All Stories

[IT Security] Interesting phishing email

You may hear the word “Phishing“. Phishing is typically used by the thieves to get a user password credential such as online banking username and password, email, etc.. ...

How to Manually Upgrade Ironport AsyncOS

Have you experienced problems in the process of upgrading Ironport AsyncOS manually? (Via the local server). If so, make sure these steps to perform the upgrade manually you have ...

[IT Network] Configuring IP Address and DNS via Windows Command Line

Usually when we want to change the IP address and DNS on P C / Notebook which is using Windows-based operating system, we always go to control panel then go to the network. For those ...

How to configure Virtual Server & Pool on F5 Link Traffic Management

Before I explain about F5 product, I will try to explain briefly about what a load balancer. Load balancer is a system (usually in the form of a hardware) which will distribute the ...

[RedHat Enterprise Linux] How to secure your Redhat Enterprise Linux 5 by User or Host

Besides using a firewall, and SELinux, there are many ways to make our RHEL servers secure from crackers that are trying to break into our RHEL system, one of which is to use tcp_wrapper. ...