Windows Time Rule for Digital Forensic

There are some common rules for windows time rule for $Standard_Information and $Filename. Here is the table for those common rules. This below table (created by SANS) is the rule ...

Adding a Fortigate(FGT) Image Into EVE-NG

In this post, I explain about how to adding Fortigate image into EVE-NG and basic step-by-step on creating simple topology. As we know, Fortigate is one of the leading firewalls  ...

Checking Hardware Information on Nokia Checkpoint Firewall using IPSCTL

How to Check Hardware Information on Nokia Checkpoint Firewall using IPSCTL   May one of us confused about how to check hardware information on Nokia Appliance that is installed ...

Connecting Yealink IP Phone T22P to Cisco Catalyst Switch

Connecting Yealink IP Phone T22P to Cisco Catalyst Switch Couple days ago, we have been struggled to find the method connecting our Yealink IP Phone T22P to our Cisco Catalyst Switch ...

Defining Thresholds on Cisco Prime Infrastructure

Defining Thresholds on Cisco Prime Infrastructure Cisco Prme Infrastructure is one of the powerful network monitor for Cisco devies. One of the features is able to monitor the threshold ...