General Protection Fault during UEFI pre-boot startup

Symptoms After updating the LCC (Life Cycle Controller) firmware, the server will no longer boot to the operating system.  A error similar to below is displayed.  A system restart is required.                                                          BIOS rev 1.x.xThe system detected an exception during the UEFI pre-boot environment.Press ENTER on the serial console (@115200 8-N-1) for detailed exception info.————————————————————————————Type: General … Read more

Difference between a public and private IP address

All IPv4 addresses can be divided into two major groups: global (or public, external) – this group can also be called ‘WAN addresses’ — those that are used on the Internet, and private (or local, internal) addresses — those that are used in the local network (LAN). Public IP address These are public (global) addresses … Read more

12 Most Important topics in CCNA

1. Address Resolution Protocol (ARP): ARP is a layer of 2 protocols. It’s full form Address Resolution Protocol itself defines its function. A PC sends an ARP request to know the MAC address of a device. ARP request is broadcast. In response to an ARP request, PC generates an ARP reply that is unicast in … Read more

Configuring Palo Alto Networks Firewall

Palo Alto Networks firewall detects traffic from an endpoint that matches a configured security policy using the endpoint’s auth table entry. It determines the role(s) associated with that user and allows or denies the traffic based on the actions configured in the security policy. Configuring User Identification on Security Zones Policy rules on the firewall … Read more

How To Create An IT Policy For Your Business

How To Start Writing An IT Policy? We know that policies aren’t fun to read, let alone write. But they are an important foundation for building your IT operations and management. Your Information Technology (IT) Policy document doesn’t have to be complicated, overly technical, or pedantic. In fact, if you want your employees to actually … Read more

Monthly Business Brief, September 2023

Economy The State Administration Council was reformed again on 25th September 2023 with 18 Members. Two new members are General Maung Maung Aye and Lt. General Nyo Saw. With reform of SAC, the government has reshuffled the cabinet with the following reassignment: Lt-Gen Soe Htut, Union Minister for Union Government Office (1) to the original military … Read more

Myanmar’s economic recovery slowed by high prices and shortages

 While economic conditions in Myanmar stabilized in the first half of 2023, businesses continue to face multiple challenges, household incomes remain weak, and food security has become an increasing concern, according to the World Bank’s semi-annual Myanmar Economic Monitor. Economic activity is slowly increasing in Myanmar, but from a low base, the report, A Fragile Recovery, … Read more

Sole Proprietorship

What is a Sole Proprietorship? A sole proprietorship is an unincorporated business that one person owns and manages. As the business and the owner are not legally separate, it is the simplest form of business structure. It is also known as individual entrepreneurship, sole trader, or simply proprietorship.  The business owner, also known as a proprietor or a trader, conducts business using their legal … Read more

How to limit network bandwidth on linux

Limiting Network Bandwidth One of the easiest way to control over the network traffic is via command line tool called “trickle“. It can be limit application bandwidth, upload or download speed, or prioritizing daemons (a computer program that runs as a background process). tickle works on the concept based on “Linux Pre-Loader”. It controls the … Read more

How to Crack WPA/WPA2 | Wireless hacking tools

Introduction This tutorial walks you through cracking WPA/WPA2 networks which use pre-shared keys. I recommend you do some background reading to better understand what WPA/WPA2 is. The Wiki links page has a WPA/WPA2 section. The best document describing WPA is Wi-Fi Security – WEP, WPA and WPA2. This is the link to download the PDF directly. The WPA Packet Capture Explained tutorial is … Read more

Zero-Day Alert: Google Chrome Under Active Attack, Exploiting New Vulnerability

Google has rolled out security updates to fix seven security issues in its Chrome browser, including a zero-day that has come under active exploitation in the wild. Tracked as CVE-2023-6345, the high-severity vulnerability has been described as an integer overflow bug in Skia, an open source 2D graphics library. Benoît Sevens and Clément Lecigne of Google’s … Read more

Your organization’s security policies block unauthenticated guest access

If you try to connect to a device, which requires the credentials of a guest instead of proper authentication, you might come across an error message – You can’t access this shared folder because your organization’s security policies block unauthenticated guest access. To resolve this issue, you can use the Group Policy Editor or Registry Editor. … Read more

How To Use Telnet On Windows

How to Enable Telnet on Windows 10? In Windows systems, Telnet is disabled by default. To check if Telnet is already activated, open your command line, and run telnet: If the command prompt does not recognize the command, there are two possible ways to enable the Telnet client in Windows. Option 1: Enable Telnet using GUI … Read more

Categories of Ethernet LAN Cables in History

What is the Ethernet? Ethernet is the technology of connecting computers and electronic devices in short distances to form a local area network (LAN). Ethernet networks may include cable connected and wirelessly connected devices. Who invented the Ethernet? The Ethernet was founded by Robert Metcalfe and David Boggs in 1973. The first network connecting computers … Read more