Skip to content

DesertDefenses.com – Information and Network Security

Security Software, Vulnerabilities, Security Blog, Check Point Software

  • About Me
    • Mark Bennett
    • Lari Luoma
  • Vulnerabilities
  • Check Point Software Feeds
  • How to
    • clustering
    • backup
    • Identiy Awareness
    • network
    • Security Software
    • Check Point Training Videos
  • Check-Point-Software
  • Check-Point-blog
  • SANS
DesertDefenses.com – Information and Network Security

How to

CATEGORIES:

Clustering

Backup

Identity Awareness

Networking

Share It

Share It

Categories

  • backup
  • clustering
  • How To's
  • Identiy Awareness
  • network
  • O/S Commands
  • R80
  • R80
  • Security Software
  • Uncategorized
  • Virtual Cloud
  • Vulnerabilities

RSS SecurityWeekly

  • LinkedIn Vulnerability Allowed User Data Harvesting
    LinkedIn recently patched a vulnerability that could have been exploited by malicious websites to harvest data from users’ profiles, including private information. read more
    Eduard Kovacs
  • Google Prompt Arrives in Gmail for iOS
    Google this week announced that iOS users can now receive Google prompts via their Gmail application. read more
    Ionut Arghire
  • Nigerian Hackers Attempt to Steal Millions From Shipping Firms
    Secureworks has recently discovered a threat actor whose business email compromise (BEC) campaigns focus solely on global maritime shipping companies and their customers. read more
    Ionut Arghire

Cool Links

  • Check-Point-Software
  • Check-Point-blog
  • SANS

Recent Posts

  • Install Check Point GW in under 10 minutes
  • Check Point Health Check
  • Exporting Security Management Server Into Readable Format R80x
  • WannaCry Ransomware
  • Check Point vSEC and securing the public/private cloud part 1

Archives

  • January 2018
  • December 2017
  • November 2017
  • May 2017
  • March 2017
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • About Me
    • Mark Bennett
    • Lari Luoma
  • Vulnerabilities
  • Check Point Software Feeds
  • How to
    • clustering
    • backup
    • Identiy Awareness
    • network
    • Security Software
    • Check Point Training Videos
  • Check-Point-Software
  • Check-Point-blog
  • SANS
DesertDefenses.com – Information and Network Security Proudly powered by WordPress