Monday, December 28, 2015
Install & Fix Cisco VPN Client on Windows 10 (32 & 64 Bit). Fix Reason 442: Failed to enable Virtual Adapter
Download & Install Cisco VPN Client on Windows 10 & Fix Reason 442: Failed to enable Virtual Adapter error. Covers Windows 10 build 1511 and earlier editions. Full files provided, screenshots along with details instructions.
http://bit.ly/1PsmHIa
Four Security Principles That Help Secure Web Applications & Restrict Access to Sensitive Data
Learn how Web Applications can become more secure, less vulnerable and the recommended steps to avoid security breaches.
http://goo.gl/FIqFGW
Tuesday, December 22, 2015
How to Manually Deploy – Install GFI LanGuard Agent When Access is Denied By Remote Host (Server – Workstation)
When remote deployment of GFI LanGuard 2012, 2014, 2015 agent fails continuously, administrators should switch to the manual deployment - installation of the agent, in order to save time and problems. This article shows how to manually install GFI LanGuard agent.
http://goo.gl/vqWUOj
Monday, December 21, 2015
Free 6 Month Pluralsight Subscription – Free Access to over 4500 Video Courses on IT, Security, Professional Development, Programming, Java, Creative, Design, Business Management & More
Get your free subscription on Pluralsight.com with full access to over 4500 video-based training courses covering hundreds of professions. Expires soon!
http://goo.gl/IDQ0b2
Firewall.cx: 15 Years’ Success – New Logo – New Identity – Same Mission
After 15 years of successfully sharing knowledge and expertise with millions of network and security professionals, Firewall.cx reveals its new Logo - a mission statement that promises to continue delivering high quality network & security articles aiming to help IT professionals around the world.
http://goo.gl/2D3Ttt
Friday, December 11, 2015
Benefits of Deploying GFI LanGuard Agents on Workstations & Servers. Automate Network-wide Agent Scanning & Deployment
Discover the benefits GFI LanGuard Agents have and how to quickly and easily configure them for automatic deployment & scanning of host servers and workstations. Configure Agents to minimize performance impact.
http://goo.gl/FMQuQi
Wednesday, December 9, 2015
How to Detect P2P (peer-to-peer) File Sharing & Torrent Traffic & Users with Capsa Network Analyzer
Learn how network analyzers can identify P2P users & traffic in any network environment and save valuable bandwidth. Identify BitTorrent, mtorrent, eMule, Gnutella clients and more.
http://goo.gl/xlXRa9
Monday, December 7, 2015
Creating a Cross-site Scripting (XSS) Attack. Understanding How XSS Attacks Work & Identifying Web Vulnerabilities
Learn how to code an XSS attack and understand how they work. Cross-site Scripting attack with full explanation for security engineers. Identify XSS vulnerabilities in your code and website applications. Stored, Reflected, and DOM-based XSS attacks.
http://goo.gl/vlf63Z
Thursday, December 3, 2015
Free Webinar: Scripting & Automation in Hyper-V without System Center Virtual Machine Manager (SCVMM)
Get grips with automation and scripting in Hyper-V without System Center Virtual Machine Manager SCVMM. Free Webinar from leading industry experts. Register now!
http://goo.gl/UKblj2
Friday, November 27, 2015
How to Install Desktop Icons (Computer, User’s Files, Network, Control Panel) on Windows 2012 Server
This article shows how to install the Computer, User Files, Network and Control Panel Desktop Icons on Windows 2012 Server. Step-by-step instructions with complete description ensures you’ll have the desktop icons back in less than a few minutes.
http://goo.gl/xQVGsF
Monday, November 23, 2015
How to Configure Email Alerts in GFI LanGuard 2015 – Automating Alerts in GFI LanGuard
Learn how to configure GFI LanGuard’s email alert option and how it can help automate LanGuard’s alerting process for changes and updates detected in the network and hosts (servers, workstations, mobile clients) it is monitoring.
http://goo.gl/kTYH3T
Tuesday, November 17, 2015
How to Scan Your Network and Discover Unpatched, Vulnerable, High-Risk Servers or Workstations using GFI LanGuard 2015
Learn to quickly and easily scan any network for vulnerable and unpatched systems including Windows Servers (2003, 2008, 2012, 2016), Linux (Redhat, CentOS, Ubuntu, Debian, OpenSuse, Fedora), Apple OS X, and Windows Workstations with the help of GFI LanGuard 2015.
http://goo.gl/X6z0hX
Tuesday, November 10, 2015
How To Detect ARP Attacks & ARP Flooding With Colasoft Capsa Network Analyzer
Discover ARP Spoof Attacks and ARP Flooding in any large-scale enterprise network with the help of Colasoft’s Capsa network analyzer.
