How-to Guides

How to comply with Google and Yahoo’s requirements for bulk email senders

To help protect their customers from malicious and junk emails, Google and Yahoo have announced that they will begin to enforce additional requirements for…

January 11, 2024

How to create a single-node Graylog instance and analyze FortiGate logs

Firewall logs provide a wealth of information about a network. They can be used to identify devices, troubleshoot policies, and…

April 13, 2023

How to update the firmware on a Samsung monitor

This guide explains the exact steps for updating the firmware on Samsung monitor, and will hopefully save you a lot…

November 25, 2021

How to Install Volatility 2 and Volatility 3 on Debian, Ubuntu, or Kali Linux

Volatility is a powerful memory forensics tool. This guide will show you how to install Volatility 2 and Volatility 3…

October 6, 2021

How to use Farsight Security’s DNSDB to harness the power of passive DNS

DNS describes the structure of resources on the internet. It can provide lots of valuable information about (attacker or target)…

May 22, 2021

How to examine a credential harvesting page using Microsoft Edge

Recently I analyzed a credential harvesting page with some interesting characteristics that made a great teaching moment. In this post,…

May 10, 2021

How to configure a nginx reverse proxy with Let’s Encrypt certificates

Let's Encrypt allows nginx reverse proxy servers to have a real, trusted SSL certificate, even for internal sites.

February 26, 2021

How to forward a forensic copy of an email as an attachment

If you receive a fraudulent email, can be very useful to send a full forensic copy to an organization that…

August 28, 2019

How to view email headers

Email headers contain very useful information for tracing a message's origin and troubleshooting its delivery. Email headers are written with…

August 27, 2019

Demystifying DMARC: A guide to preventing email spoofing

DMARC can stop spoofed spam and phishing from reaching you and your customers, protecting your information security and your brand.…

June 15, 2018