Smallest Firewall / Router VM in My Vmware ESXi and Workstation
In my home lab virtual environment, VMware ESXi and Workstation used to host most of my testing virtual machines. To get those VMs working together in a multi networks diagram,…
Learning, Sharing, Creating
In my home lab virtual environment, VMware ESXi and Workstation used to host most of my testing virtual machines. To get those VMs working together in a multi networks diagram,…
Basically I am creating a script to build SSH connection from my Windows 7 network management computer to Cisco devices and have interactive commands with those Cisco devices. This has…
1. Install Python into Windows 1.1 Download Latest Python 2 file from https://www.python.org/downloads/windows/ Latest Python 3 Release – Python 3.7.0 Latest Python 2 Release – Python 2.7.15 1.2 Double Click…
Cisco IOS command list is getting longer , and it has been split into two posts: Cisco IOS Command Tips and Tricks – Part 1 Cisco IOS Command Tips and…
We always can share Compute Engine images, snapshots, and disks with other users outside of your project or organization. Basically users with read access to those resources can use them…
The Symantec Diagnostic Tool (SymDiag) is a multi-product, multi-language diagnostic, and security analysis utility. SymDiag is provides self-help support for Symantec product technical issues, zero-day threat analysis, best practice recommendations,…
As long as your web application published on Internet, one day it will face the hackers scanning. There is no 100% security and you always want to find out the…
PALADIN is a bootable forensic Linux distribution based on Ubuntu and is developed and provided as a courtesy by SUMURI. The boot process has been modified to assure that the…
1. Clear VPN Configuration: clear configure crypto map VPN_AAAA 2. Debug and show commands: Enable logging: ciscoasa#terminal monitor ciscoasa(config)# logging buffer-size 1048576 ciscoasa(config)# logging buffered 7 ciscoasa(config)# logging monitor 7…
Today received a report from user, computer is slow and seems have been infected with unknown virus or malware. No special symptoms except slow. 1. Check task manager and resource…
The NGFW is the first line of defense to protect against today’s evolving threats and is a critical component of any defense-in-depth strategy. The NSS Labs NGFW test methodology has…
In the context of this Magic Quadrant, cloud compute IaaS (hereafter referred to simply as “cloud IaaS” or “IaaS”) is defined as a standardized, highly automated offering, where compute resources,…