Topics that don't fit in to the other categories
Python & atom.io plugins
K

Hey @Justin-Dennison66 ,
Thanks for the reply.
I think the highlight was a setting I hadn't selected so that is working now and I'll check out the link.

Loving the course so far! Thank you!

read more
A+, Network+, Strata IT Fundamentals
ITProTV is a CompTIA Platinum Partner and our members benefit

With no addtional posts, I'm marking this as solved.

read more
CCENT, CCNA Routing & Switching, CCNA Security
CCENT - if device has no crypto, how can you create a certificate

@Andreas-Meyer-zu-Driehausen,

This is an interesting question that I'll try and get some more information from Don if he has a different take. This all has to do with symmetric encryption that is >64bit. These are pretty much controlled by the US government (e.g. AES and 3DES). So these are export restricted.

These symmetric encryptions that are < 64bit are not controlled by the US Government are exportable as long as the country is not on an embargo country ( Cuba , Iran , Myanmar, North Korea , Sudan, and Syria--today may include more).

So, here is the link for the Export Compliance.

The key here is that you may not dependent upon your country of origin be able to get any encryption higher than 64bit for your crypto even if you get a license that has crypto on it.

updated
I just spoke with Don about this, If you're keen on using Cisco only what I posted above is correct. Don said many times though, you may be able to work with a retailer to get the exclusion to the restriction but not always. He also said that usually, what you may have to do though to provide you the crypto you need to is find hardware vendor (non-Cisco) that may not be US based to help you with your Crypto needs.

read more
MTA, MCSA Windows 8, MCSE Windows Server 2012
PowerShell Script To Map NetworkDrive based on IP Address
W

@Mike-Rodrick I have managed to add to the script to get it working with wireless IP.

Thanks for your help.

read more
Security+, CASP, CEH, SSCP and CISSP
Pentesting Walkthrough
G

So my boss has put me in charge of our new pentesting division that he wants to launch in the future and he has told me to learn pentesting and to know it like the back of my hand and it is beginning to make some sense in that the methodology that the CEH course is teaching me is starting to make sense, but is there a generalized pentesting walkthrough that you guys or that someone else has that i can use to generalize my pentesting process and just help me understand how you take the recon and footprinting and use it to pentest and just help me make sense of it all because for someone stepping up to bat for the first time, it is a little intimidating

read more
ACA, ACSP and ACTC
MS Office automated Netinstaller

With no other responses, I've marked this as solved.

read more

IT Service Managment

ITIL Intermediate Service Operations - slides

@Derek-Agar252,

The slides are proprietary to PassionIT. If you sign up through PassionIT, it will provide you with the course materials that is mentioned in the show that Jo Peacock. The slide deck will probably not be available.

read more