<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cheat Sheets Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/category/cheat-sheets/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/category/cheat-sheets/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Mon, 04 May 2020 13:49:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Google Analytics Regular Expressions Cheat Sheet</title>
		<link>https://itblogsec.com/google-analytics-regular-expressions-cheat-sheet/</link>
					<comments>https://itblogsec.com/google-analytics-regular-expressions-cheat-sheet/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 29 Mar 2017 10:43:55 +0000</pubDate>
				<category><![CDATA[Cheat Sheets]]></category>
		<category><![CDATA[google]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=810</guid>

					<description><![CDATA[<p>Analytics supports regular expressions so you can create more flexible definitions for things like view filters, goals, segments, audiences, content groups, and channel groupings. In the context of Analytics, regular expressions are specific sequences of characters that broadly or narrowly match patterns in your Analytics data.</p>
<p>The post <a href="https://itblogsec.com/google-analytics-regular-expressions-cheat-sheet/">Google Analytics Regular Expressions Cheat Sheet</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Google Analytics Regular Expressions Cheat Sheet</h2>
<p style="text-align: justify;">Analytics supports<strong> regular expressions</strong> so you can create more flexible definitions for things like <a href="https://support.google.com/analytics/answer/1033162" target="_blank" rel="noopener">view filters</a>, <a href="https://support.google.com/analytics/answer/1012040" target="_blank" rel="noopener">goals</a>, <a href="https://support.google.com/analytics/answer/3123951" target="_blank" rel="noopener">segments</a>, <a href="https://support.google.com/analytics/answer/2611268" target="_blank" rel="noopener">audiences</a>, <a href="https://support.google.com/analytics/answer/2853423" target="_blank" rel="noopener">content groups</a>, and <a href="https://support.google.com/analytics/answer/6010097" target="_blank" rel="noopener">channel groupings</a>. In the context of Analytics, regular expressions are <strong>specific sequences of characters</strong> that broadly or narrowly <strong>match patterns in your Analytics data</strong>.</p>
<p style="text-align: justify;">For example, if you wanted to create a view filter to exclude site data generated by your own employees, you could <strong>use a regular expression to exclude any data from the entire range of IP addresses</strong> that serve your employees. Let’s say those IP addresses range from 198.51.100.1 &#8211; 198.51.100.25. Rather than enter 25 different IP addresses, you could create a regular expression like 198\.51\.100\.\d* that matches the entire range of addresses.</p>
<p style="text-align: justify;">Or if you wanted to create a view filter that <strong>included only campaign data from two different cities</strong>, you could create a regular expression like San Francisco|New York (San Francisco or New York).</p>
<p style="text-align: justify;">Check <strong>cheat sheet created by Jay Taylor</strong>, listing the most used regular expressions supported by Google Analytics.</p>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/03/jay-taylor_google-analytics-regular-expressions.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="bottom" data-toolbar-fixed="off">jay-taylor_google-analytics-regular-expressions</a></p>
<p style="text-align: center;">Download file <a href="https://itblogsec.com/wp-content/uploads/2017/03/jay-taylor_google-analytics-regular-expressions.pdf" target="_blank" rel="noopener">here</a></p>
<p style="text-align: center;"><span style="font-size: 8pt;"><strong>source:</strong> <a href="https://www.cheatography.com" target="_blank" rel="noopener">https://www.cheatography.com</a>, <a href="https://support.google.com/analytics" target="_blank" rel="noopener">https://support.google.com/analytics</a></span></p>
<p>The post <a href="https://itblogsec.com/google-analytics-regular-expressions-cheat-sheet/">Google Analytics Regular Expressions Cheat Sheet</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/google-analytics-regular-expressions-cheat-sheet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IPv6 cheat sheet</title>
		<link>https://itblogsec.com/ipv6-cheat-sheet/</link>
					<comments>https://itblogsec.com/ipv6-cheat-sheet/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 09 Mar 2017 12:21:26 +0000</pubDate>
				<category><![CDATA[Cheat Sheets]]></category>
		<category><![CDATA[IPv6]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=679</guid>

