Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Palo Alto – Disable Client Probing Now

Palo Alto advises against turning it on. While the documentation warns against using it on “high-security networks,” this could be...
Read More
SecurityServers

Packet Capture – TCPdump

TCPdump is an indispensable tool system administrators, network engineers, and cybersecurity professionals use for network troubleshooting and analysis. The tool...
Read More
Security

Packet Capture – Cisco ASA

Packet capture on a Cisco ASA using the Command Line Interface (CLI) can be done through several methods. Here’s an...
Read More
Laptops & DesktopsSecurity

Quick way to host files using Kali

Sometimes when your in Kali you want a quick and easy way to share files.  One of the ways I...
Read More
Security

Blocklists of Suspected Malicious IPs and URLs

Routing & SwitchingSecurity

Cisco SNMPv3 Config

Below is a working config:...
Read More
Routing & SwitchingSecurity

Packet Capture – Cisco IOS

Certainly, here’s the packet capture procedure on Cisco IOS with specific source IPs, destination IPs, and ports incorporated into the...
Read More
Security

Cisco ASA VPN Filters

ACL looks like this: access-list VPN-FILTER permit {remote-IP} [remote-Port] {local-IP} [local-Port] Examples: LOCAL:              ...
Read More
Security

Free Online Tools for Looking up Potentially Malicious Websites

Laptops & DesktopsSecurityServers

Changing the MAC Address on a Kali Box

First look at the MAC Address for your device (there are many ways): ifconfig | grep ether or cat /sys/class/net/*/address...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Storage Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Storage Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results