SecurityCentric is your source for Blog Aggregation in the Security industry

Learn Ethical Hacking & Get free hacking tools and softwares

View This Blog Frequency: 0.0 posts / day

 

Download Decryption Tool for WannaCry Ransomware - Unlock Files

 Mark As Read    

Download Decryption Tool for WannaCry Ransomware - Unlock Files Since the WannaCry ransomware ripped through the internet late last week, infecting hundreds of thousands of machines and locking up critical systems from health care to transportation, cryptographers have searched for a cure. Finding a flaw in WannaCry’s encryption scheme, after all,...

Ransomware – The next level of Cybersecurity - Deadliness

 Mark As Read    

What would you do if today you found out that cybercriminals had managed to infect your computer with malware that has encrypted all your files? Would you pay to get them back, and if so, how much are you willing to spend? Five times or more amount ?? What if you are in charge of a company server on which all your organization’s intellectual prope...

What is Serve Humanity Serve God ? Who are We ?

 Mark As Read    

What is Serve Humanity Serve God ? Who are We ? Serve Humanity Serve God is a team of volunteers provides help to those poor and needy patients who cannot afford to pay for their medical treatment. “We ‘adopt’ these people and help them with everything they need — be it a Dialysis, an MRI, a CT Scan, Provide free medicines, an operation, or anythi...

IBM Smart City Solutions - Rashtrapati Bhavan would be transformed into a smart township

 Mark As Read    

IBM to transform Rashtrapati Bhavan into smart township Rashtrapati Bhavan would be transformed into a smart township with the help of IBM Smart City Solutions.IBM on Thursday announced that its smart city solutions have been deployed for the digital transformation of the Presidential Estate. “Spread across 330 acres of land and home to over 5,000 ...

Types Of Routing Tables In Junos

 Mark As Read    

Juniper Network Operating System (JUNOS) maintains different types of routing tables for clear separation of different types of routes. Each routing table populates a portion of forwarding table and thus the forwarding table is partitioned based on routing table. The routing table in Juniper Network Operating System or JUNOS contains all the inform...

Juniper JET Automation Framework

 Mark As Read    

JET is a framework which means all the features ties together that enables JUNOS to be more open and programmable.There are four big components of JET1. Python: Python 2.7.8 is supported on all JUNOS devices. By using Python users can develop and execute Python scripts on JUNOS.2. JSON: JSON is popular data exchange program because of it’s simplici...

IBM AND EVRY With a Billion Kroner Partnership - TO BUILD A COMMON CLOUD DATA CENTRE

 Mark As Read    

IBM AND EVRY With a Billion Kroner Partnership TO BUILD A COMMON CLOUD DATA CENTER Global cloud platform on Norwegian soil EVRY has enticed IBM to invest several billion kroners in a super center at Fet. Hence, Norway is connected to the world’s sole global cloud infrastructure. - This is an extremely important partnership for us, says Matt Mi...

Save the Internet: Tell TRAI We Need Network Neutrality

 Mark As Read    

Save the Internet: Tell TRAI We Need Network Neutrality Emails should be sent to advqos@trai.gov.in Please bcc us at netneutrality59@gmail.com & mail@amarjit.info We will try to ensure that your response is acknowledged by TRAI. Click Here for Email Format The purpose is to assist supporters of strong net neutrality in articulating the...

Nmap Project Seeking Talented Programmers for Google Summer of Code

 Mark As Read    

Nmap Project Seeking Talented Programmers for Google Summer of Code Hi folks. I'm delighted to report that Nmap has been accepted by Google to participate in this year's Summer of Code internship program. This innovative and extraordinarily generous program provides $5,500 stipends to college and graduate students anywhere in the world who spend ...

How To - Layer 3 Routing Loop Poblem - Split Horizon and Route Poisoning

 Mark As Read    

Most of the time, I always be a part of layer 2 routing loop discussion but never heard about the engineers talking about layer 3 routing loop problem. This is being experienced during my recent visit in some company where all engineers knows why to use Spanning Tree Protocol but none of them knew why to use split horizon and route poisoning. In l...

Switching Interview Questions - Layer 2 Interview Questions

 Mark As Read    

Switching Interview Questions - Layer 2 Interview Questions After IGP, BGP and MPLS interview question, Now I am adding switching basic questions. Please read the below questions:- 1. Difference between hub, bridge and switch? 2. What is mac address and why it is required? 3. In layer 2 domain do we need ip address for communication? 4. What is a...

MPLS Interview Questions for CCNA and CCNP Engineers

 Mark As Read    

MPLS Interview Questions for CCNA and CCNP Engineers After IGP and BGP questions, I prepared basic list of MPLS interview questions which could help you to clear your next level. In the up coming post, I will be covering switching. Below is the list of questions:- 1. What is the difference between VPN and MPLS? 2. What is MPLS and why it is being...

BGP Interview Questions - Interview Questions for BGP

 Mark As Read    

BGP Interview Questions - Interview Questions for BGP After IGP interview questions, I am posting BGP interview questions for CCNA and CCNP engineers. These questions are very basic and easy but during interview time no one knows how these will be asked by interviewer. So a good practice is to read it as much as we can so that we could provide the...

Security
Welcome!
SecurityCentric aggregates blogs for the Security industry.
Custom Feeds
Add any RSS feed to the information you read daily.
Blocked Feeds
Block feeds to remove blogs you’re not interested in.
Account Settings
Customize the site by adding or removing feeds.

About Us

SecurityCentric is your source for all your Security news.

Have a Suggestion for Us?
Know of a Security blog that we're missing? Let us know!

Share SecurityCentric.com