- Details
- Written by Jon Moore
In this article, we go over setting up a site-to-site VPN between a Check Point Gateway and a Sophos UTM Home Edition device.
Check Point is the leader in Next-Generation Firewalls. While there can be a bit of a (steep) learning curve with their products, they are leading edge, and very powerful. The biggest downside to Check Point is cost. They are quite expensive, both in terms of products and support. But you get what you pay for, and when you pay top dollar, you really do get top product. But what about the regular Joe, home/small business owner who doesn't have that kind of cash? Or what about small, non/not-for-profit organizations?
- Details
- Written by Jon Moore
In my ongoing desire to determine who/what/when/where/why my server had previously been compromised, I continue my analysis with the messages files and some other /var/log files.
- Details
- Written by Jon Moore
Here I go over the following files /etc/hosts*
This works out to 3 files total.
- Details
- Written by Jon Moore
In a bit of a panic, I moved all kinds of grub files, without fully realizing the consequences later on... In any case, I am going over the files that I do have, and noting what differences may exist. If there's anything that would cause my booting problems, it is likely the bootloader, grub.
- Details
- Written by Jon Moore
In this article I am examining the /var/log/auth.log file for any indication of what/what/when my server may have been compromised.
Page 9 of 11