• Jan, Tue, 2023

What is web hosting?

  • If you want to build a website, the first thing you need is hosting space. Web Hosting space is required to upload and store all the website files to a web server so anyone connected to the internet will be able to see your website by typing the web address.
  • Most hosting companies also include email accounts associated with your domain name. This is a great feature for those who want to start a new business or personal blog, but don’t want to deal with the hassle of setting up a separate email account. With this feature, you can have your own domain name and email account right away!

There are a variety of web hosting options available for you. However, it is important that you select the right one to meet your needs. Here are some of the most common types of web hosting options available:

  • Shared web hosting – The most common type of shared hosting account type and probably what comes to mind when you think about “hosting.” It is a low-cost option that allows users to host their websites on a server with other websites. This type of account is ideal for small businesses that don’t have much traffic or need customized features or high uptime requirements. However, if you run a large e-commerce site or have a high traffic volume, then this may not be the best option for you because it could affect your website performance due to limited resources from other users on the same server.

What Is Hosting?

  • Virtual Private Server (VPS) Hosting – This is a type of hosting that allows you to host multiple websites on the same server. But there are fewer websites per server than when using shared hosting. Each site uses its own resources for better performance and faster loading times which makes it higher cost.
  • Dedicated hosting – a type of web hosting that allows you to run your own server. This means that you get full control over your server’s hardware and configuration, so you can do things like install software, configure firewall rules and security settings, and more.
  • Cloud hosting – a type of hosting where the website operates across multiple servers that work together rather than just one server. Each server can provide additional resources when needed, so downtime is too low to be an issue. Cloud hosting is more expensive than other types of hosting because it uses more hardware and software to achieve this effect.
  • WordPress hosting – a type of web hosting that allows you to set up a website using the WordPress content management system (CMS). It automatically performs updates and backups, which means that you don’t need to worry about making sure your site is always up-to-date or backing it up regularly.
  • Jan, Mon, 2023

How to publish a website?

2 things you need to publish a website and get it live so anyone can see it.

  • Domain Name – the address for your the website.
  • Hosting – the server used to save the web files .

A website is a collection of folders and web files. 

Components of a Domain Name.

rightclickgo.com.au-domain components

  • The Top-level domain (TLD), is a domain extension that appears at the end of the domain name such as .com, .net, and .org.
    • .com – for commercial sites, but it’s now the most commonly used domain, even for non-commercial sites. 
    • .net – for organizations involved in networking technologies. used as an alternative option when the .com isn’t available
    • .org – for any organization. but now it has become associated with organizations that serve the public interests such as foundations or nonprofits.
    • restricted TLDs: .edu (institutions), and .gov (government sites).
  • Secondary-level domains must be unique (website name). 
  • Subdomain (optional), It’s often used to create a subsection of a website. you can name it anything (shop, blog,).
    • For Desktops and Laptops: blog.rightclickgo.com.au
    • For Mobile and Tablets (you may see an m or mobile for some websites specifically optimized for that): m.rightclickgo.com.au
    • www is also a subdomain. it had to be included in the domain name but not anymore. web hosts will automatically point the domain to the same address regardless you include www or not. ex: www.rightclickgo.com.au = rightclickgo.com.au

How you can get a Domain Name?

  • Domain Registrar – an organization that manages the reservation of domain names such as Godaddy, and Hover.
  • You can’t own a domain name, you are actually renting it when you pay the domain registrar, technically you purchase the right to use the domain name you want.

Each country has its own registrar authority and two-letter TLD country code. so the rules for using a specific country code may vary. so make sure to check for any restrictions.

Domains vs. URLs

  • URL (Uniform Resource Locator) contains more detail than a domain name.
  • Domain name is part of the URL.

tld 1

Difference between Directories and Subdomains

You can either set up a subdomain or create a subdirectory folder.

  • Subdomain: blog.rightclickgo.com.au
  • Directory: rightclickgo.com.au/blog

 Modern browsers such as Chrome, and Firefox no longer require you to include HTTP or HTTPS when you’re typing the website name into the browser address bar and since it’s the default method of communication,  you’ll be redirected accordingly.

  • Jan, Tue, 2023

Protect your computer and laptop

How to protect your computer and laptop?

  • Always lock your computer when you’re walking away from it ( hold down the Windows key and hit L).
  • Don’t write down your passwords on sticky notes and tape them to your screen. 
  •  If you have Bluetooth paired with a device, enable dynamic lock which allows Windows to know when you’ve walked away from your computer to lock it.
  • Lock Screen Personalization to lock it automatically. you’ll need to put a password to get back into the computer.
  • For laptop security: you can geta cable lock to keep your laptop in place.
  • Consider using a good password management software on your device.
  • Adjust Windows privacy settings to control what apps can use your microphone, camera, or location.

