好物分享
-
Kali Usage Tips and Tricks
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools whi…… -
CISO Leadership Workshop Overview (Job, Priority, Tabletop, Mindmap)
The Chief Information Security Office (CISO) or vCISO workshop helps accelerate security program modernization with reference strategies built using…… -
MDE Deployment and Configuration Steps with Security Policy Details
The following steps is only used for a selected environment to have a simplified deployments which is to target bringing MDE to all devices as fast …… -
Tailscale VPN Configuration Including Exit Node in 5 Minutes
Tailscale is a modern VPN solution that simplifies secure networking by creating private, encrypted connections between devices, no matter where the…… -
SentinelOne – S1 – Console
This post is used to show SentinelOne Console scrrenshots for future reference. Dashboard Dashboard URL: https://usea1-066.sentinelone.net/…… -
No VPS, No Server, Running A Linux VM in Your Browser
In this post, I am gonna introduce to you a very interesting project called WebVM. This project is a real "black technology". It allows user to run …… -
Kali Installation on VMware Workstation and Home Lab Setup with Connecting through Wifi
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing.Maintained and funded by Offensive Security .…… -
[5 Mins Docker] Deploy Zfile into Cloud – An Online Cloud Disk Listing Program
This post shows you how to deploy zfile using Docker. It demonstrates the steps deploying to online cloud providers such as fly.io, Zeahur, Koyeb, .…… -
Microsoft Defender for Endpoint Resources and Fast Steps to Configure
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and r…… -