ºÝºÝߣshows by User: masterubaid / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: masterubaid / Fri, 16 Dec 2016 12:37:46 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: masterubaid Requirement for creating a Penetration Testing Lab /slideshow/requirement-for-creating-a-penetration-testing-lab/70203072 requirementforcreatingapentestlab-161216123746
This document has been prepared in order to develop a good Penetration Testing and Vulnerability Assessment Lab. The document contains Hardware requirements, our manual & automated Software requirements, approaches for Performing Penetration testing. Further, this document is design to make a Penetration test LAB in order to simulate the vulnerabilities in the testing environment and to execute the vulnerability assessment & penetration testing from the LAB by providing the Static IP to the Client, ensuring that the test is being performed from a valid/legitimate link.]]>

This document has been prepared in order to develop a good Penetration Testing and Vulnerability Assessment Lab. The document contains Hardware requirements, our manual & automated Software requirements, approaches for Performing Penetration testing. Further, this document is design to make a Penetration test LAB in order to simulate the vulnerabilities in the testing environment and to execute the vulnerability assessment & penetration testing from the LAB by providing the Static IP to the Client, ensuring that the test is being performed from a valid/legitimate link.]]>
Fri, 16 Dec 2016 12:37:46 GMT /slideshow/requirement-for-creating-a-penetration-testing-lab/70203072 masterubaid@slideshare.net(masterubaid) Requirement for creating a Penetration Testing Lab masterubaid This document has been prepared in order to develop a good Penetration Testing and Vulnerability Assessment Lab. The document contains Hardware requirements, our manual & automated Software requirements, approaches for Performing Penetration testing. Further, this document is design to make a Penetration test LAB in order to simulate the vulnerabilities in the testing environment and to execute the vulnerability assessment & penetration testing from the LAB by providing the Static IP to the Client, ensuring that the test is being performed from a valid/legitimate link. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/requirementforcreatingapentestlab-161216123746-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This document has been prepared in order to develop a good Penetration Testing and Vulnerability Assessment Lab. The document contains Hardware requirements, our manual &amp; automated Software requirements, approaches for Performing Penetration testing. Further, this document is design to make a Penetration test LAB in order to simulate the vulnerabilities in the testing environment and to execute the vulnerability assessment &amp; penetration testing from the LAB by providing the Static IP to the Client, ensuring that the test is being performed from a valid/legitimate link.
Requirement for creating a Penetration Testing Lab from Syed Ubaid Ali Jafri
]]>
4127 4 https://cdn.slidesharecdn.com/ss_thumbnails/requirementforcreatingapentestlab-161216123746-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers /slideshow/securing-pos-terminal-a-technical-guideline-on-securing-pos-system-from-hackers/69909840 technicalguidelinesonpos-161207111545
This document describes a technical Guidelines on how to secure a POS System from hackers. The document highlights the testing/controls which could be tested on a PoS machines. this checklist provides an initials level of security to the Pos Device. ]]>

This document describes a technical Guidelines on how to secure a POS System from hackers. The document highlights the testing/controls which could be tested on a PoS machines. this checklist provides an initials level of security to the Pos Device. ]]>
Wed, 07 Dec 2016 11:15:45 GMT /slideshow/securing-pos-terminal-a-technical-guideline-on-securing-pos-system-from-hackers/69909840 masterubaid@slideshare.net(masterubaid) Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers masterubaid This document describes a technical Guidelines on how to secure a POS System from hackers. The document highlights the testing/controls which could be tested on a PoS machines. this checklist provides an initials level of security to the Pos Device. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/technicalguidelinesonpos-161207111545-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This document describes a technical Guidelines on how to secure a POS System from hackers. The document highlights the testing/controls which could be tested on a PoS machines. this checklist provides an initials level of security to the Pos Device.
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers from Syed Ubaid Ali Jafri
]]>
611 7 https://cdn.slidesharecdn.com/ss_thumbnails/technicalguidelinesonpos-161207111545-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Review of network diagram /slideshow/review-of-network-diagram-60267874/60267874 reviewofnetworkdiagram-160331073458
This Document describes How to review a Network Architecture in context of Information security . It helps to identify the starting point for reviewing the components of network with respect to best practices. A Network Architecture Review is a review and analysis of relevant network artifacts (e.g. network diagrams, security requirements, technology inventory, DMZ).]]>