Password Security Best Practices

  • Multifactor Authentication (MFA).
  • Passphrase greater than 10 characters in length.
  • Passphrase with Uppercase, Lowercase, Symbols, and numbers.
  • Use a password management software.

Password Management Software examples: LastPass, Dashlane , 1Password.

How to protect your computer and laptop 1

  • Jul, Fri, 2022

Exploring Satellite internet connection

Internet Service Types – Satellite

Satellite Internet access

Internet access provided through communication satellites.

Dishes are pointed to satellites.

Satellite dishes are several feet across.

Advantages of satellite internet

  • Used in airplane or rural areas that don’t have any kind of internet connections available.
  • also used as a backup option to other internet connection in big companies.

Disadvantages 

  • High Latency. Time to send/receive signals to the satellite is too high, around 950 ms
  • Very Expensive during the initial setup.
  • Limited speed and you get charged if the speed gets up.

Internet Types - Satellite
dishes

Starlink site shows you all of the Starlink satellites that are out there and accessible from your location. 

  • Jul, Sat, 2022

Server Definition and Purpose

Server Definition and Purpose

What is a Server? Definition & Purpose

Hardware characteristics of a server.

  • Server computer is more powerful than workstations (some workstations are very powerful such as high-end gaming PCs)
  • Processor: multiple processors (each one also has more cores), very expensive.
  • RAM: can be Terabytes in size as they serve many connections at the same time,
  • Storage : Terabytes or Petabytes
  • Network Interface Cards (NIC): is going to be wired not wireless
  • Form Factor : Rack unit or Tower case.
  • Servers are expensive because they have more resources included.
  • They’re often without a keyboard or a mouse and can be remotely accessed.
  • have a higher Service Level Agreement or SLA to guarantee they are up and running most of the time.

What is the main purpose and use of a server?

 
tower and rackmount servers

  • Jun, Fri, 2022

FortiGate Local User & Group Authentication

Authenticating Local Users and Groups with FortiGate

Local User and Groups Authentication in FortiGate FW

FortiGate local user and group authentication is a powerful security feature that can help protect your network from unauthorized access. It allows you to create and manage local user accounts and groups, and assign them specific privileges and access rights. This ensures that only authorized users can access your network resources and that they can only do so in accordance with your security policies.

By using FortiGate local user and group authentication, you can ensure that only authorized users can access your network resources, and that they can only do so in accordance with your security policies. This helps to protect your network from unauthorized access and ensures that your data remains secure.

 

Create Local Users LocalUser01 and LocalUser02

FortiGate Local User & Group Authentication
Create two local users02
Create two local users03
Create two local users04

Create a local group called LocalGroup01 and add both users to it.

Create two local users05
Create two local users06
Create two local users08
Create two local users09

Click on the Firewall Policy rule, then click Source. Additionally, any user must be a member of the local group created in order to allow traffic (HTTP, HTTPS, SSH, FTP) through the Firewall after providing the correct username and password.

Create two local users10

On the client machine, the IP address is 10.10.0.13 (DHCP enabled on FW) and the GW is 10.10.0.1 (FW itself).

FortiGate will check its internal database to confirm the identity of the user.

Create two local users11

If you try to access a website, you may be prompted to provide authentication.

Create two local users12

In Dashboard > Users and Devices, it’s showing a firewall user.

Create two local users13

You can select that user and click on de-authenticate which will force that user next time to re-authenticate to gain internet access.

Create two local users14

  • Jun, Tue, 2022

What are Internet Cookies and What do they used for? 

What are Internet Cookies and What do they used for?

What are Internet Cookies?

It’s read by your browser (check if you’re using the latest version) to pull out information. They track things such as remembering what’s in a shopping cart or login details, it will make browsing more convenient for us.

In the past, Cookies are stored in a plain text file created by websites you have visited and saved on your hard disk and that file may contain thousands of cookies from different URLs that you may have visited.

Today, it’s usually a single file that contains all of your cookies but if you open it up with notepad, you can not see what is actually inside it.

It includes some sort of PII (personally identifiable information), which is the data you have already provided such as address, names and postcodes, which in turn will auto-fill that information for you next time you revisit the same website. another example will be login details (username and password).

Cookies are found inside the Network folder.

cookies file in netowrk folder

What do they used for?

  • They do Personalize Information.
  • Targets Advertising.
  • Affects how a site presents for you depending on what’s in your cookie.
  • Geographic location. its remember your default location.
  • Faster logon by remembering devices.
  • Track shopping carts. it remembers what you have in your shopping cart.

Different types of Cookies

  • First Party Cookie. Created by the actual website and it’s normally safe on reputable sites.
  • Third Party Cookies. They do tracking for your activities on the site and gives you more ads.

