An easy to refer to document for setting up macOS 10.15 Catalina.
My previous macOS / OSX setup gists:
- Mac OS X 10.10 Yosemite - https://gist.github.com/suzannealdrich/d240c4741052b5db732a
#!/bin/bash | |
# Returns the diff between response headers of a domain vs. its origin ip. Requires SSL. | |
NAME=`basename $0` | |
COMMAND="diff <(curl -Isk https://$1) <(curl -Isk -H 'Host: $1' https://$2)" | |
if [ $# -ne 2 ] | |
then | |
echo "Usage: $NAME domain.tld origin.ip" 1>&2 | |
echo "Returns the response headers and a diff of a domain vs. its origin ip. Requires SSL." 1>&2 |
-----BEGIN PGP SIGNED MESSAGE----- | |
Hash: SHA512 | |
PGP Key Transition Statement | |
Suzanne Aldrich <[email protected]> | |
Wed May 4 06:55:38 UTC 2016 | |
I have generated a new PGP key, and this statement generated at the date and | |
time provided above, is signed using both my old key and my new key. This | |
change was not prompted by any specific incident, and was done simply to |
An easy to refer to document for setting up macOS 10.15 Catalina.
My previous macOS / OSX setup gists:
An easy to refer to document for setting up macOS 12 Monterey.
My previous macOS / OSX setup gists:
The Network Hardware Vulnerabilities Library documents known security vulnerabilities affecting various network devices, including F5, Palo Alto Networks, Citrix NetScaler, SonicWall, Fortinet FortiGate, and Z-Wave devices. It provides structured information on each vulnerability, including CVE identifiers, descriptions, potential impacts, and mitigation recommendations, along with links to official security advisories and research reports. This resource serves as a reference for security professionals, network administrators, and researchers to assess and address critical vulnerabilities in network infrastructure, ensuring timely patching and risk mitigation.