-
Recent Posts
- Experts devised a technique to bypass web application firewalls (WAF) of several vendorsSecurity Affairs
- Lapsus$ Extortion Group Claims Okta Hack, Microsoft Source Code Leak | WIRED
- 50% reduction in accounts being compromised with MFA
- Open source developer corrupts widely-used libraries, affecting tons of projects – The Verge
- 93% of tested networks are vulnerable to breach…
Categories
- Android (80)
- Android Apps (74)
- Apache (4)
- Arch (10)
- Bill 'em (2)
- CentOS (20)
- Cisco (2)
- Development (12)
- DevOps (3)
- Dominion Companion (15)
- Fedora (20)
- Good Shepherd Knights of Columbus (2)
- Good Shepherd Online App (2)
- GS Chinese Auction (2)
- Guides (52)
- Hacks (10)
- Harptabs.com (68)
- Harptabs.com Mobile App (26)
- Landscaper Tracker (1)
- Linux (80)
- myCookieFortune.com (3)
- Networking (8)
- News (182)
- Our Apps (58)
- Payup (1)
- PHP IP Logger (6)
- Security (20)
- Time Off Tracker (6)
- Website Loader (1)
- Websites (20)
- Windows (4)
Tags
android apps arch beta Bill 'em block bluetooth bug fix Captcha css dc delete development domain controller dominion companion downloader draft email flash FSMO hard disk harptabs Harptabs.com Harptabs.com Android App inode iptables linux Maintenance mobile mobile app mount pacman password photos PHP IP Logger QR security smartctl special character ssh terminal testing time off tracker update upgradeAds by Google
Join us on Facebook
Category Archives: Guides
Add a User to a Linux Group
If you need to add an existing user to a Linux group it is very easy, just run the following command: usermod -a -G <group name> <user name>
RFID Thief v2.0
This is an interesting project that shows you how you can create a long range RFID reader. This is another reason why wireless, no matter how short the range, is insecure. Source: RFID Thief v2.0 – scund00r
Posted in Hacks
Leave a comment
Using iptables to route OpenVPN traffic
To have your vpn traffic be able to reach the internet you just need to add the following iptable rules: iptables -A FORWARD -i tun0 -j ACCEPT iptables -A FORWARD -i tun0 -o eth0 -m state –state RELATED,ESTABLISHED -j ACCEPT iptables -A FORWARD … Continue reading
NTFS permissions for Redirected Folders (or Home Directories) | Off Campus
Source: NTFS permissions for Redirected Folders (or Home Directories) | Off Campus
Posted in Guides
Leave a comment
Maltrail – Malicious Traffic Detection System
A malicious traffic detection system which can be deployed on your network with ease. https://www.latesthackingnews.com/maltrail-malicious-traffic-detection-system/