Blog - Page 49 of 100 - Exotic Digital Access
  • Kangundo Road, Nairobi, Kenya
  • support@exoticdigitalaccess.co.ke
  • Opening Time : 07 AM - 10 PM

Blog

Chris' Corner: Even More SVG Tricks

Chris’ Corner: Even More SVG Tricks

SVG has so many tricks up its sleeve. It’s really a full-featured drawing API literally designed for the web, but few of us really truly understand it nor reach for it enough. Heck, I even wrote a book about it, and I don’t. At the time, just getting people to use SVG for icons felt […]

Read More
MPLS TE Per VRF TE Tunnel

MPLS TE Per VRF TE Tunnel

In this lesson, I’ll explain how to configure MPLS VPN per VRF TE tunnels. If you haven’t configured MPLS VPN over TE tunnels before, look at our MPLS VPN over MPLS TE tunnels first. Building a TE tunnel for customer VRFs doesn’t make much sense because of scalability issues. If you have more traffic in a […]

Read More
What are network assurance tools and why are they important?

What are network assurance tools and why are they important?

Network assurance tools, which use advanced analytics to optimize and automate network management, are becoming an essential component in every network team’s toolkit. Network assurance was once viewed as a routine IT responsibility. “This attitude essentially reduced assurance to a checkbox,” says SQL server consultant Mark Varnas. As enterprises became increasingly data-driven, this perfunctory approach […]

Read More
Lazarus Group Exploits Critical Zoho ManageEngine Flaw to Deploy Stealthy QuiteRAT Malware

Lazarus Group Exploits Critical Zoho ManageEngine Flaw to Deploy Stealthy QuiteRAT Malware

Aug 24, 2023THNCyber Attack / Hacking The North Korea-linked threat actor known as Lazarus Group has been observed exploiting a now-patched critical security flaw impacting Zoho ManageEngine ServiceDesk Plus to distribute a remote access trojan called such as QuiteRAT. Targets include internet backbone infrastructure and healthcare entities in Europe and the U.S., cybersecurity company Cisco […]

Read More
Using WinRAR? Be sure to patch against these code execution bugs… – Naked Security

Using WinRAR? Be sure to patch against these code execution bugs… – Naked Security

The venerable RAR program, short for Roshal’s Archiver after its original creator, has been popular in file sharing and software distribution circles for decades, not least because of its built-in error recovery and file reconstruction features. Early internet users will remember, with little fondness, the days when large file transfers were shipped either as compressed […]

Read More
What Is an Enterprise Network? Definition, Types, and Tips

What Is an Enterprise Network? Definition, Types, and Tips

Enterprise Networking Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. An enterprise network is a hardware and software infrastructure that connects a company’s computers, servers, and other devices. It allows employees to connect to shared resources and provides access to internal […]

Read More