September 26, 2023

This is the story of Vittoria (a pseudonym, henceforth referred to as V). A few days ago, V called me in an emergency: her Facebook account had been stolen by Nhang (a pseudonym, henceforth referred to as N).

Post cover
September 25, 2023

In this article, we present an initial example of executing mass commands using Ansible on Cisco IOS devices. We will utilize the pre-configured “Cisco Legacy Core-Access topology” lab available in the repository DevNetOps course material:

Post cover
September 24, 2023

Ansible is distributed as a Python module installable via PIP. The installation process is straightforward but warrants some considerations. Typically, the automation host, the system from which all automation scripts originate, is one of the most critical systems within an infrastructure.

Post cover
September 21, 2023

The first step to work in the IT field today is to set up a laboratory. EVE-NG (formerly UNetLab) can be used for network, network security, and automation labs. EVE-NG is based on Ubuntu Linux 20.

Post cover
September 16, 2023

This post recounts an attempt at fraud via SMS and voice call with a fake voice, targeting an elderly person. Although this type of fraud is not new, the way it was executed deserves further examination.

Post cover
August 12, 2023

Operating on a data center (DC) or backbone Internet Service Provider (ISP) typically involves a significant amount of human effort, resulting in operational costs that are often overlooked. However, these costs can be optimized by harnessing the power of automation to handle simple and repetitive tasks efficiently.

Post cover
March 02, 2023

I used to deploy a simple network architecture for two main reasons. They are easy to debug/troubleshoot Engineers who came after can easily understand and manage them. With these rules in mind, I usually deploy in-line firewalls, meaning that traffic is routed through a firewall that is placed “in the path”:

Post cover
October 31, 2022

This is the third part of my IaC overview based on a personal experiment: building Cyber range using the IaC paradigm. Here is the first and second parts. A few weeks ago I met Spacelift and I had the chance to test their product.

Post cover
October 30, 2022

This is the second part of my IaC overview based on a personal experiment: building Cyber range using the IaC paradigm. Here are the first and third parts. In a pure design perspective, the client-to-site VPN approach is still the best.

Post cover
October 29, 2022

This is the first part of my IaC overview based on a personal experiment: building Cyber range using the IaC paradigm. Here are the second and third parts. During my Twitch session, I’m used to offering a practical lab to attendees.

Post cover