Skip to content

DocTooLss

"We make Technology EaZy via Docs"

  • Home
  • Contact
  • About
  • Twitter
  • WordPress
  • Online Quiz
    • Twitter
    • WordPress
    • Facebook
    • Medium

Author: DocTooLss

  • Home
  • DocTooLss
  • Cloud Computing
  • Cyber Security
  • Technology

Clash of the Titans – WhatsApp vs Telegram vs Signal

As in we have entered the New year 2021 although the pandemic time is still going on but there is a relief that the vaccine…

Posted on 17 January 202117 January 2021by: DocTooLss
  • Cloud Computing
  • Cyber Security
  • Technology

What is EC2 Image Builder?

EC2 Image Builder is a fully managed AWS service that makes it easier to automate the creation, management, and deployment of customized, secure, and up-to-date…

Posted on 14 December 202014 December 2020by: DocTooLss
  • Technology

Services by AWS

Databases (DB) in AWS : These are stored on EFS, EBS, EC2 , Instances , S3 Relational DB : – These are like Excel spreadsheets…

Posted on 15 November 202017 November 2020by: DocTooLss
  • Cloud Computing
  • Cyber Security
  • Technology

IoT the Next Cobweb

In the world today where we are breathing through masks, due to the pandemic times, where mostly all are working from home. Businesses need to…

Posted on 10 October 202022 October 2020by: DocTooLss
  • Cyber Security
  • Technology

Cyber Strategies in the New Normal

We have nearly reached the end of this pandemic year 2020, where mostly we have spent our time at home as still when we write…

Posted on 12 September 202012 September 2020by: DocTooLss
  • Cyber Security
  • Technology

What is Web Application and OWASP?

OWSAP – Open Web Application Security Project is a non-profit organization that dedicates web application security. What is the OWASP Top 10? It lists out…

Posted on 6 September 20206 September 2020by: DocTooLss
  • Technology

What do you mean by Virtualization & Hypervisor?

Virtualization refers to the creation of a virtual resources such as a server, desktop, operating system, file, storage or network. A simple definition of virtualization is…

Posted on 22 August 202022 August 2020by: DocTooLss
  • Cyber Security
  • Technology

What is Hardware Security?

To know about the hardware security, lets first understand what all is covered under hardware security here : Mobile Device Security (MDS) IoT Security Vulnerable…

Posted on 9 August 20209 August 2020by: DocTooLss
  • API
  • Cloud Computing
  • Cyber Security
  • IoT
  • Technology

What we know about IoT Security?

What is Internet of Things (IoT)? We read a lot about IoT, but not clear what exactly it means, although we know about its definition…

Posted on 2 August 20204 August 2020by: DocTooLss
  • Cyber Security
  • Technology

What is Threat Intelligence?

The information which an organization uses to understand the threats or issues that are targeting their organization. The primary purpose of this type of security…

Posted on 26 July 202026 July 2020by: DocTooLss

Posts navigation

Older

Categories

  • API
  • Cloud Computing
  • Cyber Security
  • InfoSec
  • Internet Protocol
  • IoT
  • Proxy
  • Proxy,Router,SIEM,Switch
  • Technology

Calendar

January 2021
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Dec    

Tags

AI antispoofing API AWS AWSservices Azure Azureactivedirectory CA CIA CISCO Cloudcomputing cloudsecurity compliance Coronavirus COVID19 cyberattacks cyberexploits cyber security cybersecurity cyberthreats DDoS DDoS protection DNS EC2 encryption Endpoint firewalls Gartner Googlecloud IaaS imagebuilder internet IoT Microsoft Networksecurity PaaS PaloAlto protocol SaaS Security SIEM SNMP SSH technology vulnerabilities
Copyright © 2021 DocTooLss All Rights Reserved | Travel Master by Theme Palace