					<description><![CDATA[<p>Find very useful cheat sheet of IPv6 - the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.</p>
<p>The post <a href="https://itblogsec.com/ipv6-cheat-sheet/">IPv6 cheat sheet</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>IPv6 cheat sheet </h2>
<p style="text-align: justify;">Find very useful <strong>IPv6 cheat sheet</strong>. IPv6 is the most recent version of the <strong><a title="Internet Protocol" href="https://en.wikipedia.org/wiki/Internet_Protocol">Internet Protocol</a> (IP)</strong>, the <strong><a title="Communications protocol" href="https://en.wikipedia.org/wiki/Communications_protocol">communications protocol</a></strong> that provides an identification and location system for computers on networks and routes traffic across the <a title="Internet" href="https://en.wikipedia.org/wiki/Internet">Internet</a>. IPv6 is the successor to the first addressing infrastructure of the Internet, Internet Protocol version 4 (IPv4). In contrast to <strong>IPv4</strong>, which defined an IP address as a 32-bit value, IPv6 addresses have a size of <strong>128 bits</strong>. Therefore, IPv6 has a vastly enlarged address space compared to IPv4.</p>
<p style="text-align: justify;">IPv6 addresses are classified by the primary addressing and routing methodologies common in networking: unicast addressing, anycast addressing, and multicast addressing.</p>
<ol>
<li style="text-align: justify;"><strong>A unicast</strong> address identifies a single network interface. The Internet Protocol delivers packets sent to a unicast address to that specific interface.</li>
<li style="text-align: justify;"><strong>An anycast address</strong> is assigned to a group of interfaces, usually belonging to different nodes. A packet sent to an anycast address is delivered to just one of the member interfaces, typically the nearest host, according to the routing protocol&#8217;s definition of distance. Anycast addresses cannot be identified easily, they have the same format as unicast addresses, and differ only by their presence in the network at multiple points. Almost any unicast address can be employed as an anycast address.
 </li>
<li style="text-align: justify;"><strong>A multicast address</strong> is also used by multiple hosts, which acquire the multicast address destination by participating in the multicast distribution protocol among the network routers. A packet that is sent to a multicast address is delivered to all interfaces that have joined the corresponding multicast group
<p> IPv6 does not implement broadcast addressing. Broadcast&#8217;s traditional role is subsumed by multicast addressing to the all-nodes link-local multicast group ff02::1. However, the use of the all-nodes group is not recommended, and most IPv6 protocols use a dedicated link-local multicast group to avoid disturbing every interface in the network.</li>
</ol>
<a href="https://itblogsec.com/wp-content/uploads/2017/03/ipv6_cheat_sheet.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="bottom" data-toolbar-fixed="off">ipv6_cheat_sheet</a>
<p style="text-align: center;">Download file <a href="https://itblogsec.com/wp-content/uploads/2017/03/ipv6_cheat_sheet.pdf" target="_blank">here</a></p>
<p style="text-align: center;">source: <a href="http://www.roesen.org" target="_blank">http://www.roesen.org</a></p>
<p>The post <a href="https://itblogsec.com/ipv6-cheat-sheet/">IPv6 cheat sheet</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/ipv6-cheat-sheet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tcpdump cheat sheet</title>
		<link>https://itblogsec.com/tcpdump-cheat-sheet/</link>
					<comments>https://itblogsec.com/tcpdump-cheat-sheet/#comments</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 23 Feb 2017 18:11:54 +0000</pubDate>
				<category><![CDATA[Cheat Sheets]]></category>
		<category><![CDATA[tcpdump]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=622</guid>

					<description><![CDATA[<p>Tcpdump is a common packet analyzer that runs under the command line. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Distributed under the BSD license, tcpdump is free software.</p>
<p>The post <a href="https://itblogsec.com/tcpdump-cheat-sheet/">Tcpdump cheat sheet</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Tcpdump cheat sheet </h2>
<p style="text-align: justify;">It is a common <strong>packet analyzer</strong> that runs under the command line. It allows the user to display <strong>TCP/IP</strong> and other packets being transmitted or received over a network to which the computer is attached. Distributed under the <strong>BSD license</strong>, it is free software. It works on most Unix-like operating systems: Linux, Solaris, BSD, macOS, HP-UX, Android and AIX among others. In those systems, tcpdump uses the libpcap library to capture packets. The port of application for Windows is called <strong>WinDump</strong>; it uses <strong>WinPcap</strong>, the Windows port of <strong>libpcap</strong>.</p>
<p style="text-align: justify;">It was originally written in <strong>1987</strong> by <strong><a title="Van Jacobson" href="https://en.wikipedia.org/wiki/Van_Jacobson">Van Jacobson</a>, <a class="new" title="Craig Leres (page does not exist)" href="https://en.wikipedia.org/w/index.php?title=Craig_Leres&amp;action=edit&amp;redlink=1">Craig Leres</a> and <a class="new" title="Steven McCanne (page does not exist)" href="https://en.wikipedia.org/w/index.php?title=Steven_McCanne&amp;action=edit&amp;redlink=1">Steven McCanne</a></strong> who were, at the time, working in the <strong><a class="mw-redirect" title="Lawrence Berkeley Laboratory" href="https://en.wikipedia.org/wiki/Lawrence_Berkeley_Laboratory">Lawrence Berkeley Laboratory</a></strong> Network Research Group. By the late 1990s there were numerous versions of tcpdump distributed as part of various operating systems, and numerous patches that were not well coordinated. <strong><a class="new" title="Michael Richardson (mcr) (page does not exist)" href="https://en.wikipedia.org/w/index.php?title=Michael_Richardson_(mcr)&amp;action=edit&amp;redlink=1">Michael Richardson (mcr)</a> and <a class="new" title="Bill Fenner (page does not exist)" href="https://en.wikipedia.org/w/index.php?title=Bill_Fenner&amp;action=edit&amp;redlink=1">Bill Fenner</a></strong> created <strong>www.tcpdump.org</strong> in 1999.</p>
<p style="text-align: justify;">Tool prints the contents of network packets. It <strong>can read packets from a network interface card</strong> or from a previously created saved packet file. It can write packets to standard output or a file. It is also possible to use tcpdump for the specific purpose of intercepting and displaying the communications of another user or computer. A user with the necessary privileges on a system acting as a <a title="Router (computing)" href="https://en.wikipedia.org/wiki/Router_(computing)">router</a> or <a class="mw-redirect" title="Gateway (computer networking)" href="https://en.wikipedia.org/wiki/Gateway_(computer_networking)">gateway</a> through which unencrypted traffic such as <strong><a title="Telnet" href="https://en.wikipedia.org/wiki/Telnet">Telnet</a> </strong>or <strong><a class="mw-redirect" title="HTTP" href="https://en.wikipedia.org/wiki/HTTP">HTTP</a> </strong>passes can use this tool to view login IDs, passwords, the <a title="Uniform Resource Locator" href="https://en.wikipedia.org/wiki/Uniform_Resource_Locator">URLs</a> and content of websites being viewed, or any other unencrypted information.</p>
<a href="https://itblogsec.com/wp-content/uploads/2017/02/tcpdump.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="bottom" data-toolbar-fixed="off">tcpdump</a>
<p style="text-align: center;">Download file <a href="https://itblogsec.com/wp-content/uploads/2017/02/tcpdump.pdf" target="_blank" rel="noopener">here</a></p>
<p style="text-align: center;">source: <a href="http://packetlife.net" target="_blank" rel="noopener">http://packetlife.net</a></p>
<p>The post <a href="https://itblogsec.com/tcpdump-cheat-sheet/">Tcpdump cheat sheet</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/tcpdump-cheat-sheet/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>IPsec cheat sheet #1</title>
		<link>https://itblogsec.com/ipsec-cheat-sheet-1/</link>
					<comments>https://itblogsec.com/ipsec-cheat-sheet-1/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 02 Feb 2017 12:46:27 +0000</pubDate>
				<category><![CDATA[Cheat Sheets]]></category>
		<category><![CDATA[IPsec]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=567</guid>

