VanDyke SecureCRT Settings (Tips and Tricks)
VanDyke SecureCRT provides IT pros a very user-friendly client to manage command line devices and SSH hosts with. Connecting to devices securely is one thing, and there are other products…
Cyber Security TRA (Threat and Risk Assessment) Resources Research
What is Risk: Risk = Threat x Vulnerability x Asset The enterprise risk assessment and enterprise risk management processes comprise the heart of the information security framework. These are the…
Symantec ATP (Advance Threat Protection) EDR Configuration Notes
I am working on Symantec ATP , which new name is EDR. Here lists some of experience I learned from this set up. It is still updating. YouTube Video:
How to Enable Root Account and Enable Username/password Access in GCP
By default, Google Compute Engine offers the browser-based Google Cloud Platform Console tool that lets you manage your Google Compute Engine resources through a graphical interface. Use the GCP Console…
Using Group Policy to Deploy Software Packages (MSI, MST, EXE)
Group Policy is a feature of Windows Server using which admins can install software on all user computers. It can be done remotely without manual intervention. GPO is short for…
Install ESXi 5.1/5.5/6.0 into Mac Mini 3.1 (Later 2009)
It is not new to install ESXi on Mac Mini for technical person . There are lots of benefits to do this. I have been used ESXi 5.5/6 on my…
Using NXLog to Collect Windows Event Logs
There are a lot of syslog collectors for Windows, but when it comes to stability and features, NXlog has the best chances to fulfill all the requirements. Windows EventLog allows…
Windows Server Configuration Tips and Tricks
Building a lab to test some Windows services , AD, DNS, DHCP, ADCS, etc. in my VMware ESXi 6 environment, to get it running smoothly and reduce some headache, I…
Common Used Excel Formulas
一、数字处理 1、取绝对值 =ABS(数字) 2、取整 =INT(数字) 3、四舍五入 =ROUND(数字,小数位数) 二、判断公式 1、把公式产生的错误值显示为空 公式:C2 =IFERROR(A2/B2,””) 说明:如果是错误值则显示为空,否则正常显示。
Understanding Ping Command
The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination computer and waiting for a response. How many of those responses are returned,…
Basic Steps to Deploy and Config Symantec DLP 15.5 with Installation Videos
I were working on Symantec DLP project and had some experience with it. This post is going to review what I have been done and how I managed to install…