Canada CRA Email / Message Scam Example and Phone Call Scam Fraud Recording 2018
One of the top scams happening in Canada is CRA Scam, also called Income Tax Scams. Over $5 million was lost to income tax scams in 2017. The Canada Revenue…
Configure Cisco Enterprise Access Point 1142N As Home AP
Early of 2018, I got a chance to buy a Cisco Wireless Access Point with only $30, which is a great deal for AIR-LAP1142N-x-K9 – Dual-band Controller-based 802.11a/g/n. It is…
Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (2018, 2017, 2015, 2013, 2012, 2010 …)
According to Gartner, “The network intrusion prevention system market has undergone dynamic evolution, increasingly being absorbed by next-generation firewall placements. Nextgeneration IPSs are available for the best protection, but the…
Gartner Magic Quadrant for Web Application Firewalls (2020 – 2016)
A web application firewall (WAF) is an application firewall for HTTP applications. It applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as…
Install T-Pot into Google Cloud Platform VM Instance
T-Pot is a honeypot platform built on Ubuntu with Dock technology. Latest version is 17.10 and OS is Ubuntu 16.04. The minimum system requirement is at least 2GB RAM and…
Create a MySQL Computer Engine VM Instance Using Ubuntu in Google Cloud
1. Create Ubuntu VM Instance
Cisco Web Security Appliance S190 – Web GUI
Cisco® Web Security Appliance (WSA) offers malware protection, application visibility and control, acceptable use policy controls, insightful reporting and secure mobility to enterprise network. The Cisco WSA is a forward…
How to Find Out Windows Process Sending Traffic, Especially ICMP Packets
There are a number of different ways to find out which process is sending tcp / udp traffic in computer systems, but not much for icmp traffic. Here is a…
ArcSight SIEM Logger
ArcSight Logger is one of products from Micro Focus SIEM platform. It streams real-time data and categorizes them into specific logs and easily integrates with Security Operations. As a result,…
Red hat Openshift Deploy Image Example – Create V2Ray Server
Red Hat® OpenShift® is a comprehensive enterprise-grade application platform, built for containers with Kubernetes. It can automate the build, deployment, and management of applications so that you can focus on…
Configure Fortigate DDNS with free DDNS service noip.net
Using a Dynamic Domain Name Service (DDNS) means that users can reach your network by means of a domain name that remains constant even when its IP address changes. FortiOS…
FortiOS Configuration for FortiGate Firewalls (Tips and Tricks) 2
FortiGate firewall always surprise me with his rich embedded features, prices and performance. FortiOS is a security-hardened, purpose-built operating system that is the software foundation of FortiGate products. With this…