http://goo.gl/i7uyXE
Wednesday, November 4, 2015
What is Cross-site Scripting (XSS)? Why XSS is a Threat, how does XSS Work? Different Types of XSS Attacks
Learn what cross site scripting (XSS) is, how XSS exploits work, different types of XSS attacks and why XSS injection is considered a threat for web applications, webservers within businesses and organizations.
http://goo.gl/A7Sx8G
Tuesday, October 20, 2015
How to Reconstruct HTTP Packets/Data & Monitor HTTP User Activity with NChronos
Learn how to use nChronos to reconstruct captured HTTP data and uncover any suspicious HTTP activity and websites. HTTP Reconstruction is a network security feature offered by nChronos 4.3.0 and above.
http://goo.gl/csPB68
Friday, October 2, 2015
How OSPF Protocol Works & Basic Concepts: OSPF Neighbor, Topology & Routing Table, OSPF Areas & Router Roles, Theory & Overview
Introduction to OSPF Protocol. CCNA/CCNP Level. Learn how OSPF operates, OSPF router tables and info stored, OSPF Area boundaries, LSDB, LSU & LSA definitions, ABR, ASBR, DR election, Backup DR router and more.
http://goo.gl/X3HGa4
Tuesday, September 22, 2015
Improve Network Analysis Efficiency with Colasoft's Capsa New Conversation Colorization Feature
Learn how Capsa's new Colorization feature helps improve network analysis and make it easier to locate and fix network problems.
http://goo.gl/9PJynw
Thursday, August 13, 2015
How to Use Multi-Segment Analysis to Troubleshoot Network Delay, Packet Loss and Retransmissions with Colasoft nChronos
Troubleshoot network delay, packet loss and data retransmissions between links within your network or Internet, using nChronos. Learn how to use Multi-Segment Analysis on nChronos to troubleshoot your network.
http://goo.gl/UBRHX1
Monday, August 10, 2015
Understanding SQL Injection Attacks & How They Work. Identify SQL Injection Code & PHP Caveats
Discover how SQL injection attacks work and how hackers use them to obtain unauthorized access to web servers and systems. We show examples of SQL attack code and explain how MySQL & PHP treats malicious injection code.
http://goo.gl/BvUYIs
Tuesday, July 28, 2015
How to Detect Routing Loops and Physical Loops with a Network Analyzer
Learn how to use a packet sniffer to detect routing loops & physical loops in your network topology. Quickly find broadcast storms and other similar problems caused by bad network design, user errors and more.
http://goo.gl/acRFlE
Tuesday, July 14, 2015
Demystifying Cisco AnyConnect 4.x Licensing. Plus, Plus Perpetual, Apex & Migration Licenses for Cisco IOS Routers & ASA Firewalls (5500/5500-X Series). Supported Operating Systems & Ordering Guide
The new Cisco AnyConnect Secure Mobility client licensing fully explained. Understand the new AnyConnect Plus and AnyConnect Apex license, subscription plans & features included. Compare Essentials and Premium AnyConnect Licenses with the new Plus & Apex. Find out which support Cisco IP Phone VPN, Clientless (Browser-based VPN), Per-app VPN, Cloud Web Security and Web Security Appliance.
http://goo.gl/YqUeCB
Thursday, July 9, 2015
Enabling & Configuring SSH on Cisco Routers. Restrict SSH for Management & Enable AAA Authentication for SSH Sessions
Learn how to verify & configure SSHv2 support of your Cisco IOS, generate RSA key, configure VTY terminal to restrict remote management via SSH. We also explain why SSH is the preferred remote management protocol.
http://goo.gl/JVBYWL
Wednesday, July 8, 2015
Troubleshooting Windows Server 2012 R2 Crashes. Analysis of Dump Files & Options. Forcing System Server Crash (Physical/Virtual)
Understand the importance of Windows Server dump files, various dump files, configure and force a system crash (including virtual servers – Hyper-V). Analysis of the 5 memory dumps: Automatic, Complete, Kernel, Small Memory, No Memory dump
http://goo.gl/gcXcQx
Friday, July 3, 2015
Installation and Configuration of Fine-Grained Password Policy for Windows Server 2012
Learn how to install and configure Windows server Fine-Grained-Password-Policy via PowerShell or Active Directory Administrative Center (ADAC). We provide detailed instructions and necessary information to ensure complete installation and setup of this service.
http://goo.gl/Q0pFLv
Thursday, July 2, 2015
Web Application Security Interview on Security Weekly – Importance of Automated Web Application Security
Netsparker’s CEO, Ferruh Mavituna interviewed by Security Weekly provides an insight on how important it is to use an automated web application security scanner to find vulnerabilities in websites and web applications.
