Got a request from “dedu mihail” & “Amandeep Singh” on how to block https sites. In this quick walk-through we show how to use the proxy with manual settings which is needed to block https urls / sites. It does not work via transparent mode. (We could not find a simple way to make it work via transparent mode).
1. Configure the end user machine to use the proxy.
2. Configure the proxy on IPFire to use the url filter capability.
3. Configure the url filter to block the https url 4. Configure the url filter to allow restriction bypass for listed IP’s.
Ever been away from home or office and wanted to use a VPN securing your network connection. (You should always use a VPN when on un-trusted networks!) You also never sure what the “Free” VPN providers are doing with your logs. Why not setup your own VPN, that you have full control off. In this how to guide we will go through the installation of IPFire with OpenVPN and the relevant configurations. This will enable you to make use of your own private VPN when away from home or the office.
In this walk-through we will demonstrate the basic steps used to install NextCloud on Azure.
This walk-through will include:
1) Create the Virtual Machine running Ubuntu
2) Install snap & NextCloud via snap on the Virtual
3) Configure Static IP with DNS / FQDN.
4) Configure Firewall rules.
5) Configure HTTPS with lets Encrypt
6) Test the the NextCloud instance is accessible.
sudo apt-get update
sudo apt-get install snap
sudo snap install nextcloud
sudo nextcloud.enable-https lets-encrypt
Keep in mind this is only a basic install and will need to
be secured using best security practices etc. If enough demand, we might do a
future walk through on how to secure your public facing systems.
In this walk through we will show you how to install Pi-Hole to enable network wide ad blocking on your network. We will also show you how to configure a windows machine and the basic steps on how to enable it network wide via your router.
ssh to the OS you decided to use after the OS installation. (We used Debian 9 for the walk through.)– $ su– # wget -O basic-install.sh https://install.pi-hole.net– # bash basic-install.sh
login you our device/s and point its dns settings to the Pi-Hole server. Alternatively change the settings on your router to provide the Pi-Holes ip as your networks dns via DHCP. For more detail refer to the video provided by the link below or reach out to us.
QRadar Community Edition 7.3.1 is a fully-featured version of QRadar that you can use at home or in your lab. A new feature of QRadar Community Edition 7.3.1 enables IBM Security X-Force® Threat Intelligence IP reputation for use.
Note: “# sudo /opt/qradar/support/changePasswd.sh -a” command is used to set the QRadar WUI admin password at the end of the installation.
QRadar Community Edition v7.3.0 is the previous release.
Q1 LABS, QRADAR and the ‘Q’ Logo are trademarks or registered trademarks of IBM Corp. All other trademarks are the property of their respective owners.