Author

ICTKB Admin

ICKTB is team of experience and expert in ICT industry sharing their knowledge.

90 Articles
ICTKB_IMG

Difference between SCCM and WSUS

Windows Server Update Services (WSUS) and System Center Configuration Manager (SCCM) are both patch management solutions that assist IT teams with keeping systems up to date. Though both have the capability to manage operating system, software, and...

ICTKB_IMG

Command and Control (C2)

Malicious network attacks have been on the rise in the last decade. One of the most damaging attacks, often executed over DNS, is accomplished through command and control (C2). Command-and-control attacks can compromise an entire network. The...

ICTKB_IMG

OWASP Top 10

The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. Companies should adopt this document and start the process of...

ICTKB_IMG

Blockchain Technology

Blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. An asset can be tangible (a house, car, cash, land) or intangible (intellectual property, patents, copyrights,...

ICTKB_IMG

Computer Processor 32 Bit vs. 64 Bit

When it comes to computers, the difference between 32-bit and a 64-bit is all about processing power. Computers with 32-bit processors are older, slower, and less secure, while a 64-bit processor is newer, faster, and more secure. But what do the...

ICTKB_IMG

What is Botnet Attack

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker. A botnet (short for robot network) is a network of computers infected by malware that are under the control of a single attacking...

ICTKB_IMG

Set up multiple monitors on Windows

Getting another monitor can help you stay productive and organized. If you’re the type of person that opens lots of programs at once, cramming all of them in one monitor can quickly clutter up your screen. With two monitors, you can surf the web...

ICTKB_IMG

Dark Web, Deep Web and Surface Web

If we imagine web as an ocean, the surface web is the top of the ocean which appears to spread for miles around, and which can be seen easily or “accessible”; the deep web is the deeper part of the ocean beneath the surface; the dark web is the...

ICTKB_IMG

Zero Trust Security Model (ZTNA)

Zero Trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter....

ICTKB_IMG

Tips for Troubleshooting Microsoft Outlook

Microsoft Outlook is the most popular business software program in the world, and its top ranking is well deserved. It manages so much of our business and personal life in one big window. Because we rely on it for our e-mail communications, meeting...

Our site uses cookies. By using this site, you agree to the Privacy Policy and Terms of Use.