-
Recent Posts
- Experts devised a technique to bypass web application firewalls (WAF) of several vendorsSecurity Affairs
- Lapsus$ Extortion Group Claims Okta Hack, Microsoft Source Code Leak | WIRED
- 50% reduction in accounts being compromised with MFA
- Open source developer corrupts widely-used libraries, affecting tons of projects – The Verge
- 93% of tested networks are vulnerable to breach…
Categories
- Android (80)
- Android Apps (74)
- Apache (4)
- Arch (10)
- Bill 'em (2)
- CentOS (20)
- Cisco (2)
- Development (12)
- DevOps (3)
- Dominion Companion (15)
- Fedora (20)
- Good Shepherd Knights of Columbus (2)
- Good Shepherd Online App (2)
- GS Chinese Auction (2)
- Guides (52)
- Hacks (10)
- Harptabs.com (68)
- Harptabs.com Mobile App (26)
- Landscaper Tracker (1)
- Linux (80)
- myCookieFortune.com (3)
- Networking (8)
- News (182)
- Our Apps (58)
- Payup (1)
- PHP IP Logger (6)
- Security (20)
- Time Off Tracker (6)
- Website Loader (1)
- Websites (20)
- Windows (4)
Tags
android apps arch beta Bill 'em block bluetooth bug fix Captcha css dc delete development domain controller dominion companion downloader draft email flash FSMO hard disk harptabs Harptabs.com Harptabs.com Android App inode iptables linux Maintenance mobile mobile app mount pacman password photos PHP IP Logger QR security smartctl special character ssh terminal testing time off tracker update upgradeAds by Google
Join us on Facebook
Tag Archives: security
Maltrail – Malicious Traffic Detection System
A malicious traffic detection system which can be deployed on your network with ease. https://www.latesthackingnews.com/maltrail-malicious-traffic-detection-system/
Treacherous backdoor found in TP-Link routers – The H Security: News and Features
Treacherous backdoor found in TP-Link routers – The H Security: News and Features.
Using Bluetooth to Lock/Unlock your Desktop Automatically
I thought this was a cool little program. I have not tried it myself yet though. Hack and /: Automatically Lock Your Computer | Linux Journal.
Forwarding your Traffic through SSH
As a consultant I am always on networks which can not be trusted. One way to make sure no one is sniffing my traffic, I run my connection through an SSH tunnel. This is something which is incredibly simple to … Continue reading
Set Password Not to Expire for a User
If you have your passwords set to expire automatically on your system for security reasons, there may be times when you want an account who’s password doesn’t expire (such as if you are using a cert or if you have … Continue reading