Ruby Sash Consulting

AppSec, NetSec, DevOps, Social Engineering, Cloud, Forensics, Programming, SysAdmin Notes

  • Programming
    • Perl
    • Python
    • Visual Basic
    • WordPress
  • Firewalls
    • Check Point
    • UFW
  • Operating Systems
    • Linux
    • Windows
  • Pen Test
    • OWASP
    • Scanning & Enumeration
    • Security Tools
  • VmWare
  • Cloud
    • GCP
    • AWS
    • Azure
  • SIEM/MSSP
  • DLP
  • About
    • Contact
    • IT Security SIC Codes
    • Privacy Policy
    • Sitemap

firewall

UFW 

UFW Tutorial for Ubuntu

March 4, 2019July 26, 2019 Dave 0 Comments firewall, linux

UFW manages iptables in a little bit easier way than actually writing IPtables commands. This article will give a few

Read more
DYN DNS logo
Linux 

Bash Script Update UFW Rule for Dynamic Host

December 12, 2018March 18, 2020 Dave 5 Comments automation, bash, crontab, firewall, linux, programming, scripting, ufw

Bash script using cron to update UFW rules on Ubuntu for Dynamic Hosts and remote access.

Read more
Join CSV
Perl 

Join Similar CSV Using Perl

October 10, 2018March 6, 2019 Dave 0 Comments Check Point, coding, CSV, firewall, Perl, programming, scripting

When exporting logs in Check Point using the smart log feature, sometimes the column order is randomized. If you have

Read more
Fix Encoding Issues with Perl
Perl 

Fix Encoding Issues With Perl

October 10, 2018March 6, 2019 Dave 0 Comments coding, CSV, encoding, firewall, linux, Perl, programming, scripting, utf-8

Sometimes when working with text files (like log exports), you might encounter weird encoding issues. If you need to fix

Read more
Splice CSV Files with Perl
Perl 

Perl Script to Splice CSV Files

October 10, 2018March 6, 2019 Dave 0 Comments coding, CSV, firewall, Perl, programming, scripting

Need to use a Perl script to splice out a section of a large CSV file? This should do the trick!

Read more
Check Point 

How to Troubleshoot SIC on Check Point Firewall

July 14, 2018July 20, 2018 Dave 0 Comments Check Point, firewall, SIC

SIC (Secure Internal Communication) is used to establish trust between firewalls and managers. This is how to troubleshoot SIC:

Read more

Sitting All Day?

Fix Hip Flexors

Free Book of DIY Games

Free Games Book

Tags

Apache automation bash Check Point coding crontab CSS CSV data mining devnull DNS encoding encryption Featured Image firewall forensics games git hexdump http linux load balancer lwp mechanize pentest Perl programming proxy python scheduling scrape screen scripting shell SIC ssh svg sysadmin thunderbird tools troubleshooting ufw utf-8 windows Wordpress

Recent Posts

  • Use SSH Keys with Git
  • Check Open Ports with Powershell
  • Setup rsyslog Client Forwarder on Raspberry Pi
  • ‘optiPNG’ vs ‘PNGcrush’ vs ‘Gimp’ to Reduce PNG Size
  • cygwin ssh-agent and ssh-add Automated Passwords
  • Basic Git Tutorial Crash Course
  • Setup DVWA to Practice Application Security Pentesting
  • How to Setup LAMP Stack Ubuntu 18.04 LTS
  • How to Set Up Free Amazon VPS (EC2)
  • Basic tkinter usage for Python 3

For I am not ashamed of the gospel, for it is the power of God for salvation to everyone who believes. 
– Romans 1:16

Do you see a man skillful in his work? He will stand before kings; he will not stand before obscure men.
– Proverbs 22:29

Whatever you do, work heartily, as for the Lord and not for men..
– Colossians 3:23

One who is faithful in a very little is also faithful in much, and one who is dishonest in a very little is also dishonest in much.
– Luke 16:10

Copyright © 2019 Ruby Sash Consulting.