To set up the F5 BIG-IP system to use the Octopus Server health check endpoint, you would typically configure a...
JoinedMay 2, 2023
Articles669
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
DNS (Domain Name System) is an essential part of the internet’s infrastructure that translates human-friendly domain names to IP addresses....
# Author: Kerry Cordero # Version: 1.0.0 # Description: This script prompts for the IP/FQDN, Record Type, DNS Server to...
The less than (lt), less than or equal to (le), greater than (gt), and greater than or equal to (ge)...
Test-NetConnection -ComputerName remote-server -Port port or Test-NetConnection -ComputerName qa-api.cordero.me -Port 443...
Distributed Denial-of-Service (DDoS) attacks are indeed a prevalent type of cyberattack. In a DDoS attack, the attacker overloads a network,...
ERROR Retrying (Retry(total=4, connect=None, read=None, redirect=None, status=None)) after connection broken by ‘SSLError(SSLCertVerificationError(1, ‘[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self signed certificate...
Transferring files from a Windows server/pc/laptop to a file share can be achieved by several means. The fastest method, however,...
Creating a scalable and effective IP address scheme is crucial for network administration. This ensures the network is organized, scalable,...
What is Clos? and how does it relate to Cisco DC Design? The Leaf-and-Spine architecture (also known as a Clos...