Excel Formula: Search a Column of Strings to Match Another Column
Once a while, I have to work on Excel sheet manually. Today I have to search exported hundreds of ip addresses in a pre-defined excel spreadsheet to see if there…
Learning, Sharing, Creating
Once a while, I have to work on Excel sheet manually. Today I have to search exported hundreds of ip addresses in a pre-defined excel spreadsheet to see if there…
One of our SRX240H is having temperature problem. Whenever the temperature reached 50 Celsius degree, system alarm will be on. Alarm email should be sent out when temperature reached threshold…
Not sure how many Checkpoint customers are using this service, but it is quite attractive when I heard about it. It will help your remote users connect with your global…
This error message is coming in the one of our router’s log constantly. 081062: Feb 18 09:24:08.621 EST: %CERM-4-TX_BW_LIMIT: Maximum Tx Bandwidth limit of 85000 Kbps reached for Crypto functionality…
Part 1 has shown how to install the software Tacacs+ on a windows 2008 server and some fastest configuration to get it working with your Windows server administrators group. In…
Both RADIUS and TACACS+ provides centralized validation of users attempting to gain access to a both protocols supported network devices, which provides Authentication, Authorization, and Accounting (AAA) services on network…
If you are still not knowing FnF (Flexible Netflow) technology, probably your Netflow knowledge did not get updated for last a couple of years. Basically Flexible Netflow allows user to…
All information are collected from Internet. From: https://pao-pao.net/article/111 从2015年1月1日开始的,Chinese GFW升级,很多免费翻墙软件相继失效. Here are some may still working: 1. 自*由*门 翻墙软件中的“常青树”。最新版本7.52依然好用,就是速度稍微慢了一点。 How to Use Link: 翻墙七种武器之多情环:自由门与无界 2. 无*界*浏*览*14.04 无界,几乎算作自由门的姐妹款,是由美国无界万国公司创建在GIFT技术平台上的免费软件,也是由海外法轮功学院所开发,和动态网同属于美国自由网络联盟,曾经被哈弗大学在2007年的研究调查中被评为“效果最好的翻墙工具”. Usage is same…
GHOST is a ‘buffer overflow’ bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. If a remote attacker can make an application call to gethostbyname() or gethostbyname2(),…