asrarabukhair.com
  • Contact Me
  • Privacy Policy
  • Hi, welcome to

    Random cheatsheet

  • Featured posts

    Free-Bsd or Linux

    March 20, 2023 02:52
  • Featured posts

    10 Essential Cybersecurity Practices Every Business/Personal Should Implement

    March 20, 2023 02:48
  • Featured posts

    cPanel/WHM Migration using Command Line

    March 20, 2023 02:45
A.

AWS S3 Default Encryption vs Bucket Policies

January 6, 2023 01:26January 6, 2023By asrarIn aws0 Comments92 Views

Amazon S3 offers two ways to set up default encryption for objects in a bucket: Both Default Encryption and Bucket Policies can be used to enforce encryption requirements for objects in a bucket. Default Encryption is a bucket-level setting that…

Read more

O.

OrbitKey Organizer, Sleek and Compact

January 3, 2023 01:57January 3, 2023By asrarIn edc0 Comments77 Views

If you’re always on the go and looking for a way to keep your keys, wallet, phone, and other small items organized and easily accessible, the Orbitkey Portable Organizer might be just what you’re looking for. This compact and customizable…

Read more

O.

Orbitkey Desk Mat for Your Sleek Desk

January 3, 2023 01:55January 3, 2023By asrarIn edc, office0 Comments43 Views

Are you tired of having a cluttered and disorganized desk? The Orbitkey Desk Mat might be just what you need to get your workspace in order. This stylish and practical desk mat is designed to keep your desktop clutter-free and…

Read more

B.

Block Bad IPs form AbuseIPDB with CSF

January 3, 2023 01:38January 6, 2023By asrarIn firewall, Linux0 Comments55 Views

ConfigServer Firewall (CSF) is a firewall and security tool for Linux servers. It provides a number of features for protecting servers from malicious activity, including IP address blocking, port blocking, and rate limiting. IP Abuse is a database of IP…

Read more

C.

Configure and install fail2ban for zimbra email server step by step

January 3, 2023 01:23January 6, 2023By asrarIn Linux, Zimbra0 Comments78 Views

Fail2ban is a tool that can be used to protect servers from brute-force attacks and other forms of malicious activity. It works by monitoring log files and blocking IP addresses that show signs of malicious activity, such as repeated failed…

Read more

Posts navigation

Previous 1 2 3 4 5 6 7 8 9 … 11 Next

Asrar.

© 2020 CheatSheet.

Menu
  • Contact Me
  • Privacy Policy
Search
Have a story to share?

Call directly at
202-555-0120
Monday – Friday, 9 – 16PM