John

Bio:

Strategic technical support professional with seven years of experience in the information technology space. Combines deep industry knowledge with experience providing top of the line technical support.

Grafana Review & Alternatives

By John Cirelly on August 14, 2022

When reading about system monitoring tools, Grafana is frequently mentioned. You will encounter applications like Prometheus, Graphite, Icinga, and Sensu recommending Grafana as a user interface. Therefore, this is a versatile tool that can interface with many data sources. Grafana is more than simply an excellent interface for system monitoring tools. It may also provide […]

Forcepoint Next-Gen Firewall Review & Alternatives

By John Cirelly on August 14, 2022

A Next-Generation Firewall (NGFW) is a network security solution that exceeds the capabilities of a stateful firewall. In the majority of situations, a conventional firewall permits stateful examination of incoming and outgoing network packets. It permits or prohibits network communication based on the source and destination IP addresses, port number, and protocol. Additionally, it filters […]

Forcepoint One Review & Alternatives

By John Cirelly on August 14, 2022

The technique that Forcepoint employs helps clients alleviate the load of administration caused by traditional point product approaches, simplify security operations by working with fewer suppliers, and save expenses by a substantial amount. The authors of the Gartner report that was published on December 1 2021, and titled “Predicts 2022: Consolidated Security Platforms Are the […]

How to Query Cisco ISE Using TACACS

By John Cirelly on August 9, 2022

The Cisco Identity Services Engine, or Cisco ISO, is a powerful platform for network access control policy and enforcement. It supports the TACACS+ protocol, which makes it possible to perform detailed controls and audits on network configurations and devices. You have the option of configuring your network devices to submit authentication and authorization requests to […]

How to add a static route using a PowerShell cmdlet

By John Cirelly on August 9, 2022

Since static routes do not take part in any kind of automatic discovery process, it is very easy to manage and configure them. A list of potential destinations can be generated using a static route by combining the network address of the destination with the subnet mask. Static routes are very straightforward. The Windows operating […]

Installing a secure FTP server on Windows using IIS

By John Cirelly on August 9, 2022

You might want to install a secure File Transfer Protocol (FTP) server on Windows so that you can either store files independently or have a way to edit your website that is hosted on an Internet Information Services (IIS) web server. In either scenario, you have the option of utilizing an integral part of the […]

ManageEngine Applications Manager Vs Datadog

By John Cirelly on August 9, 2022

ManageEngine Applications Manager (APM) is designed to keep essential applications running at peak efficiency in all situations. Datadog is a monitoring service for cloud apps, servers, databases, tools, and services that is located on-premises and in the cloud and uses agents to monitor the infrastructure. In this article, we will discuss ManageEngine and Datadog along […]

Forcepoint SWG Review & Alternatives

By John Cirelly on July 30, 2022

Cloud services provide numerous benefits, but at the same time, it has raised the risk of online threats and assaults. Even with the best firewall solution, cyber attackers know how to make their way to enter your zone and access files and systems. To safeguard your online applications and data, each organization must set up […]

GPU Update – How to Force Group Policy Update Remotely

By John Cirelly on July 30, 2022

Imagine that the security expert who manages your firewalls and proxy servers contacts you by phone. You answer the call and find out that they have an urgent matter. He informs you that he has created a supplementary proxy server for people who are going to be accessing the internet. You create a new GPO […]

How to Disable Network Access to Windows Registry

By John Cirelly on July 28, 2022

Windows relies on the registry to administer and operate your computer. It does this by facilitating access to essential resources and assisting essential apps in configuring their settings. The registry is composed of a hierarchical database structure that is made up of keys and values. Your computer has the capability of enabling network access to […]

How To Lockdown USB Ports

By John Cirelly on July 28, 2022

We are frequently required to let another person use either our laptop or our personal computer. A person who is malicious and possesses a pen drive that is infected with viruses and other malicious files can inject these malicious files into the system, which can cause damage to the device. Additionally, someone who is malicious […]

How to Protect Your Data at Rest

By John Cirelly on July 28, 2022

The term “data at rest” refers to any data that your workload requires you to keep in a non-volatile storage medium for any length of time. This includes file systems, databases, archives, Internet of Things devices, and any other storage medium on which data can be persisted. When encryption and other appropriate access controls are […]

How to Protect Your Backups From Ransomware

By John Cirelly on July 28, 2022

Data is the most valuable currency in the digital age, and threat actors are hiding in the shadows waiting to break into your network and steal your data. Alongside the development of information technology, which is at the forefront of today’s digital economy, cybercrime is also developing at an alarming pace. This is especially concerning […]

How to Protect your USB Firmware from Viruses

By John Cirelly on July 28, 2022

An attack known as a USB attack does what it says: it makes use of a USB-connected device, such as a thumb drive or hard drive, to install malicious software on a computer or another USB-connected device, such as a smartphone. Other examples of USB-connected devices include thumb drives and hard drives. The delivery of […]

How to Install PowerShell Modules: Step by Step 

By John Cirelly on July 28, 2022

A group of connected Windows PowerShell members, such as cmdlets, providers, functions, workflows, aliases, and variables, are grouped in a PowerShell module. Implementation of the components that make up a package can take place either in the form of a PowerShell script, a compiled DLL, or both of these. Typically, these components are arranged in […]