The Complete Magazine on Open Source

Home Articles Posted by Prashant Phatak

Posts by : Prashant Phatak

Author / 19 Posts
The author has experience of over 18 years in the field of IT hardware, networking, Web technologies and IT security. For the past 11 years, he has worked at Merrill Lynch, New York. He handled technology verticals such as solution architecture, operations and support, cyber security etc., and led a global team supporting mission-critical business applications running on a finance trading platform. Recently, Prashant started his own firm, Valency Networks, in India.
,

This article talks about a few important aspects of network monitoring, and compares three leading tools that are of great importance to IT administrators. …

,

When it comes to securing network infrastructure, the trend is to invest in commercial-grade appliances. Sadly, security designers tend to ignore the built-in security …

,

Cryptographic solutions are used to encrypt data transmission over wireless or wired protocols. Unfortunately, these techniques have proved to be vulnerable to attacks and …

,

Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But …

,

This article covers sophisticated botnet attacks, whereby the attacked computer system becomes an attacker itself. Systems administrators and senior technology management staff that are …

,

Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusion—the Man In The …

,

Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure …

,

Websites are no longer merely about having an “Internet presence” today, but are also used for commercial transactions and to transfer sensitive data. Such …

,

Modern data centres deploy firewalls and managed networking components, but still feel insecure because of crackers. Hence, there is a crucial need for tools …

,

We often read about defaced websites whose pages get changed to some malicious content. How do hackers do it and how do we protect …