- Details
- Written by Jon Moore
For a while now I have been wanting to set up some kind of Kali HackBox. Sure, it's a piece of cake to simply spin up a VM or cloud instance, but lacking hardware powerful enough to run VMs, and budget for Clouds, what is one to do? I have an old laptop here... what would it take to make this a fully remotely accessible HackBox?
- Details
- Written by Jon Moore
Several months ago I read a brief article going over some of the primary limitations of WAF which echoed my own personal viewpoint, and far better written than I could reasonably accomplish. While that part was very insightful, the last bit quickly descended into a sales pitch. Since then, I have wanted to reference that article at work, but couldn't really do so since the sale pitch was for a product that wasn't "ours". So I'm just going to poach the content I want, leave out the sales pitch, and credit the source. :D
- Details
- Written by Jon Moore
In this article we'll go over setting up an exception to email alerts for a specific IPS protection for Sophos' UTM 9.
- Details
- Written by Jon Moore
Something happened in your environment, and suddenly you no longer have any contracts or subscriptions to run any of the Sophos software on your purchased Sophos appliance. So the software is useless, but the appliance is otherwise functional and seems to work fine. What else can you install on it? Here's a few lab-tested (by yours truly) options you can consider.
- Details
- Written by Jon Moore
While quick, this sure ain't dirty... Unlike many vendors' 'URL Filtering' solution, this effect not just basic web browsing, but ANY protocol that needs to resolve any kind of domain name to an IP. Now THAT'S Fancy!
Page 5 of 11