Skip to content
  • Mon. May 12th, 2025

51 Security

Learning, Sharing, Creating

  • Sitemap
  • NET
    • AI
    • Azure
    • Cisco
    • Cloud
    • Docker
    • F5
    • Juniper
    • Network
    • Vmware
  • SEC
    • Checkpoint
    • CyberArk
    • Fortigate
    • IBM Guardium
    • Palo Alto
    • Security
    • Symantec
    • Thycotic
    • VPN
    • Vulnerability Scan
  • IT
    • Architecture
    • Linux
    • Python
    • Raspberry Pi
    • SIEM
    • Software
    • Threat Hunting
    • Windows
    • Wireless
  • Others
    • All Sites
    • Blog Related
    • Contact Us
    • IT Pro Sec
    • Other Topics
    • Partner
    • About 51Sec
  • Forum
  • Store
    • Shop
    • Cart
    • Checkout
    • My account

Latest Post

Webvm Project – Running A Linux VM in Your Browser (No VPS, No Server) CEHv13 Notes – Module 02: Footprinting and Reconnaissance Underdefense MAXI Platform Understanding TCPDUMP Output Microsoft Defender for Endpoint (MDE) Deployment and Configuration Steps with Security Policy Details
Categories
AI (8) Architecture (29) Azure (23) Blog (27) Checkpoint (80) Cisco (72) Cloud (105) CyberArk (61) Docker (59) F5 (11) Fortigate (24) Free (10) Guardium (18) Juniper (60) Linux (43) Network (55) Others (12) Palo Alto (8) Partner (11) Python (3) Raspberry Pi (8) Security (75) SIEM (27) Software (50) Symantec (14) Threat Hunting (26) Thycotic (21) Uncategorized (2) Vmware (21) VPN (47) Vulnerability Scan (19) Windows (18) Wireless (6)
Recent Posts
  • Webvm Project – Running A Linux VM in Your Browser (No VPS, No Server)
  • CEHv13 Notes – Module 02: Footprinting and Reconnaissance
  • Underdefense MAXI Platform
  • Understanding TCPDUMP Output
  • Microsoft Defender for Endpoint (MDE) Deployment and Configuration Steps with Security Policy Details
  • Kali Tools Usage (proxychain, tor, discover, nmap, msf, sgpt, etc)
Recent Comments
  • Tenable PCI Scans – 51 Security on Tenable Vulnerability Management Specialist – Discovery, Assessment, Analysis, Compliance, Dashboard, Reports, Core, Nessus, Agent, NNM, Access Control
  • Chris on How to Upgrade Windows 10 Evaluation Version to Full Version
  • netsec on Methods to Renew Microsoft 365 Developer Subscription
  • developer on Methods to Renew Microsoft 365 Developer Subscription
  • philip on Install WSA (Windows Subsystem for Android) and Android Apps In Windows 11 W/O Amazon Appstore
  • Sudhanshu Shekhar on CyberArk 12.1 Lab – 5. PSM Installation
Archives
  • RSS - Posts
  • RSS - Comments
51Sec Sites
51sec Sites 51sec Navigation

51sec OneDrive 51sec Google Drive
VPN Recommendation: Best VPN With Great Discount
Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]
Windows

Enable Win10 Home RDP (Terminal Service) Feature

2022-11-15 netsec

Different editions of the Windows operating system have varying feature sets and properties. An example of an important difference between Windows 10 Professional and Home editions is the Remote Desktop…

Palo Alto

Palo Alto VM-Series Firewall Configuration in Azure

2022-11-15 Jon

There are some configuration on Azure network to get your Palo Alto firewall working well for the passing through traffic. Especially for ping traffic, by default, you wont be able…

Azure Cloud

Azure Security Best Practices

2022-11-09 Jon

This post summarizes some collected best practice resources relating to Microsoft Azure Security.

Security

CIS Controls Self-Assessment Tool CSAT and Create Assessment (On Prem or CIS Hosted)

2022-10-15 netsec

The CIS Controls Self-Assessment Tool, or CIS CSAT, is a free web application that enables security leaders to track and prioritize their implementation of the CIS Controls. CIS CSAT’s questions…

Security

Execute System Security Configuration Assessment Using Free CIS-CAT® Lite (Download, Run, Scan)

2022-10-15 netsec

CIS-CAT Lite is the free assessment tool developed by the CIS (Center for Internet Security, Inc.). CIS-CAT Lite helps users implement secure configurations for multiple technologies. With unlimited scans available…

Network

Unimus Network Automation and Configuration Management Software Download, Installation and Configuration

2022-10-15 netsec

Unimus makes Network Automation and Configuration Management easy. It mainly focus following three functions: Network Automation Configuration Backup Change Management And more can be found from this link: https://unimus.net/features.html In…

Software

Use RobCop (RoboCopy) to Migrate Files

2022-10-15 netsec

RoboCop RoboCopy is a GUI skin and script generator for Robocopy.exe (Win NT Resource Kit). RoboCop RoboCopy is unlike any other robocopy script generator available since it has the ability…

Cloud

Add FREE 75GB Storage to Your Own VPS (Scaleway S3 Free Storage Bucket)

2022-09-26 netsec

Previously I have done this similar integration for Backblaze in following post; Create Your Own Cloud Photo Storage Site in BackBlaze B2 Using Cloudflare and ShareX But that was directly…

Docker

Using Portainer to Deploy Guacamole As Web Based Remote Access Gateway (Updated)

2022-09-26 Jon

About 3 years ago, I had a post to show how to use Portainer to deploy Guacamole Using Portainer to Deploy Guacamole Docker- Web-based Remote Access Gateway The docker and…

Software

Multimedia Editor Software (ActivePresenter, Audacity)Tips and Tricks

2022-09-26 netsec

ActivePresenter is all-in-one screencasting, video editing, and eLearning authoring software, which has lots outstanding features to design interactive eLearing courses or create a power screen recorder videos. Free Edition is…

Cisco

Cisco Nexus 5000 Switches Basic Configuration

2022-09-26 netsec

This post summarize some basic configuration for Cisco Nexus switches.

Cisco

Cisco Firepower 1010 Basic Configuration

2022-09-26 netsec

This post shows a basic configuration step for a HA setup of two Firepower 1010.

Posts pagination

1 … 16 17 18 … 82

You missed

Linux

Webvm Project – Running A Linux VM in Your Browser (No VPS, No Server)

2025-03-21 netsec
Threat Hunting

CEHv13 Notes – Module 02: Footprinting and Reconnaissance

2025-03-21 netsec
Threat Hunting

Underdefense MAXI Platform

2025-03-21 netsec
Network

Understanding TCPDUMP Output

2025-03-21 Jon
Top Posts
  • CEHv13 Notes - Module 02: Footprinting and Reconnaissance
  • Free Software Across the Great Firewall (免费翻墙软件)
  • Webvm Project - Running A Linux VM in Your Browser (No VPS, No Server)
  • How to Get a Free Temporary Windows Virtual Machine in the Cloud
  • Use V2rayN (V2ray Client) to Protect Your Online Privacy & Bypass Internet Censorship
NetSec YouTube Channel

51 Security

Learning, Sharing, Creating

Proudly powered by WordPress | Theme: Newsup by Themeansar.

  • Home
  • About Site
  • Cart
  • Checkout
  • Contact Us
  • Forum
  • My account
  • Partner
  • Shop
  • Sitemap
x