network

Windows “We can’t verify who created this file” – SOLVED

If you try open exe file from network drive you can face error: “We can’t verify who created this file”, is is because network drive is not recognized as the trusted network place. You can add this network place to trusted sites. Select “Start“, then type “Internet Options“. Open “Internet Options“. Select the “Security” tab. Select “Local intranet“, …

Windows “We can’t verify who created this file” – SOLVED Read More »

TOR – setup entry and exit nodes – SOLVED

Basic setup If you need setup entry and exit nodes for TOR it is quite easy. It is really useful when you developing websites or make penetration testing network firewall. navigate to your tor browser install directory open Browser folder open TorBrowser folder open Data folder open Tor folder open torrc file in your favorite text editor in torrc file insert these …

TOR – setup entry and exit nodes – SOLVED Read More »

Mikrotik P2P mangle rule – SOLVED

Its long time ago but MikroTik removed P2P matcher from mangle rule, so now you have to use L7 analyze to mangle this traffic. Here is code to paste to the terminal:

This mark P2P connection so you can apply queues on it, block it, or anything that you want to do with a …

Mikrotik P2P mangle rule – SOLVED Read More »

Ping unable to resolve but nslookup works fine – workaround

Sometimes if you make changes to your local DNS server windows do not works ok to resolve this DNS record in a local network. What?

Why? On Windows (even recent versions such as Windows 10), the first step can easily fail. For the sake of backward compatibility, Windows supports various methods of hostname resolution (hosts …

Ping unable to resolve but nslookup works fine – workaround Read More »

Mikrotik CAPsMAN config cheatsheet

Best order to create CAPsMAN Manager station Channels Datapaths Security Configuration Provisioning Interface->Manager->Enable Client station Wireless->Interface->CAP

Fortinet – NSE 2 Quiz – Module 9 (Competitive overview) answers

Who are Fortinet’s main competitors in the Data Center? : Cisco / cheap nba jerseys Juniper wholesale jerseys Networks Who are Fortinet’s main competitors in the Enterprise? : Cisco / Check Point Who are Fortinet’s main competitors in the Distributed Enterprise/SMB market? : Check Point, Dell/SonicWALL, Sophos, 2 & WatchGuard NSE2.L9.Q4.Advance.Threat.Protection.Competitors :  Main Competitor – cheap jerseys FireEye Secondary …

Fortinet – NSE 2 Quiz – Module 9 (Competitive overview) answers Read More »

Fortinet – NSE 2 Quiz – Module 7 (Carrier/MSSP) answers

What are the different types of MSSPs? : Pure-play, Carrier and Cloud Service Provider The MSS Market is expected to grow _______ from now to 2019. : 17.3% What are the foundational services for MSSP. : Security Húfu device management & continuous monitoring Primary market drivers for managed security services? : Awareness, cost cheap NBA jerseys reduction, security complexity, compliance The top …

Fortinet – NSE 2 Quiz – Module 7 (Carrier/MSSP) answers Read More »