Cyber Security
iOS VPN Vulnerabilities and Data Leaks: An Ongoing Issue
Despite advancements in iOS versions, VPN vulnerabilities persist, affecting user privacy and security. Even in the latest version, iOS 18.1.
Cyber Security
Despite advancements in iOS versions, VPN vulnerabilities persist, affecting user privacy and security. Even in the latest version, iOS 18.1.
Cyber Security
The journey of new NIST password guidelines in 2024 reflects a fundamental shift in cybersecurity thinking, moving from complexity-focused approaches to more user-centric, practical security measures.
Tech
iOS on iPhones has difficulty connecting to SMB shares and servers. The workaround for devices below iOS 18.1 would be to lower the protocol supported on the server.
Programming
This Go project creates a Kubernetes Security Monitor that periodically checks for common security issues in a cluster. It includes checks for privileged containers, missing network policies, and outdated Kubernetes versions.
Tech
A hosts file is a local file that contains domain names and their matching IPs. It’s found in all common systems. The hosts file itself dates back to around 1982 when it was used in the Berkeley Software Distribution (BSD), an early version of the Unix operating system. Initially,
Cyber Security
Be your own Certificate Authority (CA) and issue your own signed certificates to use for encrypted communications
Cyber Security
Trying to enhance local network access, I imported the Cloudflare Origin Server certificate. Despite adding it to Windows' Trusted Root Certification Authorities, Chrome flagged a certificate error, labeling the connection insecure. Firefox, however, indicated a secure connection without warnings.
Simple Golang app that executes a script from a webhook
Modern drives often exceed FAT32's 32GB limit, causing issues in Windows when formatting from exFAT or NTFS. To ensure compatibility with devices requiring FAT32, use DISKPART to create a smaller FAT32 partition and format the remaining space with NTFS or exFAT.
Install Necessary Packages First, let's ensure you have all the necessary software packages for the domain join. Open a terminal and execute the following commands: sudo apt install realmd sssd sssd-tools samba-common krb5-user packagekit samba-common-bin samba-libs adcli ntp Specify the default Kerberos version 5 realm and enter your
Extending the functionality of a standard NGINX installation on a Debian system, we can utilize the "Webhook" package to execute local scripts
Updating your dynamic IP with Cloudflare DNS using Golang
Inconsistencies in incident monitoring within Microsoft Sentinel: TimeGenerated (last update time) vs CreatedTime (incident occurrence time). Overview tab shows 225 incidents in 24 hours, but counts vary based on timestamp used. Author suggests using CreatedTime for accurate representation.
Running your own Bitcoin node offers enhanced privacy and security by allowing independent verification of transactions and blocks. It reduces reliance on third parties, lowers fraud risk, and supports network decentralization.
Go offers a lot of functionality with the net/http package.
Custom Team Fortress 2 arena game mode that re-spawns players when their killer dies
Hard-coded Particles attached to projectiles for members
Use the !bp command to view backpack items
Many out-of-the-box ISP routers come with basic, pre-configured passwords vulnerable to brute-force attacks. Attackers can crack these passwords in up to 30 minutes using dedicated GPUs and tools. Users should be aware of these vulnerabilities and take measures to secure their home networks.