• 18
    Jan

Penetration Testing

Penetration testing for businesses. An Example Contents   Part 1. Introduction. 4 Internet Service Registration. 4 DNS Issues. 5 Search Engines. 5 Email 6 Website Analytics. 6 Conclusion. 6 Part 2. Introduction. 7 Nmap Report. 7 Nessus Report. 8 Conclusion. 11 Appendix. 12 WhoIs Information. 12 NSLookup. 13...

Read More
  • 20
    May

Network Analysis

University of  XXXXXXXXXXX An analysis of the key requirements of the University’s new network, providing Physical and Logical solutions to these requirements Contents Introduction. 3 Key Requirements. 4 Administration Assistants. 4 Curriculum Staff. 4 Students. 4 Wireless Network. 4 Analysis of Requirements. 5 Location of IDF. 5 Router....

Read More
  • 16
    Feb

Thin Vs Thick Clients – Whitepaper

Report Thin Vs Thick Clients Paul McCherry 2/4/2015 Contents Abstract 3 Thin Vs Thick Clients 4 Introduction 4 Hardware Comparison 5 Operating System Comparison 6 Costs 7 Security 8 Conclusion 9 References 10 Abstract The client company requires two reports writing. The first of these is to compare...

Read More
  • 14
    Jan

New Building Network Design – Whitepaper

  WhitePaper New Building network Design Paul McCherry 2/11/2014              Contents   Abstract. 5 Introduction. 6 Findings. 7 Building Analysis. 7 Cabling. 8 Cable Termination. 8 Planned Network Topology. 9 Recommendations. 10 Building. 10 Network Topology. 11 Cabling. 12 Main Distribution Facility. 13 Cabinet....

Read More
  • 2
    Jan

Network report – Whitepaper

   WHITEPAPER      Network Report and Recommendations Cloud9 IT Services Paul McCherry 3/11/2014   Contents Introduction. 3 Centralised Administration. 4 Domain Controllers. 4 DNS. 5 DHCP. 6 File & Print Services. 7 Email 8 POP. 8 IMAP. 8 SMTP. 8 Mail Servers. 9 Web. 10 DHCP Service. 12...

Read More