Install WordPress on Raspberry Pi
Raspberry Pi is mostly ready for use after the basic configuration completed in my previous posts: Raspberry Pi 2 Model B Basic Configuration Part 2 Raspberry Pi 2 Model B…
Microsoft Office Tips and Tricks (Word, Visio, Outlook, PDF)
This post is to collect some tips and tricks from my own IT experience. Some of them collected from Internet.
Sysinternals Tool Sysmon Usage Tips and Tricks
Microsoft Sysinternals tool Sysmon is a service and device driver, that once installed on a system, logs indicators that can greatly help track malicious activity in addition to help with…
Proofpoint Wombat Security Awareness Training – Phishing Campaign Step by Step
Wombat ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on fighting phishing attacks. Wombat ThreatSim Phishing Simulations serivce has SaaS-based interface which…
Ubuntu 16.04.5 LTS (Xenial Xerus) Installation Step by Step in VMWare Workstation (Not Easy Installation)
1. Ubuntu16.04 Installation 1.1 VMware Workstation Virtual Machine Creation for not easy installation If you are using VMware workstation , by default, system will do easy installation for you, which…
Expose your local service to public: Ngrok, FRP, localtunnel
For many IT workers remotely involved with networking, it is quite common to need to expose your Intranet application to the outside world in a secured manner. Unfortunately, we work…
Gartner Magic Quadrant for Enterprise Network Firewall (2022-2010)
Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products must be able to support single-enterprise firewall deployments and…
Gartner Magic Quadrant for Unified Threat Management (2018,2017,2016,2015,2014,2013,2012,…)
Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs) (< 1000 employees). 2018 Gartner Magic Quadrant for Unified Threat…
ArcSight SIEM Logger Web, Search Examples, Use Case Reports
ArcSight Logger is one of products from Micro Focus SIEM platform. It streams real-time data and categorizes them into specific logs and easily integrates with Security Operations. As a result,…
Python Cyber Security Testing Tool Collection
Networking Scapy: send, sniff and dissect and forge network packets. Usable interactively or as a library pypcap, Pcapy and pylibpcap: several different Python bindings for libpcap libdnet: low-level networking routines,…
Understanding GDPR from Security Professional’s Perspective
One of the most recent and wide-ranging laws impacting the security profession globally is the European Union’s General Data Protection Regulation, or GDPR. As of May 25, 2018, the GDPR…
Cyber Security Frameworks and Integrated with TOGAF
When cyber security professionals talking about related frameworks, it always comes to two which is ISO and NIST. There are lots of confusions between them and also between Frameworks and…