					<description><![CDATA[<p>Find a very useful cheat sheet of well-known Internet Protocol Security (IPsec) - a protocol suite for secure Internet Protocol (IP) communications that works by authenticating and encrypting each IP packet of a communication session. </p>
<p>The post <a href="https://itblogsec.com/ipsec-cheat-sheet-1/">IPsec cheat sheet #1</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>IPsec cheat sheet #1</h2>
<p>Find very useful cheat sheet of well-known Internet Protocol Security (IPsec) &#8211; a protocol suite for secure Internet Protocol (IP) communications that works by authenticating and encrypting each IP packet of a communication session.</p>
<a href="https://itblogsec.com/wp-content/uploads/2017/02/IPsec.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="bottom" data-toolbar-fixed="off">IPsec</a>
<p style="text-align: center;">Download file <a href="https://itblogsec.com/wp-content/uploads/2017/02/IPsec.pdf" target="_blank" rel="noopener noreferrer">here </a></p>
<p style="text-align: center;">source: <a href="http://packetlife.net" target="_blank" rel="noopener noreferrer">http://packetlife.net</a></p>
<p style="text-align: center;"> </p>
<p>The post <a href="https://itblogsec.com/ipsec-cheat-sheet-1/">IPsec cheat sheet #1</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/ipsec-cheat-sheet-1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Checkpoint CLI reference card v2.0.1</title>
		<link>https://itblogsec.com/checkpoint-cli-reference-card/</link>
					<comments>https://itblogsec.com/checkpoint-cli-reference-card/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 24 Jan 2017 20:29:42 +0000</pubDate>
				<category><![CDATA[Cheat Sheets]]></category>
		<category><![CDATA[checkpoint]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=426</guid>

					<description><![CDATA[<p>Useful CLI reference card by Jens Roesen - find the most common checkpoint commands.</p>
<p>The post <a href="https://itblogsec.com/checkpoint-cli-reference-card/">Checkpoint CLI reference card v2.0.1</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Checkpoint CLI reference card v2.0.1</h2>
<p>Useful CLI reference card by <a href="http://www.roesen.org/">Jens Roesen</a> &#8211; find the most common checkpoint commands.</p>
<a href="https://itblogsec.com/wp-content/uploads/2017/01/cp_cli_ref_card.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="bottom" data-toolbar-fixed="off">cp_cli_ref_card</a>
<p style="text-align: center;">Download file <a href="https://itblogsec.com/wp-content/uploads/2017/01/cp_cli_ref_card.pdf">here</a></p>
<p>The post <a href="https://itblogsec.com/checkpoint-cli-reference-card/">Checkpoint CLI reference card v2.0.1</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/checkpoint-cli-reference-card/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/189 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-01 03:37:06 by W3 Total Cache
-->