Cheat Sheet – User Management Commands in Linux
In the world of Linux and Unix-based systems, user roles and permissions are the foundation of security and system integrity. In this post…
Mastering GCP Virtual Machines – Part 3 (Connect to Windows VMs)
In Part 2 we saw the different access methods we can use to connect to our Linux virtual machine instances. Further we saw…
Mastering GCP Virtual Machines – Part 2 (Connect to Linux VMs)
In Part 1 we saw how to create a new virtual machine instance (Linux Ubuntu), checking if the google guest…
Mastering GCP Virtual Machines – Part 1
Even with all the fancy managed services, plain old virtual machines are still the backbone of a lot of real-world…
Step-by-Step Guide: Setting up Route Based S2S VPN between Azure and on-prem by using pfSense – Part 2
Part 1 covers the setup by using static routes, ideal for simpler environments or when dynamic routing isn’t required. Now this second part explores the BGP (Border…
Step-by-Step Guide: Setting up Route Based S2S VPN between Azure and on-prem by using pfSense – Part 1
Establishing a secure and reliable VPN tunnel between your on-premises network and Azure is a critical step in enabling hybrid…
Step-by-Step Guide: Setting up Classic VPN with Static Routes between Google Cloud and On-Prem by using Juniper vSRX3
In this post, we will see step by step how to configure a Classic VPN with static routes between Google…
Step-by-Step Guide: Setting up HA VPN with BGP between Google Cloud and On-Prem by using Juniper vSRX3
In this post we will see step by step how to set up HA VPN and BGP between our Google Cloud VPC and…
Mastering BGP between Juniper and Azure
Establishing seamless hybrid connectivity between on-premises networks and the cloud is a cornerstone of modern IT infrastructure. While IPsec tunnels…
VMware vSphere boot loop when trying to boot from Windows Server 2025 ISO
When trying to install Windows Server 2025 on vSphere, I was running into an known issue which actually requires a…
Follow me on LinkedIn
