Skip to content
  • Sun. May 11th, 2025

51 Security

Learning, Sharing, Creating

  • Sitemap
  • NET
    • AI
    • Azure
    • Cisco
    • Cloud
    • Docker
    • F5
    • Juniper
    • Network
    • Vmware
  • SEC
    • Checkpoint
    • CyberArk
    • Fortigate
    • IBM Guardium
    • Palo Alto
    • Security
    • Symantec
    • Thycotic
    • VPN
    • Vulnerability Scan
  • IT
    • Architecture
    • Linux
    • Python
    • Raspberry Pi
    • SIEM
    • Software
    • Threat Hunting
    • Windows
    • Wireless
  • Others
    • All Sites
    • Blog Related
    • Contact Us
    • IT Pro Sec
    • Other Topics
    • Partner
    • About 51Sec
  • Forum
  • Store
    • Shop
    • Cart
    • Checkout
    • My account

Latest Post

Webvm Project – Running A Linux VM in Your Browser (No VPS, No Server) CEHv13 Notes – Module 02: Footprinting and Reconnaissance Underdefense MAXI Platform Understanding TCPDUMP Output Microsoft Defender for Endpoint (MDE) Deployment and Configuration Steps with Security Policy Details
Categories
AI (8) Architecture (29) Azure (23) Blog (27) Checkpoint (80) Cisco (72) Cloud (105) CyberArk (61) Docker (59) F5 (11) Fortigate (24) Free (10) Guardium (18) Juniper (60) Linux (43) Network (55) Others (12) Palo Alto (8) Partner (11) Python (3) Raspberry Pi (8) Security (75) SIEM (27) Software (50) Symantec (14) Threat Hunting (26) Thycotic (21) Uncategorized (2) Vmware (21) VPN (47) Vulnerability Scan (19) Windows (18) Wireless (6)
Recent Posts
  • Webvm Project – Running A Linux VM in Your Browser (No VPS, No Server)
  • CEHv13 Notes – Module 02: Footprinting and Reconnaissance
  • Underdefense MAXI Platform
  • Understanding TCPDUMP Output
  • Microsoft Defender for Endpoint (MDE) Deployment and Configuration Steps with Security Policy Details
  • Kali Tools Usage (proxychain, tor, discover, nmap, msf, sgpt, etc)
Recent Comments
  • Tenable PCI Scans – 51 Security on Tenable Vulnerability Management Specialist – Discovery, Assessment, Analysis, Compliance, Dashboard, Reports, Core, Nessus, Agent, NNM, Access Control
  • Chris on How to Upgrade Windows 10 Evaluation Version to Full Version
  • netsec on Methods to Renew Microsoft 365 Developer Subscription
  • developer on Methods to Renew Microsoft 365 Developer Subscription
  • philip on Install WSA (Windows Subsystem for Android) and Android Apps In Windows 11 W/O Amazon Appstore
  • Sudhanshu Shekhar on CyberArk 12.1 Lab – 5. PSM Installation
Archives
  • RSS - Posts
  • RSS - Comments
51Sec Sites
51sec Sites 51sec Navigation

51sec OneDrive 51sec Google Drive
VPN Recommendation: Best VPN With Great Discount
Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]
Linux

Change Windows to *NIX like OS on Microsoft Surface Pro:Support Wifi/Bluetooth/TouchScreen/Battery Status (No Camera)

2023-02-01 netsec

This post is used to record the steps how I changed my Surface Pro from Windows to those ChromeOS like systems. The Surface Pro 7 original OS is Windows 10,…

Blog

[Free Hosting] x10hosting : WordPress in 5 Minutes with Your Own Domain and SSL Auto-Renew

2023-01-10 netsec

x10 Free hosting for the masses since 2006!

Azure

Enable Azure File Shares SMB Over QUIC

2023-01-10 netsec

This post summarize a easy way with detailed steps to enable SMB over QUIC using a Windows 2022 Azure Edition server in the Azure Cloud without joined domain or owning…

Software

Some Alist Advanced Usages

2023-01-10 netsec

This post summarized some advanced usages of AList.

Security

Barracuda Basic Firewall Access-list Policy Lab

2023-01-10 netsec

This post is a continuous post from previous one Barracuda CloudGen Firewall F12 Initial Configuration Lab. In this post, I am gonna show you how to configure WAN / LAN…

Architecture

TOGAF Knowledges Collection

2023-01-10 netsec

TOGAF®, an Open Group standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. TOGAF® helps practitioners avoid being locked into…

Architecture

Cybersecurity Governance Overview

2023-01-10 netsec

Cybersecurity governance refers to the component of governance that addresses an organization’s dependence on cyberspace in the presence of adversaries. The ISO/IEC 27001 standard defines cybersecurity governance as the following:…

Docker

[5 Mins Docker] Minimalist Web Notepad – A Simple Online Notepad

2022-12-23 netsec

This post introduces a small open source project from Github pereorga/minimalist-web-notepad, It creates a online web notepad for you to store your text and at the same time you can…

Azure Cloud

Configure NTFS Permissions (Windows ACLs) on Azure File Share Folders

2022-12-23 netsec

We can configure Windows access control lists (ACLs), also known as NTFS permissions, at the root, directory, or file level on directory and file level over mounted file share(s). While…

Architecture

Cybersecurity Architecture Knowledge Overview

2022-12-23 netsec

What is Cybersecurity Architecture: The practice of designing computer systems to ensure the security of underlying data.

Architecture

Cybersecurity Architecture Practice Overview

2022-12-23 netsec

This post summarizs some popular practical security architecture designs / concepts from different security vendors.

Docker

[5 Mins Docker] Koel – An Open Source Personel Music Streaming Software

2022-12-23 netsec

Koel is a web-based audio streaming service written in the Laravel PHP framework. It allows you to stream your personal music collection and access it from anywhere in the world.…

Posts pagination

1 … 13 14 15 … 82

You missed

Linux

Webvm Project – Running A Linux VM in Your Browser (No VPS, No Server)

2025-03-21 netsec
Threat Hunting

CEHv13 Notes – Module 02: Footprinting and Reconnaissance

2025-03-21 netsec
Threat Hunting

Underdefense MAXI Platform

2025-03-21 netsec
Network

Understanding TCPDUMP Output

2025-03-21 Jon
Top Posts
  • Free Software Across the Great Firewall (免费翻墙软件)
  • How to Get a Free Temporary Windows Virtual Machine in the Cloud
  • Juniper SRX DB mode (Debug mode)
  • CyberArk PAS Integration with LDAP,NTP,SMTP,SIEM,SNMP,Backup,Local Firewall
  • How Firewalls (Security Gateways) Handle the Packets? (Traffic Flow)
NetSec YouTube Channel

51 Security

Learning, Sharing, Creating

Proudly powered by WordPress | Theme: Newsup by Themeansar.

  • Home
  • About Site
  • Cart
  • Checkout
  • Contact Us
  • Forum
  • My account
  • Partner
  • Shop
  • Sitemap
x