Skip to content

DocTooLss

"We make Technology EaZy via Docs"

  • Home
  • Contact
  • About
  • Twitter
  • WordPress
  • Online Quiz
    • Twitter
    • WordPress
    • Facebook
    • Medium

Blogs

  • Home
  • Page 3
  • Cyber Security
  • Technology

What is Information Security?

Information Security is also known as InfoSec, it is all about securing information from unauthorised access which can be done through tools, processes deployed to…

Posted on 8 May 20207 June 2020by: DocTooLss
  • Cyber Security
  • Technology

Artificial Intelligence (AI) to combat with COVID19

AI technology to be applied during this epidemic time of COVID19 as it can be most effective by the brainstorming of IT leaders and Medical Superintendents. Question which…

Posted on 5 May 20207 June 2020by: DocTooLss
  • Cyber Security
  • Technology

What is SSL Certificate?

SSL stands for Secure Socket layer , which acts as a backbone of our secure internet which protects small data files that digitally bind a…

Posted on 3 May 20207 June 2020by: DocTooLss
  • Cyber Security
  • Technology

What is MS Intune?

MS Intune is a cloud-based management solution which provides mobile and OS device management. To give you an example of MS intune, as in when…

Posted on 2 May 20207 June 2020by: DocTooLss
  • Cyber Security

Good practices to be followed for FireWalls to avoid cyberattacks

What are Firewalls? What are Firewalls? Firewalls are the network security systems which monitors the incoming and outgoing network traffic as per the pre-determined rules…

Posted on 25 April 20207 June 2020by: DocTooLss
  • API

What is API?

  API stands for Application Programming Interface. It is defined how two pieces of software talk to eachother. Types of APIs: 1) Web ( Rest,…

Posted on 5 April 20207 June 2020by: DocTooLss
  • Cyber Security

Kinds of Cyber Attacks

On a time when the world is getting locked down due to COVID19 which is a deadly virus and very contagious thanks to the Wuhan…

Posted on 22 March 20205 August 2020by: DocTooLss
  • Internet Protocol
  • Proxy,Router,SIEM,Switch

Network Protocols the Formula One of IP Tracks

Whenever a novice lands in a network domain, he or she gets tangled in the new technical jargons or abbreviations which are being widely used…

Posted on 30 November 20197 June 2020by: DocTooLss
  • Cloud Computing
  • Cyber Security
  • Technology

Cyber Crime on a Roll, CyberSecurity still catching up..!!

Not a week ago that we don’t hear about a breach or identify theft, there are security devices such as Firewalls, Switches, Routers, NIDS/NIPS, VPN…

Posted on 31 October 20197 June 2020by: DocTooLss
  • Cloud Computing
  • Technology

Similarities between Cloud Computing and Pizza

Today, we all talk about cloud, but some of us are unaware of it, some say yes it is something to deal with the cloud…

Posted on 13 October 20197 June 2020by: DocTooLss

Posts navigation

Next

Categories

  • API
  • Cloud Computing
  • Cyber Security
  • InfoSec
  • Internet Protocol
  • IoT
  • Proxy
  • Proxy,Router,SIEM,Switch
  • Technology

Calendar

February 2021
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
« Jan    

Tags

AI antispoofing API AWS AWSservices Azure Azureactivedirectory CA CIA CISCO Cloudcomputing cloudsecurity compliance Coronavirus COVID19 cyberattacks cyberexploits cyber security cybersecurity cyberthreats DDoS DDoS protection DNS EC2 encryption Endpoint firewalls Gartner Googlecloud IaaS imagebuilder internet IoT Microsoft Networksecurity PaaS PaloAlto protocol SaaS Security SIEM SNMP SSH technology vulnerabilities
Copyright © 2021 DocTooLss All Rights Reserved | Travel Master by Theme Palace