Confluence – Recover from User Directory Trouble

If you're in a situation where you can't log into Confluence because you messed up your User Directories, try these ...
Read More

IPSec Site-to-Site VPN between Unifi and pfSense

In this article, we're assuming we have multiple sites (remote offices) using Unifi networking gear, and a central network (in ...
Read More

Upgrade MariaDB to 10.3 on CentOS 7

Everything you see here is found more formally at "https://mariadb.com/docs/operations/upgrades/upgrade-community-server-cs103-centos7/". This page is basically just my notes in case I ...
Read More

Pen Testing Tools – Stuff we all need

This article is mostly a cheat sheet for things pen-testers need. Obviously there's a little picking and choosing depending on ...
Read More

Create, List, Copy and Delete Windows Shadow Copy (VSS) on Windows 10

This article lists the PowerShell (and other) commands to create, list, copy from, and delete Windows Shadow Copies, also known ...
Read More

You Don’t Need a Vulnerability Scanner, Use Nmap & Metasploit

This article walks you through the process of installing, configuring and running scans using Metasploit and Nmap. Both CentOS 7 ...
Read More

Create Your Own Public Half-Life 2 DM Server on CentOS 7/8

This article walks you through the process of building your own publicly accessible Half-Life 2 Death Match server on CentOS ...
Read More

Get and Crack Windows Cached Credentials

This article explains how to extract various Windows dumps of passwords from a target system. To follow along with this ...
Read More

Open letter in response to Strengthening Australia’s cyber security regulations and incentives.

Recently the Australian Government, through the Minister for Home Affairs and the Minister for Industry, Science and Technology put out ...
Read More

Windows 10 Post Install Setup

We don't tend to install Windows very often these days. It seems to be far more stable than the old ...
Read More

Synology High Disk Utilization – An Answer

This article explains the primary reason for high disk utilization on the Synology NAS. In this example, we're using the ...
Read More

WiFi Penetration Testing with Ubuntu on USB Storage

This article demonstrates how to use Ubuntu booted from a USB disk to do WIFI penetration testing. Why would you ...
Read More

What you need in a Firewall

If you're not filtering your internet traffic, you have a router, not a firewall. The good news is that most ...
Read More

Securely Wipe Disk and Try to Recover the Contents

This article demonstrates how to securely delete files and all content from a disk, and then attempt to recover files ...
Read More

Kubernetes (MicroK8s) Part 4 – Microk8s in High Availability

The good news is that Microk8s can now be deployed in a multi-node architecture. And it's simple to do. This ...
Read More

Join Windows 10 to Azure AD (365)

If you have a "Work or School" Office 365 account, you're likely able to use it as your Windows Domain ...
Read More

More of Share an EC2 AMI Image with Another AWS Account

This article demonstrates how to share an image with another AWS account. For example, you have an EC2 that needs ...
Read More

Fail2Ban with MySQL Database for IP Blacklisting

This article demonstrates how to configure Fail2Ban to use a MySQL (or MariaDB, etc) as the storage repository for IP ...
Read More