You know how to whistle, don’t you? Just put your lips together and blow. Well installing WSL is nearly as easy and can up your efficiency and expand your toolset.
Continue readingHome LookingPoint Blog
You know how to whistle, don’t you? Just put your lips together and blow. Well installing WSL is nearly as easy and can up your efficiency and expand your toolset.
Continue readingAre passwords a thing of the past? Well to be honest, no not yet they aren’t, but there seems to be a widespread initiative to cram them into a time capsule, move into the future, and forget about them altogether. From post-it notes to password managers, to any of the other tools or tricks that people use to remember them, passwords are renowned for being a weak...
Continue readingIf you aren’t already using file checksums, why not? It’s a REALLY good idea for any file you download over the internet. It could also be a good idea for a file you may want to ensure stays unchanged on your own network. File checksums are a vital tool for ensuring the integrity and authenticity of files. They serve as digital fingerprints, allowing you to verify whether a file has been tampered...
Continue readingHow would you like a tool that can save you time with TAC cases and gives you an avenue of automation and time savings for your entire Cisco environment? If that sounds good, you should give RADKit a look.
Continue readingSo, you’ve verified your firewall appliance is allowing your application traffic, you’ve ensured your routers are getting the traffic where it needs to go, and your access control lists on your switches are perfect. A packet cap on your switch shows the traffic getting to your Windows server. Why isn’t it working? I’ve run into the Windows server itself blocking traffic destined to its own...
Continue readingThis will be the final installment in this NSLOOKUP Primer series. Last time, I talked about MX & SPF TXT records here, but I didn’t touch on DMARC & DKIM TXT records which are also highly encouraged to help add additional layers of security to your email domain.
Continue readingIn my last nslookup blog, I talked about some basic DNS troubleshooting. If you missed it, here’s the link. This time, I wanted to dive in to how I use nslookup for email info gathering and troubleshooting.
Continue readingSo there you are in front of your computer, you know you have internet access, you can ping 8.8.8.8, but your browser isn’t working, and when you try to ping google.com, the name is unable to resolve. You think to yourself “If only I had saved that blog article about nslookup locally, so I didn’t have to depend on the internet to get all that great info!”.
Continue readingThe Meraki dashboard is phenomenal in my opinion. With next to no effort on your part, you have a LOT of data at your fingertips. What if you want that data available for easy export, or if you want to access data older than 30 days old? I ran into just that scenario and found that on top of the GUI, Meraki provides a pretty fantastic API with access to even MORE data. Let me show you how to...
Continue readingI recently set up SSO on our Rubrik backup device and had a hard time finding a thorough walkthrough, so I put this together in hopes that it will help someone else out. My suggestion would be to read it over once paying attention to the notes I threw in there before starting. Ready? Ok, let’s do it!
We’ll start with configuring an Identity Provider (IDP) in Rubrik, then we’ll jump back and forth...
Continue readingLooking Point Inc. 2019