Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

10 Malware Protection Best Practices

1. Update your frontline defenses Adhere to policies and best practices for application, system, and appliance security. Create unique passwords...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

What is Ansible and What Are the Format Options Like YAML

Ansible is an open-source software automation platform written primarily in Python. Known for its simplicity and agentless architecture, It has...
Read More
Security

Certificate Testing Site

This site is good for testing thinks like TLS versions and Untrusted Root. https://badssl.com/ https://untrusted-root.badssl.com https://tls-v1-0.badssl.com/ https://tls-v1-1.badssl.com/ https://tls-v1-2.badssl.com/...
Read More
Security

CyberArk – applicationHost.config vs web.config

Both `applicationHost.config` and `web.config` can be used when managing IIS applications with CyberArk, and the choice between the two generally...
Read More
Security

Palo Alto Test a Sample Malware File

Step 1: Download one of the malware test files. You can select from PE, APK, MacOSX, and ELF. If you...
Read More
Security

Palo Alto – Monitoring GlobalProtect VPN User Logins

When monitoring GlobalProtect VPN user logins on a Palo Alto firewall, you can find the following details in the authentication...
Read More
Security

Cisco ASA VPN Timeouts

There are two settings I’d like to write about and those vpn-idle-timeout and vpn-session-timeout. You’ll make changes to both for...
Read More
Security

Palo Alto – URL Filtering with Service/URL Tab vs URL Filtering Profile in Security Profile

Setting up rules on a Palo Alto firewall requires a clear understanding of URL Filtering, especially when comparing the Service/URL...
Read More
Data CenterLaptops & DesktopsRouting & SwitchingSecurityServersWireless

SNMP Polling vs Traps

The difference between these is who is initiating the conversation. In Polling, the monitoring server is initiating the conversation asking...
Read More
Security

Advantages of Using Palo Alto Firewalls Over Traditional Proxies

Simplified Deployment and Management No Client-Side Configuration: Ease of Deployment: Palo Alto Firewalls do not require configuring each workstation individually,...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Storage Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Storage Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results