Cyber Security
iOS VPN Vulnerabilities and Data Leaks: An Ongoing Issue
Despite advancements in iOS versions, VPN vulnerabilities persist, affecting user privacy and security. Even in the latest version, iOS 18.1.
Cyber Security
Despite advancements in iOS versions, VPN vulnerabilities persist, affecting user privacy and security. Even in the latest version, iOS 18.1.
Tech
iOS on iPhones has difficulty connecting to SMB shares and servers. The workaround for devices below iOS 18.1 would be to lower the protocol supported on the server.
Programming
This Go project creates a Kubernetes Security Monitor that periodically checks for common security issues in a cluster. It includes checks for privileged containers, missing network policies, and outdated Kubernetes versions.
Tech
A hosts file is a local file that contains domain names and their matching IPs. It’s found in all common systems. The hosts file itself dates back to around 1982 when it was used in the Berkeley Software Distribution (BSD), an early version of the Unix operating system. Initially,
Cyber Security
Be your own Certificate Authority (CA) and issue your own signed certificates to use for encrypted communications
Tech
Modern drives often exceed FAT32's 32GB limit, causing issues in Windows when formatting from exFAT or NTFS. To ensure compatibility with devices requiring FAT32, use DISKPART to create a smaller FAT32 partition and format the remaining space with NTFS or exFAT.
Tech
Install Necessary Packages First, let's ensure you have all the necessary software packages for the domain join. Open a terminal and execute the following commands: sudo apt install realmd sssd sssd-tools samba-common krb5-user packagekit samba-common-bin samba-libs adcli ntp Specify the default Kerberos version 5 realm and enter your
Tech
Extending the functionality of a standard NGINX installation on a Debian system, we can utilize the "Webhook" package to execute local scripts