Archive by Author

Benelli-logo

My 1st Naked Bike Benelli TNT 135

There is many type of motorbike around the word, and the most common type in Malaysia is underbone or so call ‘kapchai’ in local language. Underbone After I graduate from secondary school, my parent bought me an underbone (Model’s Kriss) from Modenas and I am riding it since 2001 until now. Kriss is always my […]

Microsoft Logo

Microsoft Azure Networking Components

A major incentive for adopting cloud solutions such as Azure is to enable information technology (IT) departments to move server resources to the cloud. This can save organizations money, and simplify operations by removing the need to maintain expensive datacenters with uninterruptible power supplies, generators, multiple fail-safes, clustered database servers, and so on. This is […]

KingstonLogo

Kingston Year of the Rooster CNY Drive 32GB

Year 2017 coming soon and it is Year of the Rooster. As usual, Kingston will produce special edition Chinese zodiac thumb drive. SKU: DTCNY17/32GB Launch Date: January 2nd , 2017 Product Description/Positioning: – Limited Edition 2017 Chinese New Year Drive – Year of the Rooster– 32GB – Metal Casing Material Capacity:  32GB Performance Spec : USB 3.1 […]

Data Center Firewall

Data centers have become abundant in the increasingly technology-based business environment of the  21st Century. Because of this growth, data centers provide a new field for trends in computing and  networking driving revisions to IT infrastructure strategies and, along with new strategies, new methods  to bolster network security. Presented in this module are characteristics and […]

Cisco Logo

Cisco ASA Firewall with FirePOWER Service

Until today, small to midsized businesses (SMBs), midsized organizations, and distributed enterprises requiring advanced threat protection have been underserved. These organizations have had to settle for costly, impractical-to-administer, point solutions, including legacy next-generation firewalls, or less secure Unified Threat Management (UTM) solutions. The new Cisco ASA with FirePOWER Services 5506-X, 5508-X, and 5516-X are purpose-built […]

wifi_sml

Access Point Radio Chain Nomenclature

When we checking access point specification, we always come across “2×3:2”, “3 x 4:3”, this represent MIMO radio design and spatial streams (MIMO mean multiple input, multiple output) Lets define a common nomenclature used on the access points and for that matter on all access points sold today. For this example we’ll show the Ruckus […]

firewall

Why we need Next-Gen Firewall?

We see this in the news on a seemingly weekly basis: large corporations get hacked and lose sensitive data. At first glance we might think that large businesses are the primary targets of hackers. However beneath the headlines is a more alarming problem. The truth is that small businesses and distributed enterprises like yours are […]

Microsoft Logo

Risk of non Genuine Windows

I believe majority do download non illegal software, movie or MP3 before. Microsoft always insist on genuine software because there are few potential risk using non genuine software. Why use genuine software? According to research, you have 60% chance of getting malware if you using non-genuine software, reason because the programmer/cracker who modify this non-genuine software […]