Juniper Router Basic Commands

root@SRX01% cli


root@SRX01> show interfaces terse

Interface               Admin Link Proto    Local                 Remote

ge-0/0/0                up    up

ge-0/0/0.0              up    up   inet

Troubleshooting in Redshift


by Narendra Dubey

Redshift is a one of the most popular data warehousing solution, thousands of companies running millions of ETL jobs everyday. The problem with MPP systems is troubleshooting why the jobs are hung, which are the queries blocking others.

To troubleshoot problems like this could be a real nightmare if you are new to Redshift, in this article I have tried to aggregate the tables and queries you should always keep handy if you work with Redshift on daily basis of planning to start using

Table Overview

First of all lets familiarize our self with some of the tables needed to troubleshoot a problem.

STV_RECENTS — This table holds information about currently active and recently run queries against a database

Ubuntu 18.04 LTS ‘Bionic Beaver’ - 11 Things To Do After Installing

By Scott Bouvier Updated 2019-06-07

Install Updates

Software Updater

Enable Media Codecs


Ubuntu offers to install third-party codecs, restricted extras (like the Adobe Flash plugin) and proprietary drivers automatically as part of the install process.

But if you if you didn’t notice the tick box during install (or forgot about it entirely) you won’t be able to play MP3 files, watch online videos, or take advantage of improved graphics card support until you install all of the relevant packages.

Install Media Codecs in Ubuntu

Install a Better Ubuntu Theme

And the easiest way to give Ubuntu a new feel is to install the Communitheme from Ubuntu Software.

Install Communitheme on Ubuntu 18.04

Once installed you need to restart your computer,  and select the ‘Ubuntu with communitheme snap‘ session from the login screen:

Blood on the Clock Tower Sects and Violets

From Blood on the Clocktower Wiki


Sects & Violets is the craziest of the three editions included in the base set. Good characters get amazing information each and every night. However, the evil team is extremely varied and threatening and can throw massive confusion into the mix. Characters change alignment. Players change characters. Even the evil team can lose track of who is who. This is also the first appearance of madness, which throws all manner of spanners into the works.

Intermediate. Recommended for players who want to do wild and unexpected things, pushing the limits of what can be achieved in a bluffing game.

Blood on the Clock Tower

Online version of the game free on Github

Online version BoCT

Trouble Brewing (The first set for beginners)

Larger font: character sheets, character tokens

I used the 1.5 inch for the main tokens, but I had to reduce the print out to about 85%.

I used the one inch for the grmoire tokens.

pfsense basic configuration


Install pfsense with at least two network connections. Pfsense will assign one to be the WAN interface, the network for the WAN interface should not be 192.168.1.x as this needs to be reserved as the default LAN for the web configuration (do not try to connect to the web configuration on the WAN interface). Pfsense will assign the other to be the LAN interface.  Attach a computer to this interface to use a browser to configure.

pfSense Add Static Route

There is a server on the DMZ that we want to access.

System -> Routing.

There are three tabs (“Gateways“, “Routes“, “Groups“);

click on the “Routes” tab and click the “plus” button to add a new route.

At “Destination“, type in the IP address of the destination network, which in our case is the DMZ network (assume it is

security certification progression chart 2020

security certification progression chart 2020

CISM is associated with the highest average salary ($127,063) while CISSP certified professionals report the second highest average salary ($117,030).

CISM and CISSP certifications is that the former is focused more on management and strategy, and only covers technical topics in a cursory way, while the latter addresses the tactical aspects of security operations and delves much deeper into those areas.

The CISM covers topics such as:

  • Regulatory issues
  • Information security governance
  • Cost-benefit analysis of risk mitigation
  • Risk management
  • Disaster recovery

How to Become CISM Certified 

The eight competencies covered by CISSP are:

Appendix G - Characteristics of a World-Class SOC

How do we know whether the SOC is doing well? Every organization is different, and there is no universal set of measures for SOC effectiveness. In this section, we describe the qualities of a SOC that has reached an ideal state of maturity, given the needs and constraints of its constituency. We draw on material presented throughout the book in articulating a target state for modern SOCs. While these qualities describe SOCs of any size or organizational model, we once again aim for common SOCs that:

  • Serve a constituency of some 5,000 to 5,000,000 users or IPs
  • Are members of their constituency
  • Have at least shared reactive authority
  • Has direct visibility into a large portion of the constituency
  • Follow an organizational model that includes both centralized and distributed elements.

SOCs that fall outside this description (e.g., national-level and coordinating SOCs) will certainly be able to leverage elements of this section but may find that certain qualities won’t apply. For instance, a mature SOC serving a small constituency may not be able to support advanced engagements with the adversary. Or, a mature SOC serving a very large constituency may not directly monitor constituency systems.

Appendix C - How Do We Get Started?

If we have established the need for a SOC, the next logical question is, “How do we stand up a new SOC?” When we stand up a new capability, various priorities compete for our time and energy. The purpose of this section is to sort these priorities into different phases of SOC creation and growth, introducing many of the topics covered throughout the ten strategies. For more information on standing up a SOC, see [288] and Chapter 2 of [15]. Before we discuss the roadmap to standing up a SOC, here are some tips for success. Every SOC is different, so the timelines and order of priorities will differ; the following serves as a starting point and presents an ideal timeline for SOC stand-up: