A Guide to Offline Security Appliance Updates:A Collection of Vendor Download Portals (Continuously Updated)
Security appliances operating in non-networked environments require regular manual updates for signature databases and system firmware. However, finding offline update packages across various vendor portals can be challenging. This article aggregates offline update links for major vendors to streamline the maintenance process and improve update efficiency.
181 words
|
1 minute
Cover Image of the Post
Is InfiniBand's "Infinite Bandwidth" Truly Infinite? 🤔
A brief discussion on InfiniBand (IB)—the powerhouse of high-speed networking—and our design process for implementing a storage network using IB technology.
869 words
|
4 minutes
Cover Image of the Post
VMware ESXi VM "Redo Log Corrupted"? Don't Panic, Here’s How to Resurrect It! 🚑
If you encounter a virtual machine boot failure on the VMware ESXi platform with the error 'The redo log is corrupted,' it typically indicates an issue with the VM's snapshot files. Here are the effective steps to resolve this problem.
407 words
|
2 minutes
Cover Image of the Post
PicImpact Upload Failures with Cloudflare R2? Here’s the Fix.
Deploying PicImpact is straightforward, but Cloudflare R2 can be tricky. Even if you follow the documentation perfectly, uploads might consistently fail without clear error messages. After tweaking permissions and investigating CORS, I realized that R2 requires more than just a 'default' configuration. You need to understand its upload logic and dodge a few common pitfalls to make it work.
606 words
|
3 minutes
Cover Image of the Post
Insights into Pre-Exercise Preparations for Cyber Offensive and Defensive Drills
Against the backdrop of intensive regulatory implementation and a continuously evolving threat landscape, solid preparation for offensive and defensive drills is no longer an optional 'nice-to-have.' It is a statutory responsibility for organizations and a cornerstone for ensuring business continuity. This article explores effective pre-drill preparation strategies.
831 words
|
4 minutes
Cover Image of the Post
Disabling Automatic DNS Log Probing in Burp Suite
Burp Suite is a Java-based, cross-platform web application penetration testing tool primarily used for intercepting, modifying, and replaying HTTP requests. While it is indispensable for security testing, Burp Suite initiates active DNSLOG probing upon startup. These probes may trigger alerts on security devices such as STA (Security Traffic Analysis) probes.
87 words
|
1 minute
Cover Image of the Post
Installing Docker & Docker Compose(China)
A guide to installing Docker and Docker Compose via online and offline methods.
181 words
|
1 minute
Cover Image of the Post