Secure SSH with Public Key Authentication and Two Factor with Duo
If you want the ultimate in security for your SSH enabled Linux box that is sitting in the DMZ or in a 1-to-1 NAT scenario, you can basically have 3…
Virtualization, Cloud, DevOps, Reviews
If you want the ultimate in security for your SSH enabled Linux box that is sitting in the DMZ or in a 1-to-1 NAT scenario, you can basically have 3…
Within Sophos UTM, as much as I like the product and have enjoyed using it in my home lab environment, blocking a single host from being able to hit the…
With the release of Windows 10 today, many are spinning up VMs and loading the new workstation on test boxes to take a look at the final build version. If…
Setting up a Hyper-V cluster lab in VMware Workstation is not too difficult and can easily be accomplished in a couple of hours worth of work to get things configured…
Recently with all of the bug fixes and security updates coming out from VMware and others due to Ghost vulnerability, etc, I decided among other VMware updates to update the…
Let’s face it, these days, our digital security is under attack just about anywhere we are and access our data. However, we may not think about security when we are…
Remote desktop is a great way to connect to a workstation either in the same location or remotely anywhere on the Internet (with proper firewall allowances in place of course).…
Clonezilla is a great open source means to capture and restore system images and it works very well. However, like all boot disks, you may run into issues if you…
A very challenging situation in a network environment where you may have several or even hundreds of network hosts is finding a specific host that is infected with malware. Many…