curl -Is https://{SITE}.com | head -1 HTTP/2 200 curl -Is https://{SITE}.com/login.asp | head -1 HTTP/2 404 curl -Is http://{SITE}.com |...
JoinedMay 2, 2023
Articles647
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
HOW CERTIFICATE CHAINS WORK Certificate chains, also known as a chain of trust, work on the concept of Public Key...
A concept known as the update group was developed to make BGP processing more efficient. Under the default settings, BGP...
I wanted a way to server for servers with specific partial names. For example, let us say I’m searching for...
Border Gateway Protocol (BGP) is an essential internet protocol that manages how packets get routed across the internet by exchanging...
1. Update your frontline defenses Adhere to policies and best practices for application, system, and appliance security. Create unique passwords...
BFD, which stands for Bidirectional Forwarding Detection, is a protocol used to detect faults within a network. Specifically, it is...
-Maintain up-to-date antivirus signatures and engines. -Keep operating system patches up-to-date. -Disable File and Printer sharing services. If these services...
Layer 2 hardening involves implementing various security features and practices to enhance the security and stability of Layer...