This Document describes How to review a Network Architecture in context of Information security . It helps to identify the starting point for reviewing the components of network with respect to best practices. A Network Architecture Review is a review and analysis of relevant network artifacts (e.g. network diagrams, security requirements, technology inventory, DMZ).]]>
Thu, 31 Mar 2016 07:34:58 GMT /slideshow/review-of-network-diagram-60267874/60267874 masterubaid@slideshare.net(masterubaid) Review of network diagram masterubaid This Document describes How to review a Network Architecture in context of Information security . It helps to identify the starting point for reviewing the components of network with respect to best practices. A Network Architecture Review is a review and analysis of relevant network artifacts (e.g. network diagrams, security requirements, technology inventory, DMZ). <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/reviewofnetworkdiagram-160331073458-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This Document describes How to review a Network Architecture in context of Information security . It helps to identify the starting point for reviewing the components of network with respect to best practices. A Network Architecture Review is a review and analysis of relevant network artifacts (e.g. network diagrams, security requirements, technology inventory, DMZ).
Review of network diagram from Syed Ubaid Ali Jafri
]]>
1309 6 https://cdn.slidesharecdn.com/ss_thumbnails/reviewofnetworkdiagram-160331073458-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Review of network diagram /masterubaid/review-of-network-diagram reviewofnetworkdiagram-160331072139
Network Architecture review in context of Information security helps to understand how to actually review the components of network with respect to best practices.]]>

Network Architecture review in context of Information security helps to understand how to actually review the components of network with respect to best practices.]]>
Thu, 31 Mar 2016 07:21:39 GMT /masterubaid/review-of-network-diagram masterubaid@slideshare.net(masterubaid) Review of network diagram masterubaid Network Architecture review in context of Information security helps to understand how to actually review the components of network with respect to best practices. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/reviewofnetworkdiagram-160331072139-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Network Architecture review in context of Information security helps to understand how to actually review the components of network with respect to best practices.
Review of network diagram from Syed Ubaid Ali Jafri
]]>
1346 4 https://cdn.slidesharecdn.com/ss_thumbnails/reviewofnetworkdiagram-160331072139-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OSI Layered based attacks /slideshow/osi-layered-based-attacks/45058040 osilayeredbasedattacks-150224015603-conversion-gate02
This Document highlights the information that contains in an OSI model, this document is tend to made with respective of Information security concerns. Here Each layer is mapped with the attacks that occurred on the network Information security professionals may also require this document.]]>

This Document highlights the information that contains in an OSI model, this document is tend to made with respective of Information security concerns. Here Each layer is mapped with the attacks that occurred on the network Information security professionals may also require this document.]]>
Tue, 24 Feb 2015 01:56:03 GMT /slideshow/osi-layered-based-attacks/45058040 masterubaid@slideshare.net(masterubaid) OSI Layered based attacks masterubaid This Document highlights the information that contains in an OSI model, this document is tend to made with respective of Information security concerns. Here Each layer is mapped with the attacks that occurred on the network Information security professionals may also require this document. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/osilayeredbasedattacks-150224015603-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This Document highlights the information that contains in an OSI model, this document is tend to made with respective of Information security concerns. Here Each layer is mapped with the attacks that occurred on the network Information security professionals may also require this document.
OSI Layered based attacks from Syed Ubaid Ali Jafri
]]>
594 1 https://cdn.slidesharecdn.com/ss_thumbnails/osilayeredbasedattacks-150224015603-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Final Year Projects Computer Science (Information security) -2015 /slideshow/final-information-security-projects/44870185 informationsecurityprojects-150219040543-conversion-gate01
Final Year Project Ideas for Computer Science Students, These Projects helps students to enhance their Expertise in the area of Information Security + they would be able to understand the concept of Information Security]]>

