Skip to content

The Cyber Security, Compliance & Cloud

Cyber Security | Digital Transformation | Cloud Computing

  • Home
  • About Me
  • Contact Me:
The Cyber Security, Compliance & Cloud

Category: tech

Clients not Reporting into WSUS Server

June 18, 2015 Baz scripts, tech, tips, windows Leave a comment

Create the Batch file with following code and run to fix the problem net stop wuauserv regsvr32 /s wuapi.dll regsvr32

Continue reading

World Wide Publishing Service Windows Process Activation Service Won’t Start ,

June 18, 2015 Baz tech, tips, windows Leave a comment

The World Wide Web Publishing Service service depends on the Windows Process Activation Service service which failed to start because

Continue reading

ESXi Log Files

January 7, 2015 Baz tech, tips, VMWare Leave a comment

ESXi Log Files ·  /var/log/auth.log: ESXi Shell authentication success and failure attempts. ·  /var/log/dhclient.log: DHCP client log. · /var/log/esxupdate.log: ESXi

Continue reading

Installation of ESXI Server 5.5 and its components (vCenter SSO, vSphere Web Client, vCenter Inventory Service and vCenter Server Part5-6

December 31, 2014 Baz tech, VMWare Leave a comment

Part5. vSphere Web Client Installation and Configuration vmWare introduces vSphere webclient in version 5.0 with limited features. In version 5.1

Continue reading

Installation of ESXI Server 5.5 and its components (vCenter SSO, vSphere Web Client, vCenter Inventory Service and vCenter Server Part 4

December 31, 2014 Baz tech, VMWare Leave a comment

Part4. VMware vCenter Server Installation VMware vCenter Server is the management system for your VMware vSphere private cloud. It’s used to

Continue reading

Installation of ESXI Server 5.5 and its components (vCenter SSO, vSphere Web Client, vCenter Inventory Service and vCenter Server Part1-3

December 31, 2014 Baz tech, VMWare Leave a comment

  Part1.  Installation of ESXI Server 5.5 This is the baremetal hypervisor that will run our VMs and may be

Continue reading

Memory limits for VMware products

December 24, 2014 Baz tech, tips, VMWare Leave a comment

Memory limits for VMware products ESXi/ESX ESXi/ESX virtual machines Hardware version Memory limit 5.1 9 32-bit and 64-bit virtual machines:

Continue reading

Server and System Hardening / Securing

October 18, 2014 Baz networking, Security, tech, tips Leave a comment

The purpose of system hardening is to eliminate as many security risks as possible. This is typically done by removing

Continue reading

Domain Name System DNS Basics

September 23, 2014 Baz networking, Security, tech Leave a comment

Domains are managed by using a worldwide system of domain registrars and databases. The Domain Name System DNS are the

Continue reading

The OSI Model

September 22, 2014 Baz networking, Security, tech Leave a comment

The OSI model consolidates network communications into seven simplified layers. So what are the seven layers? Below, I list them

Continue reading

Posts pagination

«Previous Posts 1 2 3 4 … 8 Next Posts»

Categories

ADADFSAmazonAppleAppsArticlesAWSAzureAzure PolicyAzure PurviewbackupCertificatesCiscoCloudComplianceCyberSecuritydamwaredataData GovernanceDigital ForensicexcelExchangeflashflexGPOHadoopHPInformation ProtectionIntelligent securityJSON

Recent Posts

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types

Top Cyber Security Posts

Datbricks vs SQL Server

April 14, 2023

Designing SQL Database in Azure

February 21, 2023

Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault

December 13, 2022

FIDO – FIDO2: an open authentication standard

June 20, 2022

Build next-generation security operations with Azure Sentinel

December 16, 2020

How to Apply Microsoft Information Protection’s (MIP) sensitivity labels to Azure assets in Azure Purview

December 4, 2020

The Cyber Security, Compliance & Cloud

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types
  • FIDO – FIDO2: an open authentication standard
WordPress Theme: Tortuga by ThemeZee.