[5 Mins Docker] Create Your Own Image Hosting Site Using GitHub Project Picsur
There are many free image hosting sites which you can upload your images then get URL to use it in your website or blog posts or social media sites. But…
InTune BitLocker Configuration
BitLocker Drive Encryption In Intune is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately…
Auto Start Stopped Spot Instance to Get Your VM Running Again
Using Azure Spot Virtual Machines allows you to take advantage of Microsoft Azure unused capacity at a significant cost savings. Spot VMs can be up to 90 percent cheaper than…
Azure Sentinel 101
Microsoft Sentinel is a scalable, cloud-native solution that provides: Security information and event management (SIEM) Security orchestration, automation, and response (SOAR) Microsoft Sentinel delivers intelligent security analytics and threat intelligence…
[5 Mins Docker] Transfer Any Files Out from Command Line – Create Your Own Safe and Fast Temporary Transfer Site
Have you met this issue? You are in a production environment with Internet connection, but you are not able to pull the logs or captured packets out from a hardened…
Email Security to Protect Your Sent Emails From Your Domain (Office 365)
The three main email security protocols complement one another, so implementing all trio of Authentication methods (SPF, DKIM and DMARC) will provde best security to your emails.
Install NextCloud AIO Using Docker
There are many different ways to install NextCloud and I had quite a few posts to show the installation. Recently I found this Github AIO (All in One) project and…
Cloudflare Zero Trust Tunnels (Previously Argo) for Home Internal Application Access
Cloudflare Tunnel was previously named Warp during the beta phase. As Warp was added to the Argo product family, Cloudflare changed the name to Argo Tunnel to match. Once Cloudflare…
One Command To Send Spoofing Test Email Easily & One DNS Record to Prevent Phishing For Your Domain
Sending a spoofed email is a very simple task to do and it is also can be easily blocked if your email service has been configured correctly. In this blog…
Configure CyberArk Privilege Cloud to Onboard Azure Accounts
This post is to summarize the configuration of CyberArk Privilege cloud for Azure Active Directory environment.CyberArk Products Security Pillars (Access, Privilege, DevSecOps) 1. RBAC – Roles Based Access Control 2.…
[5 Mins Docker] One Command to Build Your Own OpenVPN Server – Multiple Ways
The OpenVPN Community Edition (CE) is an open source Virtual Private Network (VPN) project. It creates secure connections over the Internet using a custom security protocol that utilizes SSL/TLS. This…