好物分享
-
How to Surpress Microsoft Sentinel Log Ingestion
You may want to filter your logs collected, or even log content, before the data is ingested into Microsoft Sentinel. For example, you may want to f…… -
Configure CyberArk PSM-SSH With the Support of HTML5 and AutoLogonSequenceWithLogonAccount
PSM for SSH can record all activities that occur in the privileged session in a compact format. Text recordings are stored and protected in the Vaul…… -
-
-
-
-
[5 Mins Docker] Online Web Proxy Projects to Hide Your IP or Reverse Proxy to Access Other Websites
In this blog post, I am introducing two online web proxy projects which you can create by yourself using docker or Cloudflare workers.  …… -
-
FortiGate Lab – BGP over IPSec (VTI) – Web Gui Configuration
This Lab is to summarize the steps how to configure BGP over IPSec on FortiGate firewalls using Custom VPN Creation Wizard. Custom VPN creatation wi…… -
What Canadian Company Should Do After Data Breach?
More specifically, what a canadian company should do? Related Regulations 1. Federal Privacy Laws PIPEDA (Personal Information Protection ……