Install WordPress on Raspberry Pi
Raspberry Pi is mostly ready for use after the basic configuration completed in my previous posts: Raspberry Pi 2 Model B Basic Configuration Part 2 Raspberry Pi 2 Model B…
Learning, Sharing, Creating
Raspberry Pi is mostly ready for use after the basic configuration completed in my previous posts: Raspberry Pi 2 Model B Basic Configuration Part 2 Raspberry Pi 2 Model B…
This post is to collect some tips and tricks from my own IT experience. Some of them collected from Internet.
Microsoft Sysinternals tool Sysmon is a service and device driver, that once installed on a system, logs indicators that can greatly help track malicious activity in addition to help with…
Wombat ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on fighting phishing attacks. Wombat ThreatSim Phishing Simulations serivce has SaaS-based interface which…
1. Ubuntu16.04 Installation 1.1 VMware Workstation Virtual Machine Creation for not easy installation If you are using VMware workstation , by default, system will do easy installation for you, which…
For many IT workers remotely involved with networking, it is quite common to need to expose your Intranet application to the outside world in a secured manner. Unfortunately, we work…
Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products must be able to support single-enterprise firewall deployments and…
Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs) (< 1000 employees). 2018 Gartner Magic Quadrant for Unified Threat…
ArcSight Logger is one of products from Micro Focus SIEM platform. It streams real-time data and categorizes them into specific logs and easily integrates with Security Operations. As a result,…
Networking Scapy: send, sniff and dissect and forge network packets. Usable interactively or as a library pypcap, Pcapy and pylibpcap: several different Python bindings for libpcap libdnet: low-level networking routines,…
One of the most recent and wide-ranging laws impacting the security profession globally is the European Union’s General Data Protection Regulation, or GDPR. As of May 25, 2018, the GDPR…
When cyber security professionals talking about related frameworks, it always comes to two which is ISO and NIST. There are lots of confusions between them and also between Frameworks and…