Jake Williams (@malwareJake) from CSR Group has more than a decade of experience with systems engineering, network defines, malware reverse engineering, penetration testing and forensics. He spent some good time looking at Cloud synchronization services and is presenting some Read more
Keywords : Windows 2008 PKI Certificate Authority certutil certreq template root CA Enterprise CA convert pfx to pem generate custom certificate request subject alternate name san attribute Today’s blog post targets the deployment of a Windows 2008 server based Read more
Assuming that you’ve made yourself familiar with the procedure on how to allow/deny access to a specific lun based upon IP addresses, then you might have wondered if you can secure access to a LUN even more. After all, Read more
After playing with Openfiler for a while, I started wondering how I could get access to a snapshot that was created with Openfiler.
This is how it works (according to me, I just hope Openfiler and iSCSI Enterprise Target Read more
After playing with iSCSI Enterprise Target for a while, I decided to have a look at some other solutions as well. I’m not saying that iSCSI Enterprise Target is not a stable and mature solution, but it lacks some Read more
In a previous post, I’ve shown how to set up a Linux based SAN solution, based upon Fedora Core 6 and the free iSCSI Enterprise Target tool. In this post, I’ll show how to connect to the SAN from Read more
While setting up the basic infrastructure for my VMWare environment, I wondered if it would be possible to emulate a SAN on a Linux box, for free. And as a matter of fact, it is possible.
I stumbled across Read more