Rating
SETTING UP A VOIP USING ASTERIX
Setting Up a VoIP Using Asterix
Setting Up a VoIP Using Asterix
Introduction
The purpose of this assignment was to set up a VoIP using Asterisk. Asterisk is an open source private branch exchange (PBX) — or private telephone network — that currently runs on Linux, OS X, ...
Rating
Linux Distribution
Linux Distribution
Introduction
A Linux distribution is a software distribution based on Linux kernel that includes certain software packages to meet the needs of a specific group of users, giving rise to domestic issues, business and server.
The ability to mount an operating system has made ??as any entity that provides a solution to a specific problem to be ...
Rating
Impact of a Data Classification Standard
Impact of a Data Classification Standard
Introduction
Organizational leaders believe the change in IT is the first time that organizations have encountered a changing technology that took less time to transition into the world's global economy. The change surprised leadership as incongruous, but also proved that the ...
Rating
IMPACT OF DIGITALISATION ON SMARTPHONE
Impact of Digitalisation on Smart phone
Impact of Digitalisation on Smart phone
Introduction
The purpose of this study is to expand the boundaries of our knowledge by exploring some relevant facts and figures related to the impact of digitalization on Smartphone. In this paper, the author will evaluate ...
Rating
Viruses, Trojans and Backdoors
Viruses, Trojans and Backdoors
Computer Virus
The term "computer virus", probably familiar even to those who have never had a computer. If in real life, we are frightened of SARS virus, or swine flu, in the computer world we are threatened with network viruses, worms, and all kinds of ...
Rating
Project Management
Project Management
Introduction
The topic about which this paper aims to talk about is project management life cycle. According to different project managers, practitioners, authors and scholars there are different stages of the project life cycle. They define different ways in which the life cycle of the project can be managed. ...
Rating
Encryption
ABSTRACT
In this study we try to explore the concept of Encryption in a holistic context. The main focus of the research is on Encryption and its relation with Cryptographic Algorithms. The research also analyzes many aspects of security and tries to gauge its effect on Encryption. Finally, the research describes ...
Rating
ENCRYPTIoN
Encryption
[Name of the writer]
[Name of the institution]
ABSTRACT
The access control mechanisms of existing mainstream operating systems are inadequate to provide strong system security. Enhanced access control mechanisms have failed to win acceptance into mainstream operating systems due in part to a lack of consensus within the security community on the right ...
Rating
EXPERT SYSTEMS
Expert Systems
Expert Systems
Introduction
Expert systems are essentially the computer programs, which base on artificial intelligence technologies. These systems have got wide popularity during the last 10 years. Many business organizations rely on expert systems for decision making processes, as this system significantly emulates the decision making capability of ...
Rating
ATTACK ON INFORMATION SYSTEMS
Methodologies of Attack on Information Systems
Methodologies of Attack on Information Systems
Introduction
Information system can be attacked in several ways but in this paper we will be discussing with two cracking methodologies, which includes the exploitation of open standards of TCP/IP model and exploitation by the procedures and people ...