Final Year Project Ideas for Computer Science Students, These Projects helps students to enhance their Expertise in the area of Information Security + they would be able to understand the concept of Information Security]]>
Thu, 19 Feb 2015 04:05:43 GMT /slideshow/final-information-security-projects/44870185 masterubaid@slideshare.net(masterubaid) Final Year Projects Computer Science (Information security) -2015 masterubaid Final Year Project Ideas for Computer Science Students, These Projects helps students to enhance their Expertise in the area of Information Security + they would be able to understand the concept of Information Security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/informationsecurityprojects-150219040543-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Final Year Project Ideas for Computer Science Students, These Projects helps students to enhance their Expertise in the area of Information Security + they would be able to understand the concept of Information Security
Final Year Projects Computer Science (Information security) -2015 from Syed Ubaid Ali Jafri
]]>
23360 10 https://cdn.slidesharecdn.com/ss_thumbnails/informationsecurityprojects-150219040543-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data calling from web to C# /slideshow/data-calling-from-web-to-c/44863872 datacallingfromwebtoc-150219001035-conversion-gate01
Retrieving Data from a web into some Programming is complex task specially when interfacing a Real time Data into Application. This application is design to Get the Data from a Web Application into C# without any Reference or third party library]]>

Retrieving Data from a web into some Programming is complex task specially when interfacing a Real time Data into Application. This application is design to Get the Data from a Web Application into C# without any Reference or third party library]]>
Thu, 19 Feb 2015 00:10:34 GMT /slideshow/data-calling-from-web-to-c/44863872 masterubaid@slideshare.net(masterubaid) Data calling from web to C# masterubaid Retrieving Data from a web into some Programming is complex task specially when interfacing a Real time Data into Application. This application is design to Get the Data from a Web Application into C# without any Reference or third party library <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/datacallingfromwebtoc-150219001035-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Retrieving Data from a web into some Programming is complex task specially when interfacing a Real time Data into Application. This application is design to Get the Data from a Web Application into C# without any Reference or third party library
Data calling from web to C# from Syed Ubaid Ali Jafri
]]>
299 1 https://cdn.slidesharecdn.com/ss_thumbnails/datacallingfromwebtoc-150219001035-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android 2.0 - 4.0 HTML Vulnerable /slideshow/android-20-40/43016853 android2-141226063850-conversion-gate01
Cell phones that have Android Operating system installed may have been facing a critical vulnerability of HTML Code manipulation using different Linux Based operating system. Major Vulnerable Versions Include: Android 2.0 Android 2.1 Android 2.6 Android 3.1 Android 4.0 Android 4.1]]>

Cell phones that have Android Operating system installed may have been facing a critical vulnerability of HTML Code manipulation using different Linux Based operating system. Major Vulnerable Versions Include: Android 2.0 Android 2.1 Android 2.6 Android 3.1 Android 4.0 Android 4.1]]>
Fri, 26 Dec 2014 06:38:50 GMT /slideshow/android-20-40/43016853 masterubaid@slideshare.net(masterubaid) Android 2.0 - 4.0 HTML Vulnerable masterubaid Cell phones that have Android Operating system installed may have been facing a critical vulnerability of HTML Code manipulation using different Linux Based operating system. Major Vulnerable Versions Include: Android 2.0 Android 2.1 Android 2.6 Android 3.1 Android 4.0 Android 4.1 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/android2-141226063850-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cell phones that have Android Operating system installed may have been facing a critical vulnerability of HTML Code manipulation using different Linux Based operating system. Major Vulnerable Versions Include: Android 2.0 Android 2.1 Android 2.6 Android 3.1 Android 4.0 Android 4.1
Android 2.0 - 4.0 HTML Vulnerable from Syed Ubaid Ali Jafri
]]>
303 1 https://cdn.slidesharecdn.com/ss_thumbnails/android2-141226063850-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data Hiding (An Approach towards Stegnography) /slideshow/data-hiding-43016598/43016598 hidingdata-141226062253-conversion-gate01
This Document describes how a content can be hide using advance data stream and command prompt. This Document highlights that how hacker use to hide there secret data in different files that have no extension or even no link.]]>

