All things engineering: processes, best practices, setup guides, and more!

Firewall & Security Features


Create an Inbound ICMP Rule

Allocated filter altitudes

Captive Portal and HSTS difficulties

Allow Webex Meetings Traffic

File sharing over a network in Windows 10

Can't connect to Internet

Flush DNS - How and why to clear your DNS cache

Hosts File

An Introduction to Learning and Using DNS Records

The curl guide to HTTP requests

Troubleshooting network and BAT File

conntrack: command line interface for netfilter connection tracking - Linux Man Pages (8)

WAF - HOW TO HACK IT

Firewall Penetration Testing: Steps, Methods, & Tools | PurpleSec

Office 365 URLs and IP address ranges - Microsoft 365 Enterprise | Microsoft Docs

Protocols other than TCP: UDP and ICMP

Stateful Firewall Fundamentals | Pluralsight

How to setup a VPN connection in Windows 10 (PPTP) | Impact Computing

Configuring An IKEv2 IPsec Connection From Windows 10 To Untangle NG Firewall – Untangle Support

Configuring An IKEv2 IPsec Connection From Windows 10 To Untangle NG Firewall – Untangle Support

Installing Burp's CA certificate in Chrome - PortSwigger

Sophos Web Appliance: Install the Sophos-Generated Certificate Authority in your Users' Browsers

How to troubleshoot MTU related issues using Wireshark. - Clavister Forums

Troubleshooting Bitbucket Cloud MTU/MSS issues | Bitbucket Cloud | Atlassian Documentation

Pathping | Microsoft Docs

What is a DDOS Attack & How to Protect Your Site Against One

How do I know if a TCP port is open or closed?

What is a DDoS (distributed denial-of-service) attack? │ Akamai

Ransomware detection and recovering your files - OneDrive (home or personal)