How to build an .EXE for your Py Script
In this blog, let’s see how we can build an exe file from our py…...
In this blog, let’s see how we can build an exe file from our py (python) script. Motivation Why it is interesting to build an exe for our py script? poratability, ease of execution, etc. are some reasons why to do so. Instead of opening the IDE, loading the script, run it, an exe file…...
Cisco secure client is a piece of software that install on a user pc, the endpoint. But it is not limited to, it installs also on mobile device. That’s just awesome! Let’s explore in this blog how this client helps secure the DNS. A little theoretical background Before we deep dive into how DNS protection…...
Let’s discover in this blog the recommended study path and experience to fulfill the requirement for a position as a cybersecurity expert of consultant. What is Cybersecurity in general Per Cisco definition, Cybersecurity is “the practice of protecting systems, networks, data and programs from digital attacks”. The scope may include: identification of attacks, protections of…...
In this blog, let’s discuss the best way to secure my local mailbox. A little introduction Emailing application local or online come with multiple settings and options to secure emails exchange, and the content of the mailboxes. But many of them seem inefficient to block some of the spam traffic making the mailbox very hard…...
In this blog, let’s discover how ethernet cabling helps improve the speed over individual copper wires. Introduction In this post we talk about Ethernet cabling, especially the one to achieve a speed of 1 gig bit per second. 4 elements are discussed : its operation as per the standard, awg metric, pinout and twist of…...
Dans ce blog, nous discutons vPV et VSS. Introduction Si l’objectif “historique” est le même : s’affranchir de la limitation de STP (blocage de ports pour prévenir les boucles), de l’usage des FHRP (HSRP, VRRP) pour équilibrer les liens, d’augmenter les performances en débit et capacité de calcul, d’éliminer les SPOF liés à l’utilisation d’un…...