How to search Java Keystore to see if a certificate is on the list: confirm that Java path is added to the Environment Variables. For example Variable name: JAVA_HOME Variable value: C:\Program Files\Java\jre1.8.0_192Test
tech
A collection of 45 posts
Upgrading FortiManagerv5.6.6 to latest version
In this example am moving from FMG_VM64_V5.6.6 to V6.0.3 which is a direct upgrade path according to the release docs https://docs.fortinet.com/uploaded/files/4829/fortimanager-6.0.3-release-notes.pdf Steps to upgrade
Using Open Source Analysis in Checkmarx v8.8.0
Get trial license or purchase license from Checkmarx for OSA, the use the license imported under Checkmarx installation path/ license importer/CxlicenseImporter.exe Assumption: you are already running Checkmarx CxSAST because OSA is an additional feature. Login as administrator, navigate
Importing Certificates into Java Keystore in Windows
Navigate to folder containing Java (JRE) installation. In the /bin you will find keytool.exe which will aid you import the certificate to the Java keystore. C:\Path to\Java\current JRE\bin>keytool -importcert -file nameofcertificate.cer -keystore
BGP routing issues, configs between firewalls and Cloud
Configured VPN using BGP to cloud provider at site A and everything worked as expected, then configure VPN using BGP to cloud provider at site B and traffic from site A to site B broke. Looking at logs, saw traffic
JMX user authentication
Java Management eXtensions technology provides a simple and standard way of managing and monitoring resources related to an instance of a Java Virtual Machine. It is disabled by default and when enabled it generally does not require authentication. This post
Troubleshooting blog using docker
sudo docker images to see what version of docker you are running pred@instance-1:/path/Blog/themes$ sudo docker images REPOSITORY TAG IMAGE ID CREATED SIZE ghost alpine efe90b499735 9 days ago 425MB jwilder/nginx-proxy latest 0f74bh924b37 2 weeks ago
OSSEC
OSSEC is an Open Source Host-based Intrusion Detection System that runs on most Operating Systems. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response It is simple to install and configure, so i
Subscribe to Vick
Subscribe today and get access to a private newsletter and new content every week!