Aliababa Cloud Key Management Service

Alibaba Cloud Key Management Service (KMS) provides secure and compliant key management and cryptography services to help you encrypt and protect sensitive data assets. KMS is integrated with a wide range of Alibaba Cloud services to allow you to encrypt data across

Read More

Using AWS Backup Audit Manager to Audit your backup RPOs

The new control in AWS Backup Audit Manager – Last Recovery Point Control. This allows customers to identify and report on the last available backup recovery point to ensure compliance with their organization’s recovery point (RPO) requirements. This new control extends the

Read More

Upgrading and Downgrading Windows Server Editions: A Comprehensive Guide

In the realm of Windows Server operating systems, the ability to upgrade or downgrade between different editions is a valuable feature that allows users to adapt their server environment to changing needs. In this guide, we will delve into the process of

Read More

ESXi root password is Loss and Create New Admin Account

Log in with administrator access to vCenter, so instead of changing the root password thru PowerCLI. PowerCLI to create an additional admin on the host for the troubleshooting, using this script: #connect to the vCenter connect-viserver <vCenter FQDN> #get the ESXi host

Read More

What is Egress and Ingress

In the area of networking, Egress refers to traffic that quits an entity or a network border, whereas Ingress refers to traffic that enters a network barrier. While this is quite obvious in service provider networks, it is significantly different in datacenter

Read More

Recover the AWS EC2 SSH key lost or Corrupted

If the AWS EC2 instance and your SSH key no longer work or are Lost or Corrupted. How am I going to regain access to the instance? There is a pretty simple workaround if you have access to the AWS console and

Read More

Alibaba Cloud BastionHost

What is Bastionhost? Bastionhost is a system O&M and security audit platform provided by Alibaba Cloud. It allows you to centrally manage asset permissions and O&M operations, and play back recordings of O&M operations. This way, you can identify the users who

Read More

AWS Transit Gateway

A transit gateway is a network transit hub that connects your virtual private clouds (VPCs) and on-premises networks. Inter-Region peering links transit gateways utilizing the AWS Global Architecture as your cloud infrastructure extends internationally. Your information is automatically encrypted and is never

Read More

Technitium MAC Address Changer

Technitium MAC Address Changer A freeware utility to spoof MAC address instantly Technitium MAC Address Changer is a free tool that can change your Media Access Control (MAC) address. The tool can change any Ethernet NIC’s MAC address to a specific address or generate a random

Read More

VMware affected with Critical Vulnerability in Apache Log4j CVE-2021-44228

Let’s take a quick look at exactly what the vulnerability described in CVE 202144228 is. We will also look at a critical vulnerability in Apache Log4j. CVE202144228 is affected by VMWare and identifies products that are potentially vulnerable to this highly malicious vulnerability. What is the cve-2021-44228 critical

Read More