This Document describes how a content can be hide using advance data stream and command prompt. This Document highlights that how hacker use to hide there secret data in different files that have no extension or even no link.]]>
Fri, 26 Dec 2014 06:22:53 GMT /slideshow/data-hiding-43016598/43016598 masterubaid@slideshare.net(masterubaid) Data Hiding (An Approach towards Stegnography) masterubaid This Document describes how a content can be hide using advance data stream and command prompt. This Document highlights that how hacker use to hide there secret data in different files that have no extension or even no link. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hidingdata-141226062253-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This Document describes how a content can be hide using advance data stream and command prompt. This Document highlights that how hacker use to hide there secret data in different files that have no extension or even no link.
Data Hiding (An Approach towards Stegnography) from Syed Ubaid Ali Jafri
]]>
391 1 https://cdn.slidesharecdn.com/ss_thumbnails/hidingdata-141226062253-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri /slideshow/final-year-projects-computer-science-2013/25287331 projectsideas-130815143424-phpapp02
Final year project ideas and Aims related to computer science students, Students can get an idea and make their final year project belongs to the industry requirement.]]>

Final year project ideas and Aims related to computer science students, Students can get an idea and make their final year project belongs to the industry requirement.]]>
Thu, 15 Aug 2013 14:34:24 GMT /slideshow/final-year-projects-computer-science-2013/25287331 masterubaid@slideshare.net(masterubaid) Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri masterubaid Final year project ideas and Aims related to computer science students, Students can get an idea and make their final year project belongs to the industry requirement. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/projectsideas-130815143424-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Final year project ideas and Aims related to computer science students, Students can get an idea and make their final year project belongs to the industry requirement.
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri from Syed Ubaid Ali Jafri
]]>
49687 24 https://cdn.slidesharecdn.com/ss_thumbnails/projectsideas-130815143424-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7 /slideshow/iis-configuration/25264950 iisconfiguration-130815015532-phpapp01
Internet Information Services (IIS) – formerly called Internet Information Server – is a Microsoft web server software application used to publish websites locally or globally, this document will help user how to configure IIS Server in Windows 7 Environment.]]>

Internet Information Services (IIS) – formerly called Internet Information Server – is a Microsoft web server software application used to publish websites locally or globally, this document will help user how to configure IIS Server in Windows 7 Environment.]]>
Thu, 15 Aug 2013 01:55:32 GMT /slideshow/iis-configuration/25264950 masterubaid@slideshare.net(masterubaid) Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7 masterubaid Internet Information Services (IIS) – formerly called Internet Information Server – is a Microsoft web server software application used to publish websites locally or globally, this document will help user how to configure IIS Server in Windows 7 Environment. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iisconfiguration-130815015532-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Internet Information Services (IIS) – formerly called Internet Information Server – is a Microsoft web server software application used to publish websites locally or globally, this document will help user how to configure IIS Server in Windows 7 Environment.
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7 from Syed Ubaid Ali Jafri
]]>
667 2 https://cdn.slidesharecdn.com/ss_thumbnails/iisconfiguration-130815015532-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Syed Ubaid Ali Jafri - Cryptography Techniques /slideshow/syed-ubaid-ali-jafri-lec-cryptography/25251765 cryptography-130814145102-phpapp02
Syed Ubaid Ali Jafri has described cryptography technique in this document.techniques involve Ceaser Cipher, Play Fair Cipher, Transpotation technique, Subsitution Technique, DES Technique]]>

