LaBlog

Posts

Fortinet Panel Login Security

We can apply this scenario for situations where we have to open the Fortinet Panel login to the outs...

Continue Reading

macOS PopClip and Bear Note App

PopClip is a macOS application that allows you to perform various shortcuts and actions upon text se...

Continue Reading

Linux: 35 Super Scripts!

This Bash script detects partitions on your Linux system with disk usage exceeding 80% and gives a w...

Continue Reading

Alternative to Discord

Easy installation on Debian or Debian-based Linux operating systems is as follows. You can follow th...

Continue Reading

Homebrew macOS Installation

Homebrew is a popular package manager for macOS. It offers a practical tool to install, update and u...

Continue Reading

🐳 Docker Commands for Beginners

systemctl start docker # Linux open -a Docker # macOS

Continue Reading

Moving from VMware to Proxmox Server!

Let's select our machine from the Proxmox Web Console, select Updates --> Repositories and click APT...

Continue Reading

Proxmox GPU Passthrough Step by Step Explanation

Proxmox We can log in via "SHELL" from the Web Console or via SSH from our computer with the help of...

Continue Reading

Cisco Switch Simple Installation

The first thing we need to do is to plug our Rollover (console) cable into the console port of the S...

Continue Reading

Fortigate Installation and Simple Network Scenario

We will implement the structure you see above using the EVE-NG Full Package provided to us by https:...

Continue Reading

Fortigate SSL VPN MAC Address Filtering

From our Fortigate device, we click on "SSL VPN Portals" under "VPN", click on the Portal we want to...

Continue Reading

10 Troubleshooting Commands for Linux Systems

ps H -eo pid,pcpu | sort -nk2 | tail 31396 0.6 31396 0.6 31396 0.6 31396 0.6 31396 0.6 31396 0.6 313...

Continue Reading

Using Fortigate Malware Hash Threat Feed

To add “EXTERNAL CONNECTOR”, we click on “External Connectors” under “Security Fabric” in the firewa...

Continue Reading

Fortigate IP Reputation Configuration

We will explain how to block internal users from dangerous IP addresses or known malicious hosts thr...

Continue Reading

Fortigate IPSEC VPN Overlapping Subnet

Let's start by making the IPSEC VPN connection between the HEADQUARTERS and the BRANCH. I make my VP...

Continue Reading