Ruby Sash Consulting

AppSec, NetSec, DevOps, Social Engineering, Cloud, Forensics, Programming, SysAdmin Notes

  • Programming
    • Perl
    • Python
    • Visual Basic
    • WordPress
  • Firewalls
    • Check Point
    • UFW
  • Operating Systems
    • Linux
    • Windows
  • Pen Test
    • OWASP
    • Scanning & Enumeration
    • Security Tools
  • VmWare
  • Cloud
    • GCP
    • AWS
    • Azure
  • SIEM/MSSP
  • DLP
  • About
    • Contact
    • IT Security SIC Codes
    • Privacy Policy
    • Sitemap

firewall

UFW 

UFW Tutorial for Ubuntu

March 4, 2019July 26, 2019 Dave 0 Comments firewall, linux

UFW manages iptables in a little bit easier way than actually writing IPtables commands. This article will give a few

Read more
DYN DNS logo
Linux 

Bash Script Update UFW Rule for Dynamic Host

December 12, 2018October 6, 2022 Dave 5 Comments automation, bash, crontab, firewall, linux, programming, scripting, ufw

Bash script using cron to update UFW rules on Ubuntu for Dynamic Hosts and remote access.

Read more
Join CSV
Perl 

Join Similar CSV Using Perl

October 10, 2018March 6, 2019 Dave 0 Comments Check Point, coding, CSV, firewall, Perl, programming, scripting

When exporting logs in Check Point using the smart log feature, sometimes the column order is randomized. If you have

Read more
Fix Encoding Issues with Perl
Perl 

Fix Encoding Issues With Perl

October 10, 2018March 6, 2019 Dave 0 Comments coding, CSV, encoding, firewall, linux, Perl, programming, scripting, utf-8

Sometimes when working with text files (like log exports), you might encounter weird encoding issues. If you need to fix

Read more
Splice CSV Files with Perl
Perl 

Perl Script to Splice CSV Files

October 10, 2018March 6, 2019 Dave 0 Comments coding, CSV, firewall, Perl, programming, scripting

Need to use a Perl script to splice out a section of a large CSV file? This should do the trick!

Read more
Check Point 

How to Troubleshoot SIC on Check Point Firewall

July 14, 2018July 20, 2018 Dave 0 Comments Check Point, firewall, SIC

SIC (Secure Internal Communication) is used to establish trust between firewalls and managers. This is how to troubleshoot SIC:

Read more

Please Visit My Sponsors

$1 Domain! $25 credit
$5 VPS! $200 credit!

Sitting All Day?

Fix Hip Flexors

Tags

Apache apt automation AWS bash Check Point cloud coding crontab CSV devnull DLP EC2 encoding enumeration firewall games git html json linux mysql owasp pentest Perl powershell programming python scheduling screen scripting shell ssh ssl svg sysadmin syslog tkinter troubleshooting ubuntu vbs vim VPS windows Wordpress

Recent Posts

  • Use SSH Keys with Git
  • Check Open Ports with Powershell
  • Setup rsyslog Client Forwarder on Raspberry Pi
  • ‘optiPNG’ vs ‘PNGcrush’ vs ‘Gimp’ to Reduce PNG Size
  • cygwin ssh-agent and ssh-add Automated Passwords
  • Basic Git Tutorial Crash Course
  • Setup DVWA to Practice Application Security Pentesting
  • How to Setup LAMP Stack Ubuntu 18.04 LTS
  • How to Set Up Free Amazon VPS (EC2)
  • Basic tkinter usage for Python 3

For I am not ashamed of the gospel, for it is the power of God for salvation to everyone who believes. 
– Romans 1:16

Do you see a man skillful in his work? He will stand before kings; he will not stand before obscure men.
– Proverbs 22:29

Whatever you do, work heartily, as for the Lord and not for men..
– Colossians 3:23

One who is faithful in a very little is also faithful in much, and one who is dishonest in a very little is also dishonest in much.
– Luke 16:10

Copyright © 2019 Ruby Sash Consulting.