Rob Elamb has been doing security for the federal government for over 10 years. He specializes in certification & accreditation for Department of Defense systems, IA Controls, attaining security certifications and recognizing scams.

Rob commented in his review, “ My honest opinion is that software like uCerts Prepkits are great for gauging your level of preparation. I also recommend that you use more than one gauge (particularly on the bigger tests such as CISSP).” Continue reading Rob’s uCertify CompTIA Security+ exam (SY0-101) PrepKit review >>

uCertify (July 14, 2009) uCertify, a leading provider of exam preparation software for IT certification exams, is offering a huge discount of 50% on its Network+ (N10-003) and Security+ (SY0-101) PrepKits. CompTIA has announced the retirement of the Network+ version 2007 (N10-003) and Security+ (SY0-101) certification exams. These exams will be available until July 31, 2009. According to CompTIA, although these exams are being retired, the certification status of candidates will not change. So, the candidates who have been preparing for these exams for a long time are advised to take the exam as early as possible.

uCertify is offering a discount of 50% on both PrepKits. To get a glimpse of these PrepKits, you can download its free demo version (which contains 15 free practice questions) from:

For Security+ (SY0-101) certification PrepKit: https://www.ucertify.com/exams/CompTIA/SY0-101.html

For Network+ (N10-003) certification PrepKit: https://www.ucertify.com/exams/CompTIA/N10-003.html

Continue reading

Q. What is the prerequisite for taking the test Security+ 2008 Edition (SY0-201)?

A. There is no prerequisite for taking the test SY0-201. However, it is recommended that CompTIA Security+ candidates should have at least two years on-the-job networking experience, with an emphasis on security. The CompTIA Network+ certification is also recommended for taking the test.

Q. What certificate does it provide?
Continue reading

Optimizing the performance of database servers and databases

  • Memory: Pages/sec counter is used to detect whether or not the memory bottleneck is caused by I/O overhead.
  • Disk I/O bottleneck can be monitored by Physical Disk: % Disk Time and Physical Disk: Avg Disk Queue Length counters.
  • The System Monitor tool is used to know the cause of slow authentication.
  • The SQLServer: Buffer Manager performance object is used to check the amount of RAM used by a computer.
  • The Physical Disk: %Disk Time counter measures the pressure on a physical hard disk array.
  • Add more RAM if the reading of Memory: Pages/sec counter is high.
  • Reduce the Maximum Worker Thread configuration settings if the value of System: Processor Queue Length counter is high.
  • Continue reading

General Security Concepts

    • Kerberos is an industry standard authentication protocol used to verify user or host identity.
    • Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization.
    • Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the system.
    • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
    • Certificate-based authentication is the most secure method of authentication. It provides stronger key for encryption as compared to Digest authentication and sends encrypted passwords across the network. This prevents unauthorized users from intercepting the passwords.
    • Anonymous authentication is generally used for public Internet Web sites. Using this method, a user can establish a connection with a Web server without providing username and password.
    • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
    • Password Authentication Protocol (PAP) transmits user credentials as plaintext.
    • A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.

Continue reading