Syed Ubaid Ali Jafri has described cryptography technique in this document.techniques involve Ceaser Cipher, Play Fair Cipher, Transpotation technique, Subsitution Technique, DES Technique]]>
Wed, 14 Aug 2013 14:51:02 GMT /slideshow/syed-ubaid-ali-jafri-lec-cryptography/25251765 masterubaid@slideshare.net(masterubaid) Syed Ubaid Ali Jafri - Cryptography Techniques masterubaid Syed Ubaid Ali Jafri has described cryptography technique in this document.techniques involve Ceaser Cipher, Play Fair Cipher, Transpotation technique, Subsitution Technique, DES Technique <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cryptography-130814145102-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Syed Ubaid Ali Jafri has described cryptography technique in this document.techniques involve Ceaser Cipher, Play Fair Cipher, Transpotation technique, Subsitution Technique, DES Technique
Syed Ubaid Ali Jafri - Cryptography Techniques from Syed Ubaid Ali Jafri
]]>
520 2 https://cdn.slidesharecdn.com/ss_thumbnails/cryptography-130814145102-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates /masterubaid/syed-ubaid-ali-jafri-black-box-penetration-testing-for-associates blackboxpentestpattern-130814144208-phpapp02
Syed Ubaid Ali Jafri Informed Information Security Students how to conduct black box penetration testing if you do not have prior knowledge about the network environment, Few steps and consideration that should be in mind before conducting black box audit]]>

Syed Ubaid Ali Jafri Informed Information Security Students how to conduct black box penetration testing if you do not have prior knowledge about the network environment, Few steps and consideration that should be in mind before conducting black box audit]]>
Wed, 14 Aug 2013 14:42:07 GMT /masterubaid/syed-ubaid-ali-jafri-black-box-penetration-testing-for-associates masterubaid@slideshare.net(masterubaid) Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates masterubaid Syed Ubaid Ali Jafri Informed Information Security Students how to conduct black box penetration testing if you do not have prior knowledge about the network environment, Few steps and consideration that should be in mind before conducting black box audit <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/blackboxpentestpattern-130814144208-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Syed Ubaid Ali Jafri Informed Information Security Students how to conduct black box penetration testing if you do not have prior knowledge about the network environment, Few steps and consideration that should be in mind before conducting black box audit
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates from Syed Ubaid Ali Jafri
]]>
1368 6 https://cdn.slidesharecdn.com/ss_thumbnails/blackboxpentestpattern-130814144208-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Syed Ubaid Ali Jafri Lecture on Information Technology /slideshow/syed-ubaid-ali-jafri-lecture-on-information-technology/25251095 informationtechnology-130814142253-phpapp02
Why Information Technology is still an issue for Non technical users? Information technology Assets, Data Security in Information technology, Information And data does still has a difference?]]>

Why Information Technology is still an issue for Non technical users? Information technology Assets, Data Security in Information technology, Information And data does still has a difference?]]>
Wed, 14 Aug 2013 14:22:53 GMT /slideshow/syed-ubaid-ali-jafri-lecture-on-information-technology/25251095 masterubaid@slideshare.net(masterubaid) Syed Ubaid Ali Jafri Lecture on Information Technology masterubaid Why Information Technology is still an issue for Non technical users? Information technology Assets, Data Security in Information technology, Information And data does still has a difference? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/informationtechnology-130814142253-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Why Information Technology is still an issue for Non technical users? Information technology Assets, Data Security in Information technology, Information And data does still has a difference?
Syed Ubaid Ali Jafri Lecture on Information Technology from Syed Ubaid Ali Jafri
]]>
756 2 https://cdn.slidesharecdn.com/ss_thumbnails/informationtechnology-130814142253-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Storage area network /masterubaid/storage-area-network-25251039 storageareanetwork-130814141928-phpapp02
Complete configuration of SAN using ESXI Environment and Installation guide. Now you will be able to configure storage area network with the help of these slides. This configuration helps user to configure ESXI 4, ESXI 3.0 Servers ]]>

