F5 | CVE-2022-1388

A proof of concept (PoC) was developed for a critical vulnerability in F5's BIG-IP networking software that could expose thousands of...

WSL2 DNS Fix/Config

Windows Subsystem For Linux (WSL) is a tool provided by Microsoft to run Linux natively on Windows. It’s designed to be a seamless...

Cisco ISE | Log4J

This post provides a step-by-step procedure for installing the hot patch released by Cisco for ISE servers, in light of the recent Log4j...

Phishing Email

Introduction to Phishing: ↪ Phishing attack is a type of attack aimed at stealing personal data of the user in general by clicking on...

G00gle Dinosaur

Most of us have seen the dreaded “No Internet” error message on Google Chrome. You can actually turn this screen into a fun, dino-themed...

Morse Code

What is Morse Code? Morse Code is a code for translating letters to dots • and dashes —. These represent a short and long signal...

IPS FMC for Log4Shell

In general terms, last week, a zero-day vulnerability called Log4Shell was discovered and could be exploited by remote attackers around...

Umbrella VA

What is Umbrella VA and how it works? 🤔 Umbrella virtual appliances (VAs) are lightweight virtual machines that are compatible with...

FTD factory reset

⧽ Technology Overview: Cisco FTD is a threat-focused, next-gen firewall (NGFW) with unified management. It provides advanced threat...

Python | QR-Code

What is a QR-Code? A Quick Response code is a two-dimensional pictographic code used for its fast readability and comparatively large...

LibreNMS

LibreNMS is an open source, powerful and feature-rich auto-discovering PHP based network monitoring system which uses the SNMP protocol....

Vigenere Cipher

Vigenere Cipher is a method of encrypting alphabetic text. It uses a simple form of polyalphabetic substitution. A polyalphabetic cipher...