Tutorials

Beginner’s Guide: Nagios Core

By John Cirelly on August 16, 2022

Nagios Core is the primary event scheduler, event processor, and alert manager for monitored elements. It is a daemon developed in C for performance and designed to run natively on systems, with several APIs that allow it to execute extra functions. What Exactly is Nagios? Nagios is available free of charge and can be used […]

How to Query Cisco ISE Using TACACS

By John Cirelly on August 9, 2022

The Cisco Identity Services Engine, or Cisco ISO, is a powerful platform for network access control policy and enforcement. It supports the TACACS+ protocol, which makes it possible to perform detailed controls and audits on network configurations and devices. You have the option of configuring your network devices to submit authentication and authorization requests to […]

How to add a static route using a PowerShell cmdlet

By John Cirelly on August 9, 2022

Since static routes do not take part in any kind of automatic discovery process, it is very easy to manage and configure them. A list of potential destinations can be generated using a static route by combining the network address of the destination with the subnet mask. Static routes are very straightforward. The Windows operating […]

Installing a secure FTP server on Windows using IIS

By John Cirelly on August 9, 2022

You might want to install a secure File Transfer Protocol (FTP) server on Windows so that you can either store files independently or have a way to edit your website that is hosted on an Internet Information Services (IIS) web server. In either scenario, you have the option of utilizing an integral part of the […]

GPU Update – How to Force Group Policy Update Remotely

By John Cirelly on July 30, 2022

Imagine that the security expert who manages your firewalls and proxy servers contacts you by phone. You answer the call and find out that they have an urgent matter. He informs you that he has created a supplementary proxy server for people who are going to be accessing the internet. You create a new GPO […]

How to Disable Network Access to Windows Registry

By John Cirelly on July 28, 2022

Windows relies on the registry to administer and operate your computer. It does this by facilitating access to essential resources and assisting essential apps in configuring their settings. The registry is composed of a hierarchical database structure that is made up of keys and values. Your computer has the capability of enabling network access to […]

How To Lockdown USB Ports

By John Cirelly on July 28, 2022

We are frequently required to let another person use either our laptop or our personal computer. A person who is malicious and possesses a pen drive that is infected with viruses and other malicious files can inject these malicious files into the system, which can cause damage to the device. Additionally, someone who is malicious […]

How to Protect Your Data at Rest

By John Cirelly on July 28, 2022

The term “data at rest” refers to any data that your workload requires you to keep in a non-volatile storage medium for any length of time. This includes file systems, databases, archives, Internet of Things devices, and any other storage medium on which data can be persisted. When encryption and other appropriate access controls are […]

How to Protect Your Backups From Ransomware

By John Cirelly on July 28, 2022

Data is the most valuable currency in the digital age, and threat actors are hiding in the shadows waiting to break into your network and steal your data. Alongside the development of information technology, which is at the forefront of today’s digital economy, cybercrime is also developing at an alarming pace. This is especially concerning […]

How to Protect your USB Firmware from Viruses

By John Cirelly on July 28, 2022

An attack known as a USB attack does what it says: it makes use of a USB-connected device, such as a thumb drive or hard drive, to install malicious software on a computer or another USB-connected device, such as a smartphone. Other examples of USB-connected devices include thumb drives and hard drives. The delivery of […]

How to Install PowerShell Modules: Step by Step 

By John Cirelly on July 28, 2022

A group of connected Windows PowerShell members, such as cmdlets, providers, functions, workflows, aliases, and variables, are grouped in a PowerShell module. Implementation of the components that make up a package can take place either in the form of a PowerShell script, a compiled DLL, or both of these. Typically, these components are arranged in […]

How to Install Adobe Updates Across Your Network

By John Cirelly on July 28, 2022

Administrators can remotely install updates for Adobe applications by utilizing the command-line interface that is provided by Adobe Remote Update Manager, which is also known as RUM. As a result, administrators do not have to individually connect to each client workstation to deploy updates. You can simply make magazine covers, design page layouts, and comics, […]

How to Create an SFTP Server Using Cygwin

By John Cirelly on July 14, 2022

On a server running Linux or Unix, setting up an SFTP server is a very straightforward process. In the vast majority of systems that are similar to Unix, SFTP is already installed by default. If you want to use it, all you need to do is alter a few parameters, such as authentication, users, directory, […]

How to Deploy a Secure FTP (SFTP) Service on Microsoft Azure

By John Cirelly on July 14, 2022

SFTP is an example of a communication protocol that is frequently utilized to transfer files between various types of business environments (SSH File Transfer Protocol or Secure File Transfer Protocol). To this day, Microsoft Azure does not offer a fully managed platform solution that supports the SFTP protocol and enables users to share files with […]

Cloud Security Posture Management Guide

By John Cirelly on May 5, 2022

Due to the increase in Cloud Computing Infrastructure adaptation and moving toward application deployment in the cloud computing environments, cloud security has become more challenging day by day. CSPM is a security solution designed for cloud computing environments that helps identify security risks. The CSPM solution provides support for dealing with security issues for entire […]