Complete configuration of SAN using ESXI Environment and Installation guide. Now you will be able to configure storage area network with the help of these slides. This configuration helps user to configure ESXI 4, ESXI 3.0 Servers ]]>
Wed, 14 Aug 2013 14:19:28 GMT /masterubaid/storage-area-network-25251039 masterubaid@slideshare.net(masterubaid) Storage area network masterubaid Complete configuration of SAN using ESXI Environment and Installation guide. Now you will be able to configure storage area network with the help of these slides. This configuration helps user to configure ESXI 4, ESXI 3.0 Servers <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/storageareanetwork-130814141928-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Complete configuration of SAN using ESXI Environment and Installation guide. Now you will be able to configure storage area network with the help of these slides. This configuration helps user to configure ESXI 4, ESXI 3.0 Servers
Storage area network from Syed Ubaid Ali Jafri
]]>
4539 6 https://cdn.slidesharecdn.com/ss_thumbnails/storageareanetwork-130814141928-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing wireless network /slideshow/securing-wireless-network/25250934 securing-wireless-network-130814141451-phpapp01
When setting up and maintaining Wi-Fi home networks, consider these tips for maximizing the security of the computers and data on these networks. Securing Wireless Networks by maximizing the security of 802.11 standard and minimizing the Risk on Wireless network]]>

When setting up and maintaining Wi-Fi home networks, consider these tips for maximizing the security of the computers and data on these networks. Securing Wireless Networks by maximizing the security of 802.11 standard and minimizing the Risk on Wireless network]]>
Wed, 14 Aug 2013 14:14:51 GMT /slideshow/securing-wireless-network/25250934 masterubaid@slideshare.net(masterubaid) Securing wireless network masterubaid When setting up and maintaining Wi-Fi home networks, consider these tips for maximizing the security of the computers and data on these networks. Securing Wireless Networks by maximizing the security of 802.11 standard and minimizing the Risk on Wireless network <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securing-wireless-network-130814141451-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> When setting up and maintaining Wi-Fi home networks, consider these tips for maximizing the security of the computers and data on these networks. Securing Wireless Networks by maximizing the security of 802.11 standard and minimizing the Risk on Wireless network
Securing wireless network from Syed Ubaid Ali Jafri
]]>
751 3 https://cdn.slidesharecdn.com/ss_thumbnails/securing-wireless-network-130814141451-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IP Security over VPN /masterubaid/ip-security-vpn ipsecurityvpn-130814141049-phpapp02
Virtual private networks (VPNs) are generally considered to have very strong protection for data communications. Several different approaches to VPN security,Your privacy and security are important to us. Connection logs are erased every 24 hours and no VPN server traffic logs are stored]]>

Virtual private networks (VPNs) are generally considered to have very strong protection for data communications. Several different approaches to VPN security,Your privacy and security are important to us. Connection logs are erased every 24 hours and no VPN server traffic logs are stored]]>
Wed, 14 Aug 2013 14:10:49 GMT /masterubaid/ip-security-vpn masterubaid@slideshare.net(masterubaid) IP Security over VPN masterubaid Virtual private networks (VPNs) are generally considered to have very strong protection for data communications. Several different approaches to VPN security,Your privacy and security are important to us. Connection logs are erased every 24 hours and no VPN server traffic logs are stored <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ipsecurityvpn-130814141049-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Virtual private networks (VPNs) are generally considered to have very strong protection for data communications. Several different approaches to VPN security,Your privacy and security are important to us. Connection logs are erased every 24 hours and no VPN server traffic logs are stored
IP Security over VPN from Syed Ubaid Ali Jafri
]]>
879 3 https://cdn.slidesharecdn.com/ss_thumbnails/ipsecurityvpn-130814141049-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Network security over ethernet /slideshow/network-security-over-ethernet/25250727 networksecurityoverethernet-130814140702-phpapp02
Ethernet-based and other networks face security challenges from external, internal, intentional, and accidental sources, but users are adopting solutions that can protect against intrusions and mishaps. Network Security over Ethernet helps administration to manage their Structured network from unwanted attacks and disgruntled employees]]>

