Sunday, October 15, 2023

How to enable TLS 1.0 in Firefox Browser

 

Firefox 43 supports TLS 1.0, 1.1, and 1.2 by default. You shouldn't need to make any changes, but you can double-check the settings here if you like:

(1) In a new tab, type or paste about:config in the address bar and press Enter/Return. Click the button promising to be careful.

(2) In the search box above the list, type or paste TLS and pause while the list is filtered

(3) If the security.tls.version.max preference is bolded and "user set" to a value other than 3, right-click > Reset the preference to restore the default value of 3

(4) If the security.tls.version.min preference is bolded and "user set" to a value other than 1, right-click > Reset the preference to restore the default value of 1

The values for these preferences mean:

1 => TLS 1.0 2 => TLS 1.1 3 => TLS 1.2 

 

Source

                                                                                 

Saturday, October 14, 2023

Fortigate Capacity

 

 

 https://docs.fortinet.com/max-value-table

What is DMARC?

 

What is DMARC?

Domain-based Message Authentication Reporting and Conformance (DMARC) is a method of authenticating email messages. A DMARC policy tells a receiving email server what to do after checking a domain's Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) records, which are additional email authentication methods.

DMARC and other email authentication methods are necessary in order to prevent email spoofing. Every email address has a domain, which is the portion of the address that comes after the "@" symbol. Malicious parties and spammers sometimes try to send emails from a domain that they are not authorized to use — like someone writing the wrong return address on a letter. They may do this to try to trick users (as in a phishing attack), among other reasons.

Together, DMARC, DKIM, and SPF function like a background check on email senders, to make sure they really are who they say they are.

For example, imagine a spammer sends an email from the address "trustworthy@example.com," despite the fact that they are not authorized to send email from the "example.com" domain. The spammer would do this by replacing the "From" header in the email with "trustworthy@example.com" — they would not send an email from the actual example.com email server. Email servers that receive this email can use DMARC, SPF, and DKIM to discover that this is an unauthorized email, and they can mark the email message as spam or refuse to deliver it.

What is a DMARC policy?

A DMARC policy determines what happens to an email after it is checked against SPF and DKIM records. An email either passes or fails SPF and DKIM. The DMARC policy determines if failure results in the email being marked as spam, getting blocked, or being delivered to its intended recipient. (Email servers may still mark emails as spam if there is no DMARC record, but DMARC provides clearer instructions on when to do so.)

Example.com's domain policy could be:

"If an email fails the DKIM and SPF tests, mark it as spam."

These policies are not recorded as human-readable sentences, but rather as machine-readable commands so that email services can interpret them automatically. That DMARC policy would actually look like:

v=DMARC1; p=quarantine; adkim=s; aspf=s;

What does this mean?

  • v=DMARC1 indicates that this TXT record contains a DMARC policy and should be interpreted as such by email servers.
  • p=quarantine indicates that email servers should "quarantine" emails that fail DKIM and SPF — considering them to be potentially spam. Other possible settings for this include p=none, which allows emails that fail to still go through, and p=reject, which instructs email servers to block emails that fail.
  • adkim=s means that DKIM checks are "strict." This can also be set to "relaxed" by changing the s to an r, like adkim=r.
  • aspf=s is the same as adkim=s, but for SPF.
  • Note that aspf and adkim are optional settings. The p= attribute is what indicates what email servers should do with emails that fail SPF and DKIM.

If the example.com administrator wanted to make this policy even stricter and signal more strongly to email servers to consider unauthorized messages spam, they would adjust the "p=" attribute like so:

v=DMARC1; p=reject; adkim=s; aspf=s;

Essentially, this says: "If an email fails the DKIM and SPF tests, do not deliver it."

What is a DMARC report?

DMARC policies can contain instructions to send reports about emails that pass or fail DKIM or SPF. Typically, administrators set up reports to be sent to a third-party service that boils them down to a more digestible form, so administrators are not overwhelmed with information. DMARC reports are extremely important because they give administrators the information they need to decide how to adjust their DMARC policies — for instance, if their legitimate emails are failing SPF and DKIM, or if a spammer is trying to send illegitimate emails.

