Kerry CorderoKISS Design - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Links
Home
Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

10 Malware Protection Best Practices

1. Update your frontline defenses Adhere to policies and best practices for application, system, and appliance security. Create unique passwords...
Read More
Laptops & DesktopsSecurity

A list of SMTP and POP eMail Settings

CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityVOIPWireless

Always be on the Lookout for Product Updates/Changes

What I mean by this, is keep an eye out for emails, alerts within the product, etc… for updates....
Read More
Security

ASA VPN Tunnel Peer IP Change

Using these steps you are trying to minimize downtime. The beauty is that you keep the OLD IP up and...
Read More
Security

Basic Palo Alto User Agent/ID Troubleshooting

Laptops & DesktopsSecurity

A list of SMTP and IMAP eMail Settings

CloudRouting & SwitchingSecurity

Akamai Prolexic Routed DDOS Protection

So what is Akamai prolexic routed DDOS protection? Prolexic Routed is a simple and effective approach for businesses to secure...
Read More
Security

Amazon AWS Cisco ASA Config

A High-Level View of the Customer Gateway The following diagram shows the general details of your customer gateway. Note that...
Read More
Security

Basic Cisco ASA Troubleshooting

These are a some good commands you can use to help troubleshoot new VPN tunnels....
Read More
Security

Best Practices to Strengthen the Security Posture of your Organization’s Systems

-Maintain up-to-date antivirus signatures and engines. -Keep operating system patches up-to-date. -Disable File and Printer sharing services. If these services...
Read More
Load More

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ACS Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack Cisco Wireless DDOS Design DNS EIGRP F5 HP IP Sla Kali Logging macOS Microsoft IIS Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Ports PowerShell QOS snmp Splunk SSL Structured Cabling Troubleshooting VMWare
Copyright © 2022 Kerry Cordero
  • Home
  • About
  • Disclaimer
  • Links

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ACS Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack Cisco Wireless DDOS Design DNS EIGRP F5 HP IP Sla Kali Logging macOS Microsoft IIS Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Ports PowerShell QOS snmp Splunk SSL Structured Cabling Troubleshooting VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows Cisco ASA PDF
See all results