Penetration testing for businesses. An Example Contents Part 1. Introduction. 4 Internet Service Registration. 4 DNS Issues. 5 Search Engines. 5 Email 6 Website Analytics. 6 Conclusion. 6 Part 2. Introduction. 7 Nmap Report. 7 Nessus Report. 8 Conclusion. 11 Appendix. 12 WhoIs Information. 12 NSLookup. 13...
Read MoreUniversity of XXXXXXXXXXX An analysis of the key requirements of the University’s new network, providing Physical and Logical solutions to these requirements Contents Introduction. 3 Key Requirements. 4 Administration Assistants. 4 Curriculum Staff. 4 Students. 4 Wireless Network. 4 Analysis of Requirements. 5 Location of IDF. 5 Router....
Read MoreReport Thin Vs Thick Clients Paul McCherry 2/4/2015 Contents Abstract 3 Thin Vs Thick Clients 4 Introduction 4 Hardware Comparison 5 Operating System Comparison 6 Costs 7 Security 8 Conclusion 9 References 10 Abstract The client company requires two reports writing. The first of these is to compare...
Read MoreWhitePaper New Building network Design Paul McCherry 2/11/2014 Contents Abstract. 5 Introduction. 6 Findings. 7 Building Analysis. 7 Cabling. 8 Cable Termination. 8 Planned Network Topology. 9 Recommendations. 10 Building. 10 Network Topology. 11 Cabling. 12 Main Distribution Facility. 13 Cabinet....
Read MoreWHITEPAPER Network Report and Recommendations Cloud9 IT Services Paul McCherry 3/11/2014 Contents Introduction. 3 Centralised Administration. 4 Domain Controllers. 4 DNS. 5 DHCP. 6 File & Print Services. 7 Email 8 POP. 8 IMAP. 8 SMTP. 8 Mail Servers. 9 Web. 10 DHCP Service. 12...
Read More