Introduction One feature that occasionally causes some confusion among ISA Administrators is the option to “Use a certificate to authenticate to the SSL Web server” which is on the Bridging tab of a Web Publishing Rule. Some people mistakenly believe that this has to be checked for ISA Server to communicate securely with the published resource. As … Continue reading Using a Client Certificate when Bridging SSL traffic from ISA Server
Credit Card Number follows an algorith which composed of modulus and checksums. I created a tool to verify validity of a credit card number. Download
To find the user and group base DN, you can run a query from any member server on your Windows domain. To find the User Base DN: - Open a Windows command prompt. - Type the command: dsquery user -name <known username> (Example: If I were searching for all users named John, I could enter … Continue reading Windows: How do I find an LDAP User and their Group Base DN for Microsoft Active Directory?
Solution: Follow the steps below in the given order: Step 1: Disconnect the computer from the network and notify the user that the computer cannot be re-connected until all malware has been successfully removed. Step 2: Find out if the user is familiar with the destination or action that the malware or bot is trying … Continue reading Tools: How to identify and clean up Windows computers infected with malware and bots
Found this tool from CheckPoint to test your AV, Anti-Bot and Threat Emulation function. https://threatwiki.checkpoint.com/threatwiki/public.htm Test Threat Emulation Click to download a DOC with an exploit. This file will not harm your computer. To confirm the file was detected, use the Smart Log / Smart View Tracker to locate the Threat Emulation log for this … Continue reading Tools: Test your Firewall’s AV, Anti-Bot and Threat Emulation functions
https://www.checktls.com/TestReceiver An online tool to check TLS and Certificate details
If you check the box Do not show this prompt again you will, of course, not be prompted to enter descriptions for applied changes in the future. If you later decide you’d like to have this feature back, highlight the Troubleshooting node in the navigation tree and select the Change Tracking tab in the main window. In the Tasks pane click Configure Change Tracking and check … Continue reading TMG Forefront 2010: Re-enabling Configuration Change Tracking Description
Applies To: Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 The forwarding server needs to be given a reasonable amount of time to answer a DNS query. For example, a forwarding server that has root hints enabled may have to query on the Internet for an answer, which can require additional … Continue reading How to increase DNS Timeout Value?
E-mail is one of the most widely used Internet services today. The services which are generally used in the e-mail Infrastructure are Simple Mail Transfer Protocol (SMTP) and Post Office Protocol version 3 (POP3) or Internet Message Access Protocol (IMAP). The client communicates with e-mail server through Simple Mail Transfer Protocol (SMTP) and retrieves a … Continue reading What Are Email Vulnerabilities And How Can We Secure Our Email Account
Affected Products Chrome browser version 58 and later, and: accessing secure websites hosted behind a ProxySG (reverse proxy) or accessing other websites through a ProxySG or ASG where redirect-mode authentication is performed over SSL or accessing the management console, via any version of the ProxySG or Advanced Secure Gateway (ASG). Overview The latest versions of … Continue reading Symantec ProxySG: Error: NET::ERR_CERT_COMMON_NAME_INVALID when accessing secure web sites via ProxySG or ASG