Migrating from software-based firewall to hardware-based firewall

Currently I am using a software-based firewall, the PfSense. All is good since we starts use it since almost 10 years now, due there were few issues and limitations.

And it is time to get some changes, which I aimed to have it on a hardware-based firewall.

Before I proceed further, let’s take a quick glance on the differences between these type of firewalls, as well as the advantages and disadvantages.

» Read more

“You can’t access this shared folder because your organization’s security policies block unauthenticated guest access”

Have you ever see this kind of error message before? I did this morning when I tried to access one of the shared folder in our network. I am very sure I did not do anything on any setting and this error suddenly just came up. Tried to troubleshoot, reset network settings, spent hours on it but all seems does not work out. Decided to google it, found one of the solution as per below and finally fixed it.

» Read more

Modernize IT

These are the important steps in IT modernization.

STEP 1:

PRELIMINARIES Develop a plan Using an architectural approach, plot out the systems, processes and job categories that you need to modernize. Prioritize them so that you can tackle them in manageable increments.

1. Assess and inventory your IT systems; identify those that need to be replaced

2. Remember to consider licensing expenses and whether a product is still inside a support window in deciding which to update.

» Read more

1 2 3 7