I’ve carried the Architect title over the years of being in IT. Below is my opinion on the difference between...
If you’re looking to improve your network security by inspecting encrypted traffic using Palo Alto firewalls, you’re in the right...
A Forward Proxy and a Reverse Proxy are two different types of proxies with distinct functionalities: Forward Proxy: A forward...
Something to keep in mind is when you ping from a Palo Alto firewall via the CLI, it’s going to...
There’s a lot you need to think about when designing your Splunk environment. I’m hoping to keep adding to this...
First look at the MAC Address for your device (there are many ways): ifconfig | grep ether or cat /sys/class/net/*/address...
Understanding the behavior of TCP retransmissions in packet capture, particularly in the context of companies that whitelist IP addresses, is...
Qualys SSL Labs’ SSL Client Test: Qualys Client Test...
Let’s go through the steps and data flow when using `curl` to make an HTTPS request and check for an...