Benefits of writing a technical blog

Writing a technical blog can demonstrate your knowledge and expertise in a specific area of technology, making you a valuable resource in your field. Blogging can open networking opportunities, by establishing you as a thought leader in your field, you can attract followers and connect with other experts in your industry. Blogging can help you … Continue reading Benefits of writing a technical blog

What is ChatGPT? How is it going to disrupt the market?

ChatGPT is a large language model developed by OpenAI. It is trained on a massive amount of text data and is capable of understanding and responding to natural language prompts. In terms of market disruption, ChatGPT and other similar models have the potential to revolutionize industries such as customer service, content creation, and language translation. … Continue reading What is ChatGPT? How is it going to disrupt the market?

Should we use PHP to build our website?

PHP is a widely-used programming language, and as such, it has a large attack surface. Hackers can exploit vulnerabilities in PHP code to gain access to sensitive information or take control of a website. PHP is a server-side language, which means that it can be slower than other languages, such as static HTML or JavaScript. … Continue reading Should we use PHP to build our website?

Why Curiosity Is Better Than Intelligence?

Curiosity and intelligence are two different traits that can both contribute to an individual's success and personal growth. Here are a few reasons why curiosity may be better than being smart: Curiosity drives learning: Being curious about the world around you can drive you to learn and explore new things, whether it's a new subject, … Continue reading Why Curiosity Is Better Than Intelligence?

Check Point VM Lab setup using VMware Workstations

1. Disclaimer This article assumes basic to intermediate networking knowledge and good familiarity with CheckPoint products using VMware "VM". Both the CheckPoint firewall and management server are using GAiA R75.45. For the purpose of this article I will assume that the following is already in place, up and running: 1) A CheckPoint Firewall VM was … Continue reading Check Point VM Lab setup using VMware Workstations

Configuring per user IP assignment using ipassignment.conf in Check Point for remote access users

In order to assign individual IPs and ranges to certains remote access users, Check Point provides a configuration file allowing you to configure your gateway as required. This configuration file is : $FWDIR/conf/ipassignment.conf This article we will outline some of the possible gotcha`s and also run through the required steps. Within this example we will … Continue reading Configuring per user IP assignment using ipassignment.conf in Check Point for remote access users

Allowing Domain / DNS based objects through a Check Point Firewall

In order to to allow domain based objects through a Check Point firewall we need to understand how the domain objects actually work. When a packet hits a rule with a domain based object the Check Point does a reverse DNS looking up on the IP address against the domain object to see if they … Continue reading Allowing Domain / DNS based objects through a Check Point Firewall

Check Point Clustering

ClusterXL Check Point's ClusterXL is a software-based Load Sharing and High Availability solution that distributes traffic between clusters of redundant Security Gateways High Availability Allows for an Active-Standby setup were one node (Active) passes all the traffic. In the event of failure the Standby node will be promoted to the Active node. New Mode - … Continue reading Check Point Clustering