Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Links
  • See all results
Home
Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Basic Cisco ASA Troubleshooting

These are a some good commands you can use to help troubleshoot new VPN tunnels....
Read More
Security

Best Practices to Strengthen the Security Posture of your Organization’s Systems

-Maintain up-to-date antivirus signatures and engines. -Keep operating system patches up-to-date. -Disable File and Printer sharing services. If these services...
Read More
Security

Bouncing VPN Tunnels

#####PALO ALTO —–GUI: Refresh or restart an IKE gateway. 1. Select Network > IPSec Tunnels and select the tunnel for...
Read More
Security

Certificate Testing Site

This site is good for testing thinks like TLS versions and Untrusted Root. https://badssl.com/ https://untrusted-root.badssl.com https://tls-v1-0.badssl.com/ https://tls-v1-1.badssl.com/ https://tls-v1-2.badssl.com/...
Read More
Laptops & DesktopsSecurityServers

Changing the MAC Address on a Kali Box

First look at the MAC Address for your device (there are many ways): ifconfig | grep ether or cat /sys/class/net/*/address...
Read More
CloudData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

BCP – Business Continuity Planning

Business Continuity Planning (BCP) for IT Networking is a crucial aspect of ensuring the availability and resilience of network infrastructure...
Read More
Security

Blocklists of Suspected Malicious IPs and URLs

CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Certificate Chains

HOW CERTIFICATE CHAINS WORK Certificate chains, also known as a chain of trust, work on the concept of Public Key...
Read More
CloudData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersWireless

Certificates Self Signed vs 3rd Party

Here’s an explanation of the importance of self-signed certificates and third-party certificates in the context of certificate chains: Self-Signed Certificates:...
Read More
Security

CISA Free Cybersecurity Services and Tools

Load More

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) Architect AWS Best Practices BGP BIP-IP DNS Certificates CISA Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco Nexus Cisco Stack Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Kali macOS Microsoft IIS Microsoft SQL Microsoft Windows Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports Power and Cooling PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting VMWare
To The Top
© 2023 cordero.me • All Rights Reserved

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) Architect AWS Best Practices BGP BIP-IP DNS Certificates CISA Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco Nexus Cisco Stack Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Kali macOS Microsoft IIS Microsoft SQL Microsoft Windows Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports Power and Cooling PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco ASA
See all results