Cookies Risk

  • They might share more data and information than you want to share.
  • The cookies should expire in a reasonable amount of time and not present at your browsing for long time.
  • Cookie can’t spread spyware/malware directly (not executable code) but they could be used by malware (can read what is inside the cookie to collect more data about you).
  • Zombie cookies which get created by some kind of malware.
  • If you’re care too much about cookies, consider clear cookies and site data when you close all windows.
  • It’s sometimes useful for troubleshooting as you delete them or reset your browser which in turn delete all cookies.

To see all cookies and site data in you browser such as Chrome.

 

What are Internet Cookies and What do they used for?

You can also Clear cookies and site data when closing the browser.

Clear cookies and site data

  • May, Tue, 2022

FortiGate Block Malicious URLs using IPS

​Using IPS to Block Malicious URLs on FortiGate (Photos)

diagram

Implementing IPS Profiles to Block Malicious URLs on Fortigate Firewall

Client IP address

Preventing Outbound Traffic to a Malicious URL by Dropping it at the FortiGate Firewall

1- Create an intrusion prevention profile.

2- Attach it to the firewall policy that is allowing the traffic from internal to external.

clone default profile
name it

Remove Signatures to Block Malicious URLs

delete existing signatures
enable it

The IPS profile is not associated yet with any firewall policies. 

IPS profile not associated.
attach it

Testing the client with Malicious URL.

testing the client
testing the client_2

This article provides an overview of how to configure RIP routing on a Fortigate firewall. It covers the basics of RIP routing, how to configure RIP routing on a Fortigate firewall, and how to troubleshoot any issues that may arise. It also provides some tips on how to optimize RIP

 

  • May, Tue, 2022

Step-by-Step Guide to Configuring RIP Routing on FortiGate

What steps are needed to set up RIP routing on a FortiGate device (with Photos)?

network1

Dynamic routing protocols are used to automatically exchange routing information between routers in a network. They are used to find the best path for data to travel from one network to another. Examples of dynamic routing protocols include Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and Routing Information Protocol (RIP).

RIP (Routing Information Protocol) is a network routing protocol used to determine the best path for data to travel across a network. It is used to exchange routing information between routers and is supported by most modern devices. Version 1 and Version 2 of RIP are the two versions available, with Version 2 being the most widely used.

If you have an older device that only supports RIP, you may want to consider using RIP as your dynamic routing protocol.

In RIP routing, each device will broadcast information about the networks connected to its interfaces to its neighboring devices.

FW1 is going to advertise 10.10.0.0/16 Network.

FW2 is going to advertise 10.10.0.0/16 and 10.20.0.2/16.

FW2 RIP Networks
FW1 RIP Networks 1

click on Dashboard > Network > Routing

RIP on FW1

on FW2 >  configure static route

static route FW2
FW2 interfaces
FW2 ping

ping 8.8.8.8 from PC03

PC ping

Follow these steps to configure RIP on a Fortigate Firewall.

  1.  Log into the FortiGate web-based manager.
  2. Go to Network > Static Routes and select Create New.
  3. Enter a name for the route.
  4. Select RIP as the routing protocol.
  5. Enter the destination network and subnet mask.
  6. Enter the gateway IP address.
  7. Select the interface that will be used for the route.
  8. 8. Select the administrative distance for the route.
  9. Select the metric for the route. 10. Select the RIP version.
  10. Select the RIP authentication type.
  11. Select the RIP authentication key.
  12. Click OK to save the route.
  • May, Sat, 2022

How to configure DHCP relay on FortiGate FW (Photos)

How to Configure DHCP Relay on FortiGate FW (Photos)?

  • DHCP (Dynamic Host Configuration Protocol) is a network protocol used to automatically assign IP addresses and other settings to devices on a network.

  • As networks grow, it becomes increasingly difficult to manage and configure each device manually. To address this problem, most companies use DHCP Relay instead of including a DHCP server on every subnet. By enabling DHCP relay, one DHCP server can support multiple subnets and simplify the configuration process. This helps reduce administrative overhead and allows for more efficient management of IP addresses across the network.

On windows Server 2022, install DHCP service

network1
Server IP address
Add DHCP Role
DHCP
DHCP Installed

Right-click on IPv4 and create a new scope.

new scope
1 1
2
Gateway IP
5

FW2 

Configure the interfaces (inside and outside) on Fortigate FW.

click on DHCP server > Advanced > Relay > IP address of DHCP Server (10.10.2.200).

FW2 interface_inside
FW2 interface outside
FW1 interfaces

FW2 can reach DHCP Server 10.10.0.200 which has the scope for 10.20.0.0 network.

FW2 ping DHCP Relay

on Windows 10 client machine which configured as DHCP client (Before DHCP Relay).

no IP

On Windows 10 client machine(After DHCP Relay).

with IP
kali-linux

On Kali-Linux Client

Kali IP
kali-linux on scope

PC3, 

PC3 DCHP Client
PC3
PC3 internet

Check out, configure RIP routing protocol