What is Patch Compliance?

To explain you about a patch compliance lets imagine that when you are working out in the morning while lifting those 25kg dumbles you somehow got hurt on your knees or legs that too a minor cut what you do?

You apply an antiseptic or a Band-Aid so that the cut doesn’t go deeper and get spoiled by airborne viruses. As in the Band-Aid is removed you are back on your daily life routine.

How Band-aid is connected to Patch Management?

So now just imagine if your system or a machine which on an everyday usage keeps on getting cuts and before it goes deeper it should be applied with a Band-Aid that is it should be kept updated with all the latest patches to remove vulnerabilities.

In a technical language a patch management is the process of managing a network of computers by regularly performing patch deployment to keep computers up to date.  This helps to reduce the system-related failures so you can improve productivity and save on the costs associated with poor patch management.

The benefits which one can have after updating patches:

  • Security:  The network security is strengthen to avoid any data breach.
  • Productivity:  The patch update increases the productivity of the system which thereafter increases the profits of the businesses.
  • Compliance:  Patch management ensures that you stay within compliance of the security standards.

To know more about the best practices related to Patch Management stay connected to our website or follow our blog on WordPress or Blogger or contact us below:

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com| Facebook: https://www.facebook.com/DTdoctoolss/

What are SSL Certificates?

SSL stands for Secure Socket layer , which acts as a backbone of our secure internet which protects small data files that digitally bind a cryptographic key to an organisation’s details. It provides critical security, privacy and data security for both your website as well as for your personal information.

SSL binds the following things :

  • A domain name, server name or hostname.
  • An organisational identity (i.e. company name) and location.

SSL is issued by a CA (Certificate Authority)

What is a Certificate Authority?

A certificate authority  or certification authority is responsible for issuing digital certificates as it attests the identify of users, computers and organisations.

DocTooLss Digital Certificate issued by Let’s Encrypt Authority X3

What are Root Certificate Authority?

The root ca creates, stores and maintains the root CA.

What are Subordinate Certificate Authority?

A certificate authority certified by root certificate authority is called as subordinate/intermediate ca.

Types of CA

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com | Facebook: https://www.facebook.com/DTdoctoolss/

Network Protocols the Formula One of IP Tracks

Network Protocol

Whenever a novice lands in a network domain, he or she gets tangled in the new technical jargons or abbreviations which are being widely used over the different topics of Network Technology.

Here we at DocTooLss try to break and simplify these topics, so that you all are able to understand these jargons and make our world a simple place to live in.

There is always a *conditions apply to everything then why to leave here too, “this blog is for those novice people like me, who have landed and are tangled in this bizzare world of network security/ technology”

So if you think we need to update or add more things or any other feedback, please do comment or mail us @ task.theme@gmail.com | Tweet us @doctoolss8 | Skype us doctools | website: https://doctoolss.com/home/

Find below the protocols used:

TELNET – It is a protocol which allows a user on a remote client machine, called the Telnet client, to access the resources of another machine, the Telnet server, in order to access a command-line interface. There is a drawback with it that no encryption technique is available with it and everything is sent in clear text which includes words.

SSH – It is also similar to a Telnet where a secure session is built, It is employed for doing things like running programs on remote systems, logging into systems, and moving files from one system to another. And it does all of this while maintaining an encrypted connection.

FTP – It transfer files between two machines, used by applications. As a program, it’s employed by users to perform file tasks by hand. FTP also allows for access to both directories and files and can accomplish certain types of directory operations, such as relocating into different ones. There is a drawback with FTP that it can’t be used to execute remote files as a program.

TFTP – It is the version of FTP and is fast and eazy to use. It has no directory-browsing abilities i.e. it can only send and receive files.

HTTP – It is use to manage communication between web browsers and web servers and opens the right resource when you click a link.

HTTPS – It is sometimes known as Secure Hypertext Transfer Protocol. It uses Secure Socket Layer (SSL) which is also referred as SHTTP. It is the secure version of HTTP that shields you with shole security tools for keeping transactions between web browser and a server secure.

NTP – Network type Protocol that works by synchronizing devices to ensure that all computer systems are on the agree time.

DNS – Domain Name Server which converts the name of the sites to a IP address, ex- If you type http://www.google.com which will be converted into 64.233.160.0

DHCP – Dynamic Host Configuration Protocol that assigns to a host. It works well in small to very large network environment.

APIPA – Automatic Private IP Addressing – WS OS provide a feature called APIPA where clients can automatically self-configure an IP address and subnet mask.

TCP – Transmission Control Protocol it takes large blocks of information from an application and breaks them into segments.

UDP – User Datagram Protocol which basically scale down economy model of TCP and transports information that does’nt require reliable delivery.

ICMP – Internet Control Message Protocol – it is a management protocol and messaging service provider for IP working on network layer as per OSI model.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com | Facebook: https://www.facebook.com/DTdoctoolss/

Website Built with WordPress.com.

Up ↑

Create your website with WordPress.com
Get started