ASA and ASDM Compatibility Tables

A quick pointer to the ASA software compatability tables.  When checking what version you can update a Cisco ASA to, these tables do prove rather useful. 9.9 to 9.5, Current Models https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html#pgfId-268944 Other release compatability is then provided in the other tables. Legacy Models are shown in Table 6 https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html#pgfId-112283 (Correct at time of publishing, …

Continue reading ‘ASA and ASDM Compatibility Tables’ »

Digitally signing email with S/MIME and the iPhone / iOS

You can use S/MIME certificates, also called “Digital Certificates” or “Personal Certificates”, with most email clients to digitally sign and/or encrypt email messages. In order to digitally sign or encrypt your email, you will need a digital certificate. For a run down on how to get a certificate, and also how to use it in …

Continue reading ‘Digitally signing email with S/MIME and the iPhone / iOS’ »

Digitally signing email with S/MIME and Outlook 2016

You can use S/MIME certificates, also called “Digital Certificates” or “Personal Certificates”, with most email clients to digitally sign and/or encrypt email messages. In order to digitally sign or encrypt your email, you will need a digital certificate. Get a certificate For this example, we will use the free certificate service from Comodo. Head over …

Continue reading ‘Digitally signing email with S/MIME and Outlook 2016’ »

Deny access to all .php files in a folder using htaccess

In order to further harden a folder, for example an ‘uploads’ folder as used by WordPress, it maybe appropriate to block the execution of key file types. If you have a specific folder where content can be more easily written, blocking execution of script files will help reduce the chance of an attacker executing a …

Continue reading ‘Deny access to all .php files in a folder using htaccess’ »

Browser Separation with Integration using VirtualBox

Seamless window integration of two separate operating systems, with isolated network stacks. Ransomware poses a real risk to every day web surfers. There are multipule attack vectors, drive by downloads, compromised sites and malvertising to name just a few are all huge areas of risk. This leads some to want seperation or sand boxing of …

Continue reading ‘Browser Separation with Integration using VirtualBox’ »

Dealing with SPAM email abuse reports

As any sysadmin responsible for mail systems will know, sometimes email gets relayed that shouldn’t. In this post, we will walk through the process of dealing with a SPAM email abuse report. It’s key to ensure these are dealt with in a timely manor as it will effect the SMTP servers reputation and therefore its …

Continue reading ‘Dealing with SPAM email abuse reports’ »