Categories
News Technical

How to search for Open Amazon S3 Buckets and their contents

How to search for Open Amazon s3 Buckets and their contents — https://buckets.grayhatwarfare.com GrayHatWarfare created https://buckets.grayhatwarfare.com/ a free tool that lists open s3 buckets and helps you search for interesting files. For an intro on what Amazon open buckets are, please read the following: https://blog.rapid7.com/2013/03/27/open-s3-buckets/ In essence, many files are publicly accessible, some by design. These files sometimes […]

Categories
How-To Personal Technical

Privacy & Google Search Alternatives

When it comes to privacy, using Google search is not the best of ideas. When you use their search engine, Google is recording your IP address, search terms, user agent, and often a unique identifier, which is stored in cookies. Here are a few Google search alternatives   DuckDuckGo is a US-based search engine that was […]

Categories
How-To

Set up the Default Domain for vCenter Single Sign-On | Tech-Short

vCenter Single Sign by default requires the user to specify the domain during authentication with vCenter. Example: JERMSMIT\admin or admin@JERMSMIT.LAB. You can eliminate the need to insert the domain in the username by following the following steps.   Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single Sign-On administrator […]

Categories
How-To News

CVE-2018-0886 – CredSSP Remote Code Execution Vulnerability

Description A remote code execution vulnerability exists in the Credential Security Support Provider protocol (CredSSP). An attacker who successfully exploited this vulnerability could relay user credentials and use them to execute code on the target system. CredSSP is an authentication provider which processes authentication requests for other applications; any application which depends on CredSSP for […]

Categories
News

Happy #NationalPasswordDay!

Today is NationalPasswordDay 2018 – May 3, 2018 The following is a list of good practices designed to keep individuals and their data safe online. Email Security Avoid opening emails, downloading attachments, or clicking on suspicious links sent from unknown or untrusted sources. Verify unexpected attachments or links from known senders by contacting them via another […]

Categories
News Technical

vSphere Integrated Containers

vSphere Integrated Containers provides critical enterprise container infrastructure to help IT Operating teams run both traditional and containerized applications providing a number of benefits: security isolation management speed agility I am looking forward to getting my hands on this and expanding my knowledge on how vSphere Integrated Containers (VIC) works in the real world. vSphere Integrated Containers includes the […]