The example.com administrator would add the rua part of this policy to send their DMARC reports to a third-party service (with an email address of "example@third-party-example.com"):

v=DMARC1; p=reject; adkim=s; aspf=s; rua=mailto:example@third-party-example.com;

What is a DMARC record?

A DMARC record stores a domain's DMARC policy. DMARC records are stored in the Domain Name System (DNS) as DNS TXT records. A DNS TXT record can contain almost any text a domain administrator wants to associate with their domain. One of the ways DNS TXT records are used is to store DMARC policies.

(Note that a DMARC record is a DNS TXT record that contains a DMARC policy, not a specialized type of DNS record.)

Example.com's DMARC policy might look like this:

NameTypeContentTTL
_dmarc.example.comTXTv=DMARC1; p=quarantine; adkim=r; aspf=r; rua=mailto:example@third-party-example.com;32600

Within this TXT record, the DMARC policy is contained in the "Content" field.

What about domains that do not send emails?

Domains that do not send emails should still have a DMARC record in order to prevent spammers from using the domain. The DMARC record should have a DMARC policy that rejects all emails that fail SPF and DKIM — which should be all emails sent by that domain.

In other words, if example.com was not configured to send email, all emails would fail SPF and DKIM and be rejected.

The Cloudflare Email Security DNS Wizard makes it simple to set up the correct DNS TXT records and block spammers from using a domain. Read about it here.

Learn more about DNS records for email:

DMARC is described further in RFC 7489.

 

Source

 

ٍ

Tuesday, October 10, 2023

Edge Browser - IE mode

 edge://settings/defaultbrowser

 

Some sites are built to work with Internet Explorer and have functionality that isn't supported by modern browsers such as Microsoft Edge. If you need to view one of these sites, you can use Internet Explorer Mode in Microsoft Edge. 

Most sites work better on modern browsers. Support for Internet Explorer ended on June 15, 2022. It is recommend only using Internet Explorer mode within Microsoft Edge only when necessary.

To turn on Internet Explorer mode, use the following steps. 

  1. In the address bar for Microsoft Edge, type edge://settings/defaultbrowser and then click Enter.

  2. Slide the Allow sites to be reloaded in Internet Explorer toggle to ON.

  3. Restart Microsoft Edge.

You can enable Internet Explorer mode to view certain websites in Microsoft Edge.

Internet Explorer mode is now enabled. To view a website using Internet Explorer mode in Microsoft Edge, use the following steps.

  1. Navigate to the website you want to view in Internet Explorer mode.

  2. Click the three dots in the upper right corner of the browser window.

  3. Select Reload in Internet Explorer Mode.
    If you are on Microsoft Edge version 92 or earlier select More tools > Reload in Internet Explorer Mode

To return to browsing without Internet Explorer mode, you can click Leave on the information bar at the top of the screen, or close your current tab and open a new tab in Microsoft Edge. 

NOTE: If you are on a device managed by your organization with the latest Windows updates, you will see the option to Allow sites to be reloaded in Internet Explorer under edge://settings/defaultbrowser but the setting might be greyed out. On a managed device, you will see the option Reload in Internet Explorer mode ONLY if your organization has configured the policy to "Allow unconfigured sites to be reloaded in Internet Explorer mode".

 

Source

 

 

Monday, October 9, 2023

Enable\Disable USB Regedit

 

Steps to Disable USB Ports from Registry

Steps to deactivate them on a PC from Windows registry are:
  1. Click on start
  2. Type regedit on Run window or Search and press enter. Now the registry editor opens
  3. Navigate to the following registry path
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
  4. Click on UsbStor and a list of attributes will be displayed on the right panel

  5. Double click on start and set the hexadecimal value to 4 and click OK


Now the Universal Serial Bus on your PC is disabled. If you connect any USB device, your computer will not recognize them.

=====================

How to Enable USB Ports On Your Computer from Registry

To do this you need to follow the steps 1 to 4 and set 3 as the hexadecimal value for start. This will reverse the effect.

 

Kali Linux

  Activate Root: sudo apt -y install kali-root-login =============================== Change boot order ( Easily Change GRUB Boot Order in Ka...