Categories
Amazon AWS DevOps Linux

5 steps to setup SSH PROXY VIA WITH PUTTY

Depending on your setup and where you are deploying your solution, you may have to jump via multiple servers before you can get access to your internal server. This quick guide will help you understand how you can leverage PUTTY to Proxy via multiple SSH hosts. Here is the example: let say that you are […]

Categories
Firewall Security

How to control Dropbox access via your firewall

Dropbox is a great service that allows the end user to syncronize files to a public cloud and access the files from almost any device or thru a web browser. Some companies may want to restrict or allow access to the¬†DropBox service. Here are some details that may help you create firewall rules for the […]

Categories
Windows

Windows 2008 Security Policies in Plain English

For all those administrators will like a list of security policies in plain English here is Microsoft list. The list has the explanation for the settings. This is not a security guide it is the documentation of the security policies in Windows 2008. http://technet.microsoft.com/en-us/library/dd349805%28WS.10%29.aspx