http://goo.gl/TZnfPV
Wednesday, July 1, 2015
How to Install/Enable Telnet Client for Windows Server 2012 via GUI, Command Prompt and PowerShell
Find out how to install and enable command-prompt telnet client for Windows Server 2012 R2 via GUI interface, command prompt or PowerShell. Our screenshots and easy-to-follow instructions will help ensure a smooth and easy installation process.
http://goo.gl/4znKnL
Monday, June 29, 2015
How to Enable & Configure Shadow Copy for Shared Folders on Windows Server 2012 R2
Learn how to setup, configure and access Shadow Copy Folders on Windows Server 2012 R2. Generate backup copies and take snapshots at set intervals of files and volumes, help keep track of changes made to all files.
http://goo.gl/dy9Gix
Tuesday, June 23, 2015
Windows Server 2012 File Server Resources Manager (FSRM) Installation & Configuration - Block Saving Of Specific File Types on Windows Server
Discover how to block specific file types on Windows Server 2012 using FSRM Manager. Stop defined files from being uploaded onto Windows File server directories, folder or to an entire volume. FSRM installation via Server Manager GUI and Windows PowerShell.
http://goo.gl/1Fg297
Monday, June 22, 2015
Colasoft Announces the Release of Capsa Network Analyzer 8.0
Colasoft Capsa Network Analyzer version 8 has just been released! Read about the new enhancements and changes made to Colasoft Capsa, making it one of the most easiest packet sniffers to capture and decode network traffic.
http://goo.gl/Q0zFFF
Monday, June 15, 2015
7 Security Tips to Protect Your Websites & Web Server From Hackers
Read our 7 security tips that will help any organization or administrator secure and protect their web server or website from malicious hackers. Read about security tools and best security practices used by professionals in the IT industry to protect millions of websites globally.
http://goo.gl/YC57Tm
Monday, June 1, 2015
Cisco CCNP Routing & Switching v2.0 – Official Cert Guide Library Review (5 Star Rating)
The Cisco CCNP Routing & Switching v2.0 – Official Cert Guide Library, is the latest Study guide for CCNP R&S candidates, designed to help them pass all 3 exams. Read our extensive review on this great title and find out how it can help you make your CCNP certification a reality.
http://goo.gl/dYGPga
Tuesday, May 26, 2015
How to Capture Packets on your Cisco Router with Embedded Packet Capture - Configuration, Troubleshooting & Data Export
Learn how to configure your Cisco router to capture network packets through any interface using the Cisco IOS Embedded Packet Capture (EPC). Troubleshoot, capture, export, examine and save packets from your router to tftp, ftp, http, scp destination.
http://goo.gl/vIRgKU
Monday, May 11, 2015
WordPress DOM XSS Cross-site Scripting Vulnerability Identified By Netsparker
Netsparker identifies a XSS Cross-site Scripting Vulnerability affecting millions of WordPress websites. Learn more about this vulnerability and find out if your site is exposed to possible hacking and session hijacking.
http://goo.gl/woZOb9
Thursday, April 30, 2015
Configure Windows 8 & 8.1 To Provide Secure Wireless Access Point Services to Wi-Fi Clients - Turn Windows 8 into an Access Point
Learn how to enable secure WiFi access point in Windows 8 & 8.1 and turn it into a Wi-Fi hotspot for wireless clients. We provide detailed easy-to-follow instructions and screenshots.
http://goo.gl/dj5Dr7
Monday, April 27, 2015
Revealing & Backing Up Your Windows 8 – Windows 8.1 Pro License Product Key
Learn how to find and backup your Windows 8 or Windows 8.1 License Product Key in case of Windows reinstallation. Our user-friendly script will display the Product Key and allow you to save it to a text file for future use. Detailed instructions and screenshots provided.
http://goo.gl/O3UQUv
Thursday, April 23, 2015
Installing The ‘Unsupported’ Profilic USB-to-Serial Adapter PL-2303HXA & PL-2303X on Windows 8 & 8.1
Profilic states that USB-to-Serial adapters based on the older PL-2303HXA & PL-2303X chipsets, are not supported on Windows 8/8.1. We show how to install your old USB-to-Serial on Windows 8/8.1 and avoid an unnecessary upgrade.
http://goo.gl/n0h7sI
Tuesday, April 21, 2015
The Importance of a Network Analyzer – Packet Sniffer. Must-Have Features for Demanding Engineers & Administrators
Find out why a Network Analyzers are considered the most important tools for any Network Engineer or Administrator and how they can help troubleshoot simple or complex network problems. Learn what features a quality Network Analyzer must have.
