Sticky

HA Architecture – Links HA1 (control link), HA1 backup, Heartbeat backup Config synchronization Management plane runtime state synchronization FIB, user-group mappings, DHCP leases, DNS cache, etc. HA state communication HA2 (data link) & HA2 backup Session synchronization A/P – We do not sync ICMP sessions. A/A – We do notRead More →

A password alone will not protect sensitive information from hackers–two-factor authentication is also necessary. It’s nearly impossible to truly secure an online or mobile account with just a password. Data breaches, malware, device theft, and other methods can be used to compromise digital passwords, no matter how secure they are. Cyber Hygenic practices are necessary, we should tell the importance of 2FA to Friends, Family, colleagues, and encourage them to enable 2FA. Two-factor authentication whenRead More →

The NCSC’s weekly threat report is drawn from recent open source reporting. Unauthorised Data Sharing A survey from data discovery and auditing software vendor Netwrix has revealed that inappropriate data sharing continues to be a problem for companies and businesses. The research shows that whilst most companies store their data in designatedRead More →

Providing SSH access to your clients is risky at best. On the one hand, you give them the capability to perform advanced customizations on the server and view a lot of the “behind the scenes” activity. On the other, it’s a wide open security threat as it is extremely difficultRead More →

This will show you how to install a Self-hosted team communication/ chat platform that supports video/ voice calls for free. Mattermost is built using new modern technologies like Go programming language, ReactJS, and uses MySQL or PostgreSQL. Features include: channels, private messaging, inline-media, full-text-search for messages, multi-languages support, files/ imagesRead More →

The excerpts below show some example name-based VirtualHost configurations that can be used in Apache. For more detailed instructions,  For each TCP port that you want to use to serve content, you will need to define a Listen directive before configuring your VirtualHosts. When using Apache version 2.2.x or lower,Read More →

In the last few weeks, the COVID-19 pandemic has caused many businesses to change their operations overnight and require remote work for the well-being of their employees. With more individuals working via home networks, there has been an increased need for cybersecurity professionals to ensure their companies are still operatingRead More →

A Virtual Private Network is known as VPN effectively encrypts all the internet traffic sent over the internet connection and sends it to a far-off VPN server. In this entire process, everything went through the VPN server. Like for instance, let’s say that you’re residing in the UK and wantRead More →