I noticed that the Okta Voice Call Authentication callback option for MFA was not working for my Cell phone number....
JoinedMay 2, 2023
Articles673
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
When setting up your system, it’s crucial to understand how this algorithm operates. It utilizes priority and response time to...
The difference between these is who is initiating the conversation. In Polling, the monitoring server is initiating the conversation asking...
I already posted about NTP in a Windows domain. I want to briefly talk about stratum numbers. I’ve been in...
[Command not found: telnet] [Could not create a new process and open a pseudo-tty.] When I was using my Macbook...
The key difference is the Elastic IP does NOT change if you terminate or restart an instance. Think of it...
1. Programs with cached credentials 2. Changed password in a service account 3. Having a bad password limit that’s too...
Network Bits Subnet Mask Number of Subnets Number of Hosts /8 255.0.0.0 0 16777214 /9 255.128.0.0 2 (0) 8388606...
Having a VAR and/or Vendor relationship is very important from a business perspective. Building that relationship is one of the...