http://goo.gl/6wXXoM
Thursday, April 16, 2015
Choosing a Web Application Security Scanner - The Importance of Using the Right Security Tools
Poor security tools are responsible for millions of web security breaches. Read how to select the right web application security scanner and which features it should support. A 'Must' Guide for Security Engineers and IT Managers.
http://goo.gl/lrDmRE
Monday, April 13, 2015
Easy, Fast & Reliable Hyper-V Backup with Altaro's Free Backup Solution
Introducing an awarded Hyper-V backup solution aimed for virtualization professionals. Free for a limited number of VMs!
http://goo.gl/o367LX
Tuesday, April 7, 2015
Cisco Catalyst 4500 Series Zero-Downtime IOS Upgrade Process for Supervisor Engine 7-E, 7L-E, 6L-E and V-10GE Redundant Configurations
Learn to upgrade the Supervisor Engine IOS on Catalyst 4503-E, 4506-E, 4507R+E & 4510R+E. Perform Redundant Supervisor Engine IOS upgrade with zero service interruption (4507R/4510R Series only), force switchover to redundant Supervisor Engine and check status of your Supervisor Engines and line cards.
http://goo.gl/xMFdT
Monday, April 6, 2015
How to Enable Master Control Panel or Enable God Mode in Windows 7, 8 & 8.1
Windows GodMode - a Windows Master Control Panel shortcut that provides easy access to all administrative tasks in Windows. Learn how to enable GodMode on all Windows versions.
http://goo.gl/LlM9hy
Tuesday, March 31, 2015
Configuring SPAN On Cisco Catalyst Switches - Monitor & Capture Network Traffic/Packets
Configure your Cisco switch to capture data or voip traffic by mirroring incoming – outgoing packets with SPAN on Catalyst 2940, 2950, 2955, 2960, 2970, 3550,3560, 3560−E, 3750 and 3750−E, 4507R Series Switches. Network monitoring via packet capturing-sniffing software, network analyser, IDS or IPS is possible using Cisco’s SPAN or RSPAN method covered extensively in this article. Understand SPAN Terminology.
http://goo.gl/dKayzs
Monday, March 30, 2015
The Importance of Windows Hosts File - How to Use Your Hosts File on Windows Workstations and Windows Servers
This article explains the importance of Windows hosts file, how it works, how to make the most out of it & how it can be used to help avoid spyware or ad-based sites.
http://goo.gl/p0W2vm
Thursday, March 26, 2015
Comparing Netsparker Cloud-based and Desktop-based Security Software solutions – Which solution is best for you?
This article compares cloud-based and desktop-based security solutions. We take a brief look at key differences for both offered platforms.
http://goo.gl/lZ6RY1
Monday, March 23, 2015
New Upcoming Features in Hyper-V vNext - Free Training From Leading Hyper-V Experts – Limited Seats!
Learn about the new features in Hyper-V vNext. Leading Hyper-V experts will take you through the new features and answer your questions on Hyper-V! Altaro Free Webinar.
http://goo.gl/XqAzOt
Tuesday, March 17, 2015
Cisco WLC Interfaces, Ports & Their Functionality. Understand How WLCs Work, Connect to the Network Infrastructure & Wi-Fi SSID/VLAN mappings
Learn the purpose of each WLC interface (management, AP-Manager, virtual interface, dynamic interfaces), and physical ports. Read on Cisco WLC VLAN requirements, deployment guidelines and more.
http://goo.gl/7dNvOh
Thursday, March 12, 2015
Introduction To Cisco Wireless Controllers (WLC) - Basic Concepts – WLC Models, Benefits & Their Friendly GUI Interface
Learn the basics on Cisco Wireless Controllers: What they do, how they operate, different models available, the benefits companies have when moving to controller-based wireless network designs and more.
http://goo.gl/BAvoG7
Wednesday, March 11, 2015
Cisco Wireless Controllers (WLC) Datasheets Available for Download
Download Cisco's Wireless Controller Datasheets for free. We provide all datasheets for current WLCs available to the global market.
http://goo.gl/ahhTdV
Monday, March 2, 2015
The Importance of Automating Web Application Security Testing & Penetration Testing
Read how and why new automated security tools for penetration testing helps professionals quickly find vulnerabilities in their web applications.
http://goo.gl/Uhaknc
Thursday, February 5, 2015
Statistics Highlight the State of Security of Web Applications - Many Still Vulnerable to Hacker Attacks
Read about the shocking truth of Vulnerabilities and Advisories. Netsparker reveals methods and tools to uncover vulnerable web servers and web applications.
http://goo.gl/aPDkmN
Subscribe to:
Posts (Atom)