Configure Ubiquiti L2TP VPN and Split Tunneling

A series of Ubiquiti routers can act as a VPN server, which are also known as UniFi Gateway. UniFi Gateway supports Layer 2 Tunneling Protocol (L2TP) Virtual Private Network (VPN) connectivity, allowing users to remotely access an internal network via establishing a VPN connection. The ability to establish a secure VPN tunnel through L2TP over … Read more

Cryptography: Concepts and Examples

Cryptography involves many topics and theories. This article covers topics including Symmetric Encryption Algorithms (also known as block ciphers), Hash Functions, Message Authentication Code (MAC), Authenticated Encryption (AE), Modes of Operation, Common Cryptography Terms, Cryptographic Applications, Approval Status, Random Number Generators, Seeds and XOR Calculation. Keyless Algorithms Keyless algorithms do not use a secret key … Read more

Vulnerability Management with Nmap and Netdiscover

Nmap is a network scanning tool often used for vulnerability management. It can discover hosts and services on subnets accessible by the scanner. Through Nmap, vulnerability researchers and auditors can assess system vulnerabilities within a corporate environment and formulate remediation plans. This article looks at Nmap commands and explains their usages and differences.

Threat Management: Concepts and Examples

Threat Management helps organizations manage risks and comply with industrial standards and regulations. It includes identifying threats, formulating strategies and developing mitigation measures. Various frameworks and standards are designed for managing an organization’s security posture. This article discusses threat management concepts and provides examples of their applications. Zero-day Zero-day vulnerabilities refer to software flaws unknown … Read more

PSA: Cyber Scams Originated from Slave Compounds

The media in Taiwan and Hong Kong has recently been widely reporting the cyber-scam operations and modern slavery situations occurring in Cambodia and Myanmar as more survivors come forward to share their horrifying experiences. However, the topic is still under-reported outside the Chinese media and deserves more worldwide attention. Situation Trafficked into Scam Compounds It has been reported … Read more

How to Protect and Encrypt Files using VeraCrypt

Using VeraCrypt, you can easily protect important files. This open-source software allows you to protect your files with passwords. You can create an encrypted file container with a password of your choice, save confidential files in it, and access the files later by decrypting the container. This article provides a step-by-step guide on creating an … Read more

How to Perform Network Speed Test with iPerf3

iPerf3 helps you scientifically perform a network speed test. It is available to install on Windows, Linux, and macOS devices. This article explores how to use iPerf3 to evaluate network throughput and explains settings to keep in mind when using iPerf. Step 1: Install iPerf3 Option #1) Install iPerf3 on Windows via Scoop Package Manager … Read more

Configure Cloudflare Zero Trust for Web Applications

Attackers often target the login page of a web application. Security mechanisms such as Two-Factor Authentication (2FA), Rate Limitation, and Web Application Firewall (WAF) are adopted to mitigate the security risks. Cloudflare Zero Trust (a.k.a. Cloudflare Access) is a security model which offers the ability to verify user identity for accessing web applications. You can … Read more

VMware Tutorial: Install and Configure vCenter Server 7

VMware vCenter provides centralized management capabilities for ESXi hosts. It also enables additional functions like migrating virtual machines between hosts using vMotion. This tutorial provides an overview of installing VMware vCenter on an ESXi host. Step 1: Check Requirements for installing vCenter Server To begin with, you should ensure that the existing environment can fulfill … Read more

VMware Tutorial: Configure ESXi Host Management Network

VMware ESXi Management Network provides traffic between an ESXi host and clients. After installing an ESXi hypervisor on a server, an ESXi management IP is obtained via Dynamic Host Configuration Protocol (DHCP). You may want to configure a static management IP and configure the hostname for the ESXi host. Follow the guide below to configure … Read more