Loading...

Follow 51Sec Network Security Blog on Feedspot

Continue with Google
Continue with Facebook
or

Valid

The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination computer and waiting for a response. How many of those responses are returned, and how long it takes for them to return, are the two major pieces of information that the ping command provides. ping /? C:\tmp>ping /? Usage: ping [-t] [-a] [-n…

The post Understanding Ping Command appeared first on Cyber Security Memo.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). I had a chance to install it in my lab environment for a testing. This post is kind of recording all…

The post Deploy Symantec Endpoint Encryption 11.2.1 and Configure SEE to Encrypt Client Machines appeared first on Cyber Security Memo.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

I were working on Symantec DLP project and had some experience with it. This post is going to review what I have been done and how I managed to install it in my home lab environment. It will not be alike a step by step installation tutorial since Symantec documents have explained details enough. It mostly high level lists all…

The post Basic Steps to Deploy and Config Symantec DLP 15.5 with Installation Videos appeared first on Cyber Security Memo.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Azure free tier provides following free services for 12 months after one month for your free $200 credit: 750 hours B1S VM Linux and Windows Virtual machines 64GB x 1 Storage – 2 P6 SDDs 5 GB File Storage 250 GB SQL DB 15 GB Bandwidth (Data Transfer) etc I was thinking to test free tier Windows VM to see…

The post Create a Free Tier Windows Virtual Machine in Azure appeared first on Cyber Security Memo.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Here are some simple but effective windows tweaks, tips and tricks to streamline your windows computing experience. Here are list of my collections (still keep adding): 1. Fix High CPU Usage by Windows Software Protect Service (Sppsvc.exe) 2. Install Telnet Client 3. Check System Uptime 4. Hiding Windows Folder 5. 上帝模式一键开启 6. 历史问题一目了然 (Reliability Monitor) 7. 一Click锁定电脑 Other than WIN+L…

The post Windows 10 Tips and Tricks appeared first on Cyber Security Memo.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Portainer is a lightweight management UI which allows you to easily manage your different Docker environments (Docker hosts or Swarm clusters). It is meant to be as simple to deploy as it is to use. It consists of a single container that can run on any Docker engine (can be deployed as Linux container or a Windows native container). Portainer…

The post Install Portainer to Manage Containers – Nginx, MySQL, WordPress appeared first on Cyber Security Memo.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

All of AWS, Azure and Google Cloud are providing some kind of free tier to the users. I am always wondering how those free tier VPS performance looks like. I did some bench work to test them out. Here is the method and result. Bench script: https://github.com/n-st/nench provides a nice bench.sh and a single command for you to run this…

The post Free Tier VPS Bench Comparison for AWS, Azure and Google Cloud appeared first on Cyber Security Memo.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Centralizing your logs saves time and increases the reliability of your log data, especially for Windows machines. When Windows log files are stored locally on each server, you have to individually log into each one to go through them and look for any errors or warnings. It’s possible for a Windows server to forward its events to a “subscribing” server.…

The post Forwarding Windows Event Logs to Syslog Server (Kiwi Syslog) appeared first on Cyber Security Memo.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

pfSense is an open source routing and firewall software that is based on the FreeBSD distribution. The basic features including: pfSense Home Topology Static/default/dynamic routing Stateful firewall Network Address Translation (NAT) Virtual Private Networks (VPN) Dynamic Host Configuration Protocol (DHCP) Domain Name System (DNS) Load balancing and so on.  With many supported add-on packages, other advanced features including: Snort (for…

The post PFsense Configuration with Topology and Screenshots appeared first on Cyber Security Memo.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The Qualys Cloud Platform and its integrated apps can simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Qualys Scanner Appliance is an option with the Qualys Cloud Platform. With the Qualys Scanner Appliance, you can easily…

The post Qualys Scanner Appliance and Qualys Guard Service Tips and Tricks appeared first on Cyber Security Memo.

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview