iOS VPN Vulnerabilities and Data Leaks: An Ongoing Issue
Despite advancements in iOS versions, VPN vulnerabilities persist, affecting user privacy and security. Even in the latest version, iOS 18.1.
Despite advancements in iOS versions, VPN vulnerabilities persist, affecting user privacy and security. Even in the latest version, iOS 18.1.
The journey of new NIST password guidelines in 2024 reflects a fundamental shift in cybersecurity thinking, moving from complexity-focused approaches to more user-centric, practical security measures.
iOS on iPhones has difficulty connecting to SMB shares and servers. The workaround for devices below iOS 18.1 would be to lower the protocol supported on the server.
This Go project creates a Kubernetes Security Monitor that periodically checks for common security issues in a cluster. It includes checks for privileged containers, missing network policies, and outdated Kubernetes versions.
A hosts file is a local file that contains domain names and their matching IPs. It’s found in all common systems. The hosts file itself dates back to around 1982 when it was used in the Berkeley Software Distribution (BSD), an early version of the Unix operating system. Initially,
Be your own Certificate Authority (CA) and issue your own signed certificates to use for encrypted communications
Trying to enhance local network access, I imported the Cloudflare Origin Server certificate. Despite adding it to Windows' Trusted Root Certification Authorities, Chrome flagged a certificate error, labeling the connection insecure. Firefox, however, indicated a secure connection without warnings.
Simple Golang app that executes a script from a webhook
Tech
Modern drives often exceed FAT32's 32GB limit, causing issues in Windows when formatting from exFAT or NTFS. To ensure compatibility with devices requiring FAT32, use DISKPART to create a smaller FAT32 partition and format the remaining space with NTFS or exFAT.
Tech
Install Necessary Packages First, let's ensure you have all the necessary software packages for the domain join. Open a terminal and execute the following commands: sudo apt install realmd sssd sssd-tools samba-common krb5-user packagekit samba-common-bin samba-libs adcli ntp Specify the default Kerberos version 5 realm and enter your
Tech
Extending the functionality of a standard NGINX installation on a Debian system, we can utilize the "Webhook" package to execute local scripts
Programming
Updating your dynamic IP with Cloudflare DNS using Golang
Cyber Security
Inconsistencies in incident monitoring within Microsoft Sentinel: TimeGenerated (last update time) vs CreatedTime (incident occurrence time). Overview tab shows 225 incidents in 24 hours, but counts vary based on timestamp used. Author suggests using CreatedTime for accurate representation.
Tech
Running your own Bitcoin node offers enhanced privacy and security by allowing independent verification of transactions and blocks. It reduces reliance on third parties, lowers fraud risk, and supports network decentralization.
Tech
Go offers a lot of functionality with the net/http package.
Programming
Custom Team Fortress 2 arena game mode that re-spawns players when their killer dies