The number of insights that are offered by any modern analytics platform is really invaluable and easy to use, but we tend to forget that even our server logs are an incredible source of information that with little or no effort we can query with a really simple script.
Continue reading “How find the top 10 IP addresses accessing your IIS web server with a Bash script and WSL”
The filename extensions for PKCS #12 are *.PFX or *.P12 and both are the most common bundles of X.509 certificates (sometimes with the full chain of trust) and private key.
I always need to look at the man page of OpenSSL or review my bash history to use the right options to extract a certificate file and a key file from it.
For this reason, I’ve created a small bash script to complete this step for me.
Continue reading “How to get your Certificate and Private Key file from a PFX file”
The first quarter of 2020 changed our personal and professional life in a lot of ways. I’ve read a lot of articles around the trends of adoption of cloud services and all software that should facilitate the challenge of enabling in every country the same practices and processes of working remotely.
During the last couple of months, I’ve received from small-medium businesses owners and IT professionals the same question how to transition smoothly and quickly. Working in the operations field for mid-large organisations it required me to step back from the most obvious and structured approaches and be more flexible and down-to-earth.
Continue reading “Working Remotely – Different solutions for Small Businesses with Powershell and SSH Tunnels”
Last December NIST announced this vulnerability CVE-2019-19781 and soon after that Citrix published this page CVE-2019-19781 – Vulnerability in Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliance and released a verification tool supporting clients for finding out if they were vulnerable or not: CVE-2019-19781 – Verification Tool
A verification tool is addressed to an IT specialist who works these solutions and needs to quickly assess if the software or appliance is affected by this vulnerability. Continue reading “Comparing Citrix CVE Verification Tool to a one-liner bash script”