Ethernet-based and other networks face security challenges from external, internal, intentional, and accidental sources, but users are adopting solutions that can protect against intrusions and mishaps. Network Security over Ethernet helps administration to manage their Structured network from unwanted attacks and disgruntled employees]]>
Wed, 14 Aug 2013 14:07:02 GMT /slideshow/network-security-over-ethernet/25250727 masterubaid@slideshare.net(masterubaid) Network security over ethernet masterubaid Ethernet-based and other networks face security challenges from external, internal, intentional, and accidental sources, but users are adopting solutions that can protect against intrusions and mishaps. Network Security over Ethernet helps administration to manage their Structured network from unwanted attacks and disgruntled employees <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/networksecurityoverethernet-130814140702-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ethernet-based and other networks face security challenges from external, internal, intentional, and accidental sources, but users are adopting solutions that can protect against intrusions and mishaps. Network Security over Ethernet helps administration to manage their Structured network from unwanted attacks and disgruntled employees
Network security over ethernet from Syed Ubaid Ali Jafri
]]>
342 2 https://cdn.slidesharecdn.com/ss_thumbnails/networksecurityoverethernet-130814140702-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
LAN Security /masterubaid/lan-security lansecurity-130814135841-phpapp02
The Ethernet LAN has many security weaknesses when facing attacks externally and internally. This Presentation will helps user How they can Secure there LAN Network From unwanted threats]]>

The Ethernet LAN has many security weaknesses when facing attacks externally and internally. This Presentation will helps user How they can Secure there LAN Network From unwanted threats]]>
Wed, 14 Aug 2013 13:58:41 GMT /masterubaid/lan-security masterubaid@slideshare.net(masterubaid) LAN Security masterubaid The Ethernet LAN has many security weaknesses when facing attacks externally and internally. This Presentation will helps user How they can Secure there LAN Network From unwanted threats <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/lansecurity-130814135841-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Ethernet LAN has many security weaknesses when facing attacks externally and internally. This Presentation will helps user How they can Secure there LAN Network From unwanted threats
LAN Security from Syed Ubaid Ali Jafri
]]>
1312 3 https://cdn.slidesharecdn.com/ss_thumbnails/lansecurity-130814135841-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-masterubaid-48x48.jpg?cb=1622276465 Expertise in developing Web Based Application, Database Applications and Desktop Applications Working experience in distributed environment and distributed applications Expertise in ISA Configuration, Network Security include:· Penetration Testing· Stress Testing· Anti-Phishing· Anti-Hacking· Social Engineering. Programming Languages: Microsoft Visual C#. NET, Turbo C++, Asp. Net, Assembly Xml Networking Skills: Active Directory, ISA Server 2000,2003, Exchange Server 2003, Simulation on (GNS 3, Packet Tracer 5.3, Boson Netsim)Inter V-LAN Routing, Deployment of different Routing protocols and WAN Protocols in Professional Environment · Network Infrastructure.· Network Deploy... www.habibmetro.com https://cdn.slidesharecdn.com/ss_thumbnails/requirementforcreatingapentestlab-161216123746-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/requirement-for-creating-a-penetration-testing-lab/70203072 Requirement for creati... https://cdn.slidesharecdn.com/ss_thumbnails/technicalguidelinesonpos-161207111545-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/securing-pos-terminal-a-technical-guideline-on-securing-pos-system-from-hackers/69909840 Securing PoS Terminal ... https://cdn.slidesharecdn.com/ss_thumbnails/reviewofnetworkdiagram-160331073458-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/review-of-network-diagram-60267874/60267874 Review of network diagram