Web Server Security and Database Server Security

Posted by Newbiepost On March - Monday - 2011

Various high-profile hacking attacks have proven that web security remains the most critical issue to any business that conducts its operations online. Web servers are one of the most targeted public faces of an organization, because of the sensitive data they usually host. Securing a web server is as important as securing the website or web application itself and the network around it. If you have a secure web application and an insecure web server, or vice versa, it still puts your business at a huge risk. Your company’s security is as strong as its weakest point.

saecurity-web

Update Nice.rsc Mikrotik v.4.13

Posted by Newbiepost On March - Monday - 2011

For network administrators who use mikrotik V. 4:13 may have difficulty in nice.rsc automatic update, because I am too. after mikrotik I upgraded from version 3 to version 4, nice.rsc can not automatically update this probably is because there are a few commands are missing or added to the new version of Mikrotik. After I was looking at forums that are on the internet I finally found an article, unfortunately I forgot his link address so he could not specify the address here but its conclusions on the mode settings filewall - mangle nothing changed except that the existing system command scheduler nice.rsc added to download automatically.

Logo Mikrotik

TCP Characteristics

Posted by newbiepost On 6:33 AM

1. Oriented connection (connection-oriented): Before data can be transmitted between two hosts, two processes running on the application layer should negotiate to create session first. TCP connection is closed by using a TCP connection termination process (TCP connection termination). 
2. Full-duplex: For each host TCP, the connection between two hosts consists of two lines, namely an exit and entry point. By using a lower layer of technology that supports full-duplex, so data can be received and transmitted simultaneously. TCP header contains sequence number (TCP sequence number) of transmitted data and an acknowledgment from the incoming data.
3. Can be dependable (reliable): Data sent to a TCP connection will be sorted with a serial number of the package and would expect a positive acknowledgment from the receiver package. If no acknowledgment packet from the receiver, then the TCP segment (protocol data unit in the TCP protocol) will be retransmitted. On the receiving end, the segments will be skipped and duplicate segments that come not in accordance with the order will remain behind to sort the TCP segments. To ensure the integrity of each TCP segment, TCP implements TCP checksum calculation.

4. Byte stream: TCP view the data sent and received through the two-lane entrance and exit channels as a byte stream TCP adjacent (kontigu). TCP sequence number and acknowledgment numbers in every TCP header is defined also in the form of bytes. However, TCP does not know the limits messages within the TCP byte stream. To do so, it is left to the application layer protocol (in DARPA Reference Model), which must translate the TCP byte stream into the "language" that he understood.
5. Having a service flow control: To prevent too much data is sent at one time, which ultimately makes "bad" IP internetwork network, TCP implements flow control service which is owned by the sender that continuously monitor and limit the amount of data transmitted at one time . To prevent the receiver to obtain data that can not be disangganya (buffer), TCP also implements flow control in the receiver, which indicates the number of buffers that are still available in the recipient.
6. Perform segmentation of the data coming from the application layer (in DARPA Reference Model)
7. Sending a package is "one-to-one": this is because the TCP must make a logical circuit between two protocols for application layer to communicate with each other. TCP does not provide data transmission services in a one-to-many.

TCP is generally used when an application layer protocol requires data transfer service that is reliable, that the services are not owned by the application layer protocol. Examples of using the TCP protocol is HTTP and FTP.

0 Response to "TCP Characteristics"

Post a Comment