windows

Http Security Headers In IIS

Http Security Headers setting in IIS to Prevent Vulnerabilities.

In this article I will talk about Http Security Headers types and I will show you the steps to secure WebPages and IIS server from Clickjacking, code injection, MIME types, XSS, etc

I will show you how to add HTTP Response Headers using GUI in IIS Manager or add to the web.config file:

more..

DevOps

What is DevOps and what was the need behind it?

DevOps methodology come as a response to this need for better collaboration and faster delivery. DevOps enables continuous software delivery and faster resolution of problems.

more…

 

How to Log Windows Firewall Activity

Firewall Logging is Useful to verify if newly added firewall rules are working or not, to identify malicious activity,  and to determine if the firewall is dropping packet which causes application  failures.

By default, the Firewall log is disabled.

more …

How to Exceed the 4 vCPU limit for VM’s on Hyper-V

  

Many times I was asked for the way to exceed the limitation of 4 virtual processors assigned to a virtual machine for Windows Server 2008 R2.

I guess there is still many Windows Server 2008 hyper-visor running on a physical server which has much more cores, Although It is very limiting, but I will not recommend you to modify productions VM’s setting to exceed the limit.

more …

Create ASE Devices, Database and load database

Sybase Adaptive Server Enterprise (ASE) introduces enhanced dump and load capabilities for moving databases or restoring backups to a different ASE .
It may be confusing for some other database administrators. So, I would like to share with you my experience and give you a brief explanation of the device, database and the restoration of the Sybase database from command line.

more..

Palo Alto Layer 3 deployment

pa_00

Layer 3 is the classical deployment method for the PA firewall, and it is always considered the standard and most powerful deployment method because it has all of the functionalities, while other deployment methods have some limitations (example of the other deployment methods are virtual wire, layer 2, etc …)

In this tutorial, I will explain Layer 3 Interfaces deployment.

more …