-
Recent Posts
- Experts devised a technique to bypass web application firewalls (WAF) of several vendorsSecurity Affairs
- Lapsus$ Extortion Group Claims Okta Hack, Microsoft Source Code Leak | WIRED
- 50% reduction in accounts being compromised with MFA
- Open source developer corrupts widely-used libraries, affecting tons of projects – The Verge
- 93% of tested networks are vulnerable to breach…
Categories
- Android (80)
- Android Apps (74)
- Apache (4)
- Arch (10)
- Bill 'em (2)
- CentOS (20)
- Cisco (2)
- Development (12)
- DevOps (3)
- Dominion Companion (15)
- Fedora (20)
- Good Shepherd Knights of Columbus (2)
- Good Shepherd Online App (2)
- GS Chinese Auction (2)
- Guides (52)
- Hacks (10)
- Harptabs.com (68)
- Harptabs.com Mobile App (26)
- Landscaper Tracker (1)
- Linux (80)
- myCookieFortune.com (3)
- Networking (8)
- News (182)
- Our Apps (58)
- Payup (1)
- PHP IP Logger (6)
- Security (20)
- Time Off Tracker (6)
- Website Loader (1)
- Websites (20)
- Windows (4)
Tags
android apps arch beta Bill 'em block bluetooth bug fix Captcha css dc delete development domain controller dominion companion downloader draft email flash FSMO hard disk harptabs Harptabs.com Harptabs.com Android App inode iptables linux Maintenance mobile mobile app mount pacman password photos PHP IP Logger QR security smartctl special character ssh terminal testing time off tracker update upgradeAds by Google
Join us on Facebook
Cloud Product Accidentally Exposes Users’ TLS Certificate Private Keys
Posted in News
Leave a comment
Cloud Product Accidentally Exposes Users’ TLS Certificate Private Keys
Posted in News
Leave a comment
RFID Thief v2.0
This is an interesting project that shows you how you can create a long range RFID reader. This is another reason why wireless, no matter how short the range, is insecure.
Source: RFID Thief v2.0 – scund00r
Posted in Hacks
Leave a comment
Containers are not VMs
I spend a good portion of my time at Docker talking to community members with varying degrees of familiarity with Docker and I sense a common theme: people’s natural response when first working with Docker is to try and frame it in terms of virtual machines. I can’t count the number of times I have heard Docker containers described as “lightweight VMs”. I get it because I did the exact same thing when I first started working with Docker. It’s easy to connect those dots as both technologies share some characteristics. Both are designed to provide an isolated environment in which to run an application. Additionally, in both cases that environment is represented as a binary artifact that can be moved between hosts. There may be other similarities, but to me these are the two biggies. The key is that the…
Source: Containers are not VMs
Posted in DevOps
Leave a comment