A background pattern of shaded interlocking triangles

IT Infrastructure Architect (41)

Throw away your video game disk boxes

Photo by Oliver Beer / Unsplash Declutter your life by throwing away the retail packaging from your video games. Here is why. We are all familiar with the way a physical video game disk is packaged: it is provided in a standard-sized plastic box with…

Continue reading...

Use Ventoy to boot multiple ISOs from a single Pendrive

Ventoy is a simple but effective tool that enables multiple bootable ISOs to coexist on a single USB Pendrive. It is convenient and expedient solution to booting hardware using a range of different operating systems. The problems with bootable Pendrives You are probably familiar with…

Continue reading...

Outbound firewall ports required for WhatsApp

If you have a restrictive outbound firewall on your network and you wish to enable WhatsApp on connected devices then you will need to permit the following outbound ports and protocols. Typical problems If you find WhatsApp presence and signalling work, but call setup fails,…

Continue reading...

Two essential security approaches that every network needs

All networks can benefit from Protective DNS and Outbound Firewalling to protect users and content from an increasingly sophisticated Internet threat landscape. Protective DNS Protective DNS intercepts name resolution requests to locations known to be involved in crime, malware, and distribution of undesirable content. It…

Continue reading...