Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Unraveling The Tactics of Storm-1359: An In-depth Look Into Sophisticated L7 DDoS Attacks

In recent times, the cybersecurity landscape has become more challenging than ever. Microsoft grappled with a series of Distributed Denial...
Read More
Security

CyberArk – Push and Pull Methods

The “push” and “pull” methods in CyberArk are primarily used for managing service accounts. However, they are not exclusive to...
Read More
Security

CyberArk PAM and Access Management

CyberArk is a comprehensive cybersecurity platform that offers solutions for a multitude of security issues, including privileged access management (PAM)....
Read More
Laptops & DesktopsSecurityServers

Curl – Test TLS and HTTP versions

To test TLS versions and HTTP versions using CURL, you can specify the desired TLS and HTTP versions using the...
Read More
Security

Security – DNS

DNS (Domain Name System) is an essential part of the internet’s infrastructure that translates human-friendly domain names to IP addresses....
Read More
Security

CyberArk – applicationHost.config vs web.config

Both `applicationHost.config` and `web.config` can be used when managing IIS applications with CyberArk, and the choice between the two generally...
Read More
Security

Sonatype – Keeping Open Source Secure

Sonatype Nexus Lifecycle is a part of the Sonatype Nexus platform, a suite of tools designed to help automate open-source...
Read More
Laptops & DesktopsSecurityServers

Powershell – Remote Commands

OPTION 1 To run the `ipconfig /displaydns` command on a remote PC named “pc-kcordero” in a Windows environment, you can...
Read More
Security

Security – DDOS

Distributed Denial-of-Service (DDoS) attacks are indeed a prevalent type of cyberattack. In a DDoS attack, the attacker overloads a network,...
Read More
Laptops & DesktopsRouting & SwitchingSecurity

Windows File Transfer Options

Transferring files from a Windows server/pc/laptop to a file share can be achieved by several means. The fastest method, however,...
Read More
Load More

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • AI
  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Microsoft IIS Microsoft SQL Microsoft Windows Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS snmp Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare Zscaler
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results