Fujitsu fi-4750C in Windows 10 through Adaptec 78xx SCSI

Fujitsu fi-4750C in Windows 10 through Adaptec 78xx SCSIThe story may seem trivial and look only as an example of a successful use of the search engine. However, it contains a working solution, found through a long selection of working options, and I hope to help someone put into operation the iron that collects in the warehouse.
 
unofficial drivers 64 bit on the site http://r-massive.cellarseer.com (unfortunately, the site is silent about the history of their creation), which should have been guaranteed to start in Windows 8.? and as practice also showed in Windows 10.
 
For installation, it was necessary to disable signature verification ...
+ 0 -

Windows and case-sensitive filesystem

Long ago, at the dawn of its birth, Windows used the FAT file system. Then it was replaced by Microsoft and IBM developed NTFS. In those old days, there were two opposing approaches to the file system. Linux uses a case-sensitive file system, and in Microsoft it is case-insensitive.
 
 
The bottom line is that in case-sensitive file systems it is considered that names written in different registers (for example, FILE.txt and file.txt) are different names. And for Windows, there is no difference between the two.
 
 
Windows and case-sensitive filesystem  
 
Despite t...
+ 0 -

Cisco StealthWatch or classic corporate network protection (FW, IPS, ACL, NAC, AV, SIEM)?

Cisco StealthWatch or classic corporate network protection (FW, IPS, ACL, NAC, AV, SIEM)?
 
 
The structure of almost any IB system includes traditional systems (individually or in combination):
 
 
• Firewall
 
• Intrusion Prevention System (IPS)
 
• Access control lists (ACL)
 
• Network Access Control System (NAC)
 
• Antivirus systems (Antivirus /Antimalware)
 
• Management systems of the IB event (SIEM)
 
 
All these systems are good both individually for solving their problems, and in complex. However, there are various classes of tasks to provide IS, which the system data can not solve, alas. Moreover, the traditional network perimeter, where traditional means of protection in the modern ...
+ 0 -

Building an extended anti-virus protection system for a small enterprise. Part 3

Building an extended anti-virus protection system for a small enterprise. Part 3
 
In this part, we will continue to describe the solution of multi-stage protection based on the USG Performance Series gateways, in particular, Zyxel USG40W. Previous parts: first and the second is . But in the beginning it is worth remembering the reasons that encourage system administrators, IT security specialists to use such devices.
 
 
Next, we turn to the description of Zyxel USG40W, taking as a basis both versions of the web-interface: "Simple Mode" and "Experienced User Mode".
 
Page of USG Performance Series ...
+ 0 -

Monitoring and Kubernetes (review and video report)

May 28 at the 3 r3r34 conference held within the framework of the RIT ++ 2018 festival. RootConf 2018
, in the section "Logging and Monitoring", the report "Monitoring and Kubernetes" was sounded. It describes the experience of setting up monitoring with Prometheus, which was received by Flunt as a result of the exploitation of dozens of projects at Kubernetes in production.
 
 
Monitoring and Kubernetes (review and video report)  
 
By tradition, we are pleased to present video with the report (about an hour, ? much more ...
+ 0 -

Programming for network engineers: working with

Programming for network engineers: working withconfiguration.Even in a good network, in terms of design, from time to time, work is needed to update the configurations of certain entities. Among the most weighty and expected reasons for such activity, we can note migrations for harmonizing the physical and logical planes, the development of the network in the process of technological evolution, the harmonization of the architectures of the segments being joined and the solution of growth problems. In fact, the life cycle of the network, almost always represents a change with a certain level of risk and the impact on the service, in the evaluation of which ...
+ 0 -

A short instruction on setting up OpenVPN (for access to the resources of the organization)

A short instruction on setting up OpenVPN (for access to the resources of the organization)Hello. This instruction is intended for beginners and for those who are not ready to delve into the details and spend a long time in the console, but it is necessary to make protected remote access to work for certain employees of the company today, yesterday. A short instruction on setting up OpenVPN using the free distribution project www.nethserver.org .
 
www.nethserver.org , there is nothing complicated, the standard installation of Centos 7. You should pay attention to the address, static or dynamic with redundant address on the router, and of course the network interface on the ...
+ 0 -

Based on enterprise-level software, tested millions of times: openSUSE Leap 15

Based on enterprise-level software, tested millions of times: openSUSE Leap 15was released.A new public release based on SUSE Linux Enterprise 15 brings a huge variety of new software, easy transition to SLE, transactional updates, server roles, extensible images for the clouds and provides laptops with Linux.  SUSE Linux Enterprise (SLE) 15. For the first time the main software releases were created simultaneously from the very beginning. OpenSUSE Step 15 has a single software foundation with SLE 1? the release of the latter is expected in the coming months. The first release of openSUSE The step was 42.? it was based on the first set of updates (SP1) from SLE 12. Three years later ...
+ 0 -

SAP as fast as

The introduction of SAP, in the ordinary world, is not considered to be the simplest task. Various analysts, according to a special methodology, are examined, shoveled the whole enterprise, change business processes, consult a lot and once again, and even the IT infrastructure is calculated by specially trained super specialists. However, to help us, there is a service for the automated deployment of German products in the mode: clicked, waited, test (or even work).
 
 
SAP as fast as

 
This service is called the SAP CAL (Cloud Appliance Library).
 
 
If you want to see the functionality of something "sapper", then ...
+ 0 -

A small note about the wildcard certificates Let's Encrypt

Everything already, probably, is aware of such an organization as Let's Encrypt. For some time there you can get a wildcard certificate. In this short note I will describe a couple of not very obvious moments that I encountered.
 
here .
 
The use of DNS plugins is described in detail in the documentation on the link above.
 
 
When using the manual mode, you will need to manually add a TXT record to DNS. Each time this record will be different, i.e. automatic certificate renewal in this case is possible only through certbot hooks. There, by the way, you can hang up a team, for example, to ...
+ 0 -