• What is Cloud Asset Management (CAM)?
    Gone are times, when companies used to have their own large computer networks doing everything themselves. They had to buy all of their servers, all of their networking appliances. They needed the physical space on premises for all of their datacenters... Now CLOUD has changed all that. Today, except their LANs, companies can literally build everything else on cloud. Practically, more...

    Read More

    Like
    2
    4 Answers 0 Shares
  • What is DevSecOps?
    Do you remember those times when IT companies used to release their Software or operating systems once in a while? For example, there were considerable gaps of years between the releases of Windows 97, 98, NT, XP, Vista, Windows 7, 8, etc . Similar practices were norm-of-the-day in case of all sorts of software/applications from most vendors... It was so because it provided enough time...

    Read More

    Like
    4
    3 Answers 0 Shares
  • What is Sandboxes?
    Sandboxes provide ideal, secluded environments to screen certain malware types without giving that malware a chance to spread. Based on the observed behavior, the samples can then be classified as harmless, malicious, or “needs a closer look.” Running programs in such a secluded environment is referred to as sandboxing and the environment the samples are allowed to run in are...

    Read More

    Like
    Yay
    2
    1 Answers 0 Shares
  • Love
    Yay
    Angry
    3
    3 Answers 0 Shares
  • አርዲ ቻት ቦት
    ቀደምቷ አርዲ ለዲጂታል መስተንግዶውም ቀደምት እና ቀልጣፋ ናት!አገልግሎቶቻችንን በተመለከተ ለጥያቄዎ ፈጣን ምላሽ፣ ጥቅሎች መግዛት፣ የሂሳብ መረጃ መጠየቅንና ሌሎች አገልግሎቶችን በ5 ቋንቋዎች በማንኛውም ጊዜ እና ሰዓት በምቾት ልታስናግድዎ ዝግጁ ነች፤ ከደንበኞች አገልግሎት ባለሙያዎቻችን ጋርም ታገናኝዎታለች!በድረገፅ - ethiotelecom.et/በፌስቡክ - Ethio telecom እና በትዊተር - twitter.com/ethiotelecom በመልዕክት መላኪያ ላይበዋትስዓፕ - wa.me/251994000000?textበቴሌግራም - t.me/EthiotelecomChatBot አርዲን...

    Read More

    Like
    Yay
    7
    5 Answers 5 Shares
  • 5 alternative Operating Systems for PC In Addition to Windows OS.
    I, being a die-hard fan of the Windows OS, have seldom opted for any other operating system so far. However, this is my choice. In reality, there are several other alternative operating systems to the Windows OS which you can try. Some are well-known and developed by large corporations, while some are small projects by hobbyists. Alternative Operating Systems for PC We have listed...

    Read More

    Like
    1
    3 Answers 0 Shares
  • 5 Common Authentication Types
    1. Password-based authentication Passwords are the most common methods of authentication. Passwords can be in the form of a string of letters, numbers, or special characters. To protect yourself you need to create strong passwords that include a combination of all possible options. However, passwords are prone to phishing attacks and bad hygiene that weakens effectiveness. An average person...

    Read More

    Like
    3
    0 Answers 0 Shares
  • ABDULGAFFAAR WALEENSO
    Teelee brriin dhugaa cimaadha

    Read More

    0 Answers 0 Shares
  • Address Resolution Protocol (ARP)
    Address Resolution Protocol (ARP) ARP (Address Resolution Protocol) is a Layer 2 Protocol. Layer 2 uses Physical addresses (MAC addresses) and Layer 3 uses Logical addresses (IP Addresses) for the communication. ARP Protocol is used to discover the MAC Address of a node associated with a given IPv4 Address. This important duty...

    Read More

    Yay
    Like
    3
    4 Answers 0 Shares
  • Advantage and Disadvantages Of Firewalls
    Every security device has advantages and disadvantages and firewalls are no different. If we applied strict defensive mechanisms into our network to protect it from breach, then it might be possible that even our legitimate communication could malfunction, or if we allow entire protocol communications into our network, then it can be easily hacked by malicious users. So, we should maintain a...

    Read More

    Like
    Love
    Yay
    3
    0 Answers 0 Shares
More Results