvantages and firewalls are no different. If we applied strict defensive mechanisms into our network to protect it from breach, then it might be possible that even our legitimate communication could malfunction, or if we allow entire protocol communications into our network, then it can be easily hacked by malicious users. So, we should maintain a...
Read More
- What Is Critical Infrastructure?Critical infrastructure refers to any virtual or physical networks, systems, and assets critical to a nation that their destruction or incapacitation would harm that national security, public health and safety, economy, or any combination of those. Each nation's critical infrastructure faces threats from various quarters. These include nature (floods, quakes, tornadoes), people (hackers,...
Read More
- How Does a DNS Work?Every time when you type an address of a website into your browser, the following things happen: 1. A DNS server is contacted. Your computer must reach out to the DNS server (DNS Resolver) for more information. 2. The DNS looks up a numerical address. Computers understand server addresses made up of numbers and dots only. If you've never searched for this site before, your computer will ask...
Read More
-
- Category of cloud services.(IaaS) Infrastructure as a service (IaaS) is the most flexible category of cloud services, as it provides you with the maximum amount of control for your cloud resources. In an IaaS model, the cloud provider is responsible for maintaining the hardware, network connectivity (to the internet), and physical security. You’re responsible for everything else: operating system installation,...
Read More
- DevOps vs DevSecOps: Key DifferencesCriteria DevOps DevSecOps Focus Streamlines the collaboration between software development (Dev) and IT operations (Ops). Adds a security (Sec) dimension to the DevOps approach, integrating security aspects at all software development and operation stages. Culture and Team Involvement Encourages collaboration between development and operations teams. Promotes collaboration among...
Read More
- The CIA TriadWhen talking about cybersecurity, one might wonder “What are we trying to protect ourselves against?” Well, there are three main aspects we are trying to control, name: ~~) Unauthorised Access ~~) Unauthorised Deletion ~~) Unauthorised Modification The CIA Triad The CIA triad is also commonly referred to as the three pillars of security and most of the security policies of...
Read More
More Stories
© 2025 teleforum