Blog - Page 44 of 95 - Exotic Digital Access
  • Kangundo Road, Nairobi, Kenya
  • support@exoticdigitalaccess.co.ke
  • Opening Time : 07 AM - 10 PM

Blog

MPLS Traffic Engineering (TE) OSPF Configuration

MPLS Traffic Engineering (TE) OSPF Configuration

In the MPLS Traffic Engineering (TE) IS-IS Configuration lesson and other MPLS TE lessons, I use IS-IS as the IGP on the TE routers. In this lesson, we’ll use OSPF instead. I’ll walk you through the entire configuration, but because I already explained in detail how to configure an MPLS TE network step-by-step, I’ll only focus […]

Read More
How Penetration Testing Improves Web Application Security

How Penetration Testing Improves Web Application Security

Editor’s note: Dmitry overviews the three main approaches to pentesting and describes the vulnerabilities commonly found in web apps. If you want to check if your application is an easy target for hackers, don’t hesitate to contact ScenceSoft for our penetration testing services. Web application penetration testing is a security review method designed to uncover vulnerabilities […]

Read More
MPLS TE RSVP-TE

MPLS TE RSVP-TE

In the introduction to MPLS Traffic Engineering (TE) lesson, I gave a short overview of how MPLS TE uses RSVP-TE (Resource Reservation Protocol – Traffic Engineering). In this lesson, we’ll take a closer look. RSVP-TE is a signaling protocol and an extension of RSVP. RSVP-TE uses a soft state to manage its resource reservation states. This […]

Read More
A new look and feel for the Stack Overflow blog

A new look and feel for the Stack Overflow blog

August 30, 2023 We’re updating things to highlight community contributions, make it easier to keep tabs on our latest releases, and connect your Stack Overflow account to the discussion happening on the blog. Hello and welcome to the brand new Stack Overflow blog! When I joined Stack Overflow in 2019, the world looked very different. […]

Read More
What to know and what to do – Naked Security

What to know and what to do – Naked Security

US food delivery compeny PurFoods, which trades as Mom’s Meals, has just admitted to a cyberintrusion that took place from 2023-01-16 to 2023-02-22. The company stated officially that: [The] cyberattack […] included the encryption of certain files in our network. Because the investigation identified the presence of tools that could be used for data exfiltration […]

Read More
Everything You Need to Know About Mobile Gaming Business

Everything You Need to Know About Mobile Gaming Business

As 2023 witnesses the industry’s expansion, mobile gaming experiences remarkable growth. Last year’s mobile gaming revenue total hit $180.3 billion. A conspicuous pattern is evident. The market is expected to expand, reaching $300.47 billion by 2028, with an average annual growth rate of 16.22% until that point. Mobile gaming’s projected expansion through 2027, valued at […]

Read More
Chris' Corner: Even More SVG Tricks

Chris’ Corner: Even More SVG Tricks

SVG has so many tricks up its sleeve. It’s really a full-featured drawing API literally designed for the web, but few of us really truly understand it nor reach for it enough. Heck, I even wrote a book about it, and I don’t. At the time, just getting people to use SVG for icons felt […]

Read More
MPLS TE Per VRF TE Tunnel

MPLS TE Per VRF TE Tunnel

In this lesson, I’ll explain how to configure MPLS VPN per VRF TE tunnels. If you haven’t configured MPLS VPN over TE tunnels before, look at our MPLS VPN over MPLS TE tunnels first. Building a TE tunnel for customer VRFs doesn’t make much sense because of scalability issues. If you have more traffic in a […]

Read More
What are network assurance tools and why are they important?

What are network assurance tools and why are they important?

Network assurance tools, which use advanced analytics to optimize and automate network management, are becoming an essential component in every network team’s toolkit. Network assurance was once viewed as a routine IT responsibility. “This attitude essentially reduced assurance to a checkbox,” says SQL server consultant Mark Varnas. As enterprises became increasingly data-driven, this perfunctory approach […]

Read More