Mikrotik Scripting: Using the "place-before" parameter to place fw rule "after" other rule
This is a quick trick to programmatically place firewall rules after specific rules, not before. Normally you already have the place-before parameter when adding firewall ...
Add
2
43
0
Malware Romcom exploits zero-day vulnerabilities in Firefox and Windows
Security researchers at Eset have discovered a serious threat that is currently being exploited in Germany and in US: A Russian hacker group is currently ...
Add
1
4362
0
How about swapping password rotation fatigue for real-time leak detection?
Hi there! Traditional password rotation policies, while meant to enhance security, can lead to user fatigue and even weaker security as users struggle to keep ...
13 Comments
0
2474
0
RDP connection to Windows 10 client fails with code 0x904Solved
I have a Win10 workstation to which I cannot RDP. I use the built-in RDP client from Win11. The connection fails with the following message ...
1 Comment
0
4296
1
1Password share password vault between companiesSolved
Hello everyone, I would like to share a password vault in the Password Manager 1Password between two user accounts that are in different company environments. ...
3 Comments
0
2928
0
Windows zero-day vulnerability CVE-2024-30051
CVE-2024-30051 is a zero-day privilege escalation vulnerability discovered by Kaspersky Lab in April 2024 while researching CVE-2023-36033. It is a critical vulnerability in Windows (CVSS ...
Add
0
2023
1
EdgeRouter Lite 3 IPv6 configuration
Hi; I am trying to configure the EdgeRouter Lite 3 with two subnets on eth1 and eth2. The router is behind a Cable Fritzbox. So ...
17 Comments
0
3312
0
Wireguard with systemd and nftablesSolved
Hi; I am trying to configure Wireguard VPN using systemd.networkd on a Server with NFTables as a firewall. These are the files of my configuration: ...
21 Comments
0
3539
0
Check of ZFW Firewall
Hi together, I will post my running cisco config below. I have an external modem on my cisco router, which gets an fixed IP-Adress from ...
6 Comments
0
3498
0
NPS 802.1x Radius Authentication with EAP-TLS and strong certificate mapping for non domain joined devices
Introduction This tutorial describes the procedure how to use 802.1x EAP-TLS strong authentication especially for non domain joined devices on your LAN. So your device ...
1 Comment
8
19777
1
Grounding my server rackSolved
Hi! I will soon get a server rack, namely the 25U Open Frame Rack from StarTech . This will house my UPS , a pfSense ...
2 Comments
0
5708
0
Outlook encrypts messages that are only signed? Lock icon on just signed mails?Solved
Hello, recently I've set up Outlook to send always signed mails. But not encrypted ones. Everything worked fine so far, since today I received feedback ...
7 Comments
1
5781
0
Network (windows server + backup server) on NAS?Solved
Hey there! I think, it makes more sense to post in english instead of german, for it's international community. I need some advice for setting ...
11 Comments
2
4853
0
(File-)System for versioning and organizingSolvedClosed
I'm searching for a solution to organize photos, documents, audio, video, in a way so that each file only exists once on a hard drive, ...
1 Comment
0
4727
0
Emergency patch: Zero Day security update for all Apple platforms
Apple released an urgent security update for all its platforms on Feb. 13, 2023 CVE-2023-23529. The vulnerability is in Apple's browser engine WebKit. Using specially ...
Add
0
7369
0
Cisco router with zone based firewall and port forwarding
This tutorial is a short extension to the more comprehensive local . Due to several requests regarding port forwarding and combination with a secure DMZ ...
Add
5
11552
3
How to list installed security appliances?
I do look for a tool that identifies all installed security appliances (antivirus, firewall, thread-protection, application proxy e.g. ZScaler Client) on a Windows Client computer. ...
6 Comments
2
5456
0
OPNsense and Telekom fiber at home without modemSolved
Hello Administrator community, After a long time of only reading posts here, it's time for my first real posting. Sorry that I have to do ...
5 Comments
1
6646
1
CISCO Small Business RV Router Series severe vulnerabilities
Several security vulnerabilities threaten CISCO's RV router series, which is often used by small/medium-sized companies. The web interface has several flaws which allow an attacker ...
Add
1
5755
0
Lighttpd, Rewrite and a strange Error-handler
From the everyday life of an admin: Actually I wanted to do something completely different, but when I got a mail with an update request ...
2 Comments
0
5212
0
Zyxel Firewalls security alert!
A serious vulnerability in Zyxel firewalls has been discovered, which in the worst case, can be used to execute local commands with root privileges. Security ...
Add
2
3120
0
OpenSSL version 3.0.4 affected by serious security vulnerability
Admins/users running OpenSSL version 3.0.4 dated June 21, 2022 should update their systems to version 3.0.5 as soon as possible. The vulnerability allows remote code ...
Add
3
3589
1
Mikrotik SSH Public Key Authentification with modern OpenSSH Versions 8.2+ (now solved in ROS 7.4beta2)
#edit 07.06.2022 18:09# Just wrote the post and Mikrotik has already acted, wow that's fast :-)! RouterOS version 7.4beta2 has been released the "v7 testing" ...
Add
3
4203
1
DST Root CA X3 Expiration (September 2021)
On September 30 2021, there will be a small change in how older browsers and devices trust Let’s Encrypt certificates. If you run a typical ...
Add
0
5218
0
Defenseless: Spectre Mitigations Leveraged
A team of University of Virginia School of Engineering computer science researchers has uncovered a line of attack that breaks all Spectre defenses, meaning that ...
9 Comments
1
6641
0
The Bastion powered by OVH
Bastions are a cluster of machines used as the unique entry point by operational teams (such as sysadmins, developers, database admins, ) to securely connect ...
4 Comments
2
7056
0