Fortinet Panel Login Security
We can apply this scenario for situations where we have to open the Fortinet Panel login to the outs...
Continue ReadingmacOS PopClip and Bear Note App
PopClip is a macOS application that allows you to perform various shortcuts and actions upon text se...
Continue ReadingLinux: 35 Super Scripts!
This Bash script detects partitions on your Linux system with disk usage exceeding 80% and gives a w...
Continue ReadingAlternative to Discord
Easy installation on Debian or Debian-based Linux operating systems is as follows. You can follow th...
Continue ReadingHomebrew macOS Installation
Homebrew is a popular package manager for macOS. It offers a practical tool to install, update and u...
Continue Reading🐳 Docker Commands for Beginners
systemctl start docker # Linux open -a Docker # macOS
Continue ReadingMoving from VMware to Proxmox Server!
Let's select our machine from the Proxmox Web Console, select Updates --> Repositories and click APT...
Continue ReadingProxmox GPU Passthrough Step by Step Explanation
Proxmox We can log in via "SHELL" from the Web Console or via SSH from our computer with the help of...
Continue ReadingCisco Switch Simple Installation
The first thing we need to do is to plug our Rollover (console) cable into the console port of the S...
Continue ReadingFortigate Installation and Simple Network Scenario
We will implement the structure you see above using the EVE-NG Full Package provided to us by https:...
Continue ReadingFortigate SSL VPN MAC Address Filtering
From our Fortigate device, we click on "SSL VPN Portals" under "VPN", click on the Portal we want to...
Continue Reading10 Troubleshooting Commands for Linux Systems
ps H -eo pid,pcpu | sort -nk2 | tail 31396 0.6 31396 0.6 31396 0.6 31396 0.6 31396 0.6 31396 0.6 313...
Continue ReadingUsing Fortigate Malware Hash Threat Feed
To add “EXTERNAL CONNECTOR”, we click on “External Connectors” under “Security Fabric” in the firewa...
Continue ReadingFortigate IP Reputation Configuration
We will explain how to block internal users from dangerous IP addresses or known malicious hosts thr...
Continue ReadingFortigate IPSEC VPN Overlapping Subnet
Let's start by making the IPSEC VPN connection between the HEADQUARTERS and the BRANCH. I make my VP...
Continue Reading