-
Junjie Han commented on the post, What is the point of a Domain?, on the site 4 years, 11 months ago
The domain belongs to the company’s work on the network, and the domain can help the company manage the permissions of various accounts.And the domain log can record and monitor account activity.When suspicious activity occurs, the company can quickly identify and resolve the problem.There is no need to use domain at home. We do not need to carry…[Read more]
-
Junjie Han commented on the post, Securing a MySQL DB Server, on the site 4 years, 11 months ago
The database contains all the data information, which is equivalent to a bank vault.Protecting the database is very important, and the ultimate goal of the hacker is the important part of the customer information in the database, for example, PII, and credit card information.The two security levels of the database are client level and server…[Read more]
-
Junjie Han commented on the post, Forms Applications vs Web Applications, on the site 4 years, 11 months ago
Forms Applications can be used for Windows desktop Applications and should be designed according to the internal needs of the organization.Web applications, on the other hand, are designed on the Web and depend on the Web.Both have their own advantages and disadvantages.Form Aplplication can be used within the company, and it needs to be…[Read more]
-
Junjie Han commented on the post, Programming Languages (For 10/31), on the site 4 years, 11 months ago
In this chapter, I learned some of the design basics of C# and how the language builds computer applications. Both Java and C# are object-oriented languages.Java can be used on Windows, Linux and Unix systems.C# runs more on Windows. C# is more like a basic language, with more variety.JavaScript is mostly used for specific designs.Like games.
-
Junjie Han commented on the post, Web Application Hacking, on the site 4 years, 11 months ago
The design of the application itself is not the target of the hacker, but the huge database behind the application. These data have PII, payment information and so on. This information is like money in a bank vault. When a hacker gets credit card information, he can turn it into money. OWASP security coding theory believes that the significance of…[Read more]
-
Junjie Han commented on the post, Database Architecture and Development, on the site 4 years, 11 months ago
From the perspective of IT security, data stored separately can better protect the data.When hacked, hackers cannot download all the data at once.From the IT perspective, data stored separately can be easily and better managed, and the data managed separately makes the logic language functionality of SQL more variable.The ERD provides the…[Read more]
-
Junjie Han commented on the post, GUI vs CLI, on the site 5 years ago
I prefer the GUI because I’m more familiar with it.GUI user experience has a relatively mature methodology and specifications. CUI is now linked to new technologies such as AI.Intelligence. It is good, However, the controllable of the software must be taken into account.I like GUI more in this respect.
-
Junjie Han commented on the post, Importance of Understanding Storage Components, on the site 5 years, 1 month ago
For enterprises, the content of storing electronic materials is even more important, and may involve related business secrets such as contracts, independent intellectual property rights, and employee information. We need to understand the structure of the storage hardware. When a part of a company or company file is attacked or lost. The knowledge…[Read more]
-
Junjie Han commented on the post, IP Addresses and Networks, on the site 5 years, 1 month ago
In addition to the IP address representing the identity of the network, we can also use computer operations to give an IP to a router. This is how companies like Verizon and Comcast install home routers that give a router identity and let it access the network from the organization’s cables. In addition, each router has a paperclip, which is used…[Read more]
-
Junjie Han commented on the post, Why all the Operating Systems?, on the site 5 years, 1 month ago
We need to understand how different systems work, the similarities and differences.The companies we audit in the future may have different operating systems, such as Windows, Linux, IOS, etc.We need to learn to understand each operating system, because we may meet them.When we understand the data in each system, we can explain the problems of the…[Read more]
-
Junjie Han commented on the post, PC Parts and IT Auditing, on the site 5 years, 1 month ago
As a worker in the IT field, IT is really important to learn how to build a computer. When you implement risk control, you need to know how to maintain the hardware of the computer. For example, when a computer has a hardware problem, you can use this kind of knowledge to know which part of the computer is wrong. When you work with other people in…[Read more]
-
Junjie Han commented on the post, What do IT Auditors do?, on the site 5 years, 2 months ago
Auditors are in a company to ensure efficient decision-making and to prevent the risk of fraud.The existence of auditors is better to improve the efficiency of the company.IT auditing is a demanding profession in the era of big data.To ensure the enterprise operating system safe and efficient operation.But also to prevent IT risks.An essential…[Read more]
-
Junjie Han and Qianying Zhang are now friends 7 years, 6 months ago
-
Junjie Han changed their profile picture 7 years, 9 months ago
-
Junjie Han's profile was updated 7 years, 9 months ago