Run Commands as Administrator in Windows 10 Command Line and PowerShell
There are lots of limitations when trying to troubleshoot end user computer. I have to log in with their normal user account and see what is happening to their machine.…
Learning, Sharing, Creating
There are lots of limitations when trying to troubleshoot end user computer. I have to log in with their normal user account and see what is happening to their machine.…
GoIndex is a Google Drive directory indexing program deployed on Cloudflare Workers . It does not need to provide a server. It can directly list all the files on your…
It might not make sense to use RDP to remote linux machines. The speed and performance all are not that good from my point to view. But in certain situation,…
This post is only used to record some middleware projects’ commands. I found that every time I need to start a lot of middleware on Windows is particularly troublesome. I…
The Linux kernel includes the Netfilter subsystem, which is used to manipulate or decide the fate of network traffic headed into or through your server. All modern Linux firewall solutions…
Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Security and…
Using CyberArk PVWA and PSM to manage SQL Server Management Studio connection is one of use cases in the project. Unfortunately, there was not much detailed documentation how we can…
Research firm Gartner defines the Endpoint Protection Platform (EPP) market as one with offerings that “provide a collection of security capabilities to protect PCs, smartphones and tablets,” which it said…
GIM & S-Tap Download 1.) Download GIM to Assigned Database servers 1.) https://www-945.ibm.com/support/fixcentral/ 2.) Select the current/correct Fix Pack. This implementation is Guardium v11 GIM, S-TAP, GIM AIX & S-TAP…
Guardium Project Overview The project scope is to implement the IBM InfoSphere Guardium V11 VM appliances by utilizing the Guardium Installation Manager (GIM) to setup and monitor privileged user activities…
Cloud service providers often define host tiers by the allocated resources, but the differences in the underlying hardware, architecture and performance tuning can result in varying capabilities even between similar…
Basic Installation The IBM Guardium V10.1 Software Appliance Technical Requirements can be found here: http://ibm.co/2gd5ZRq. Additional installation detail can be found here: http://ibm.co/2h0exMw.