Con te partirò , Google+ It’s been truly a fun ride, from private testing to the public launch. great hopes for Google+ as an alternative to other mainstream social media options. Campaigning to get friends and family over to the social network, but getting traction against those other platforms was next to impossible. This all comes to a […]
Author: jermsmit
Check your website for Chrome distrust
Hey Friends, The upcoming releases of Google Chrome September 2018 time frame is said to no longer trust certain Symantec, Thawte, GeoTrust, and RapidSSL SSL/TLS certificates. Chrome users will see “Not secure” in the address bar when connecting to websites using a distrusted certificate. The folks over at Qualys wrote: “Google finalized their plans for […]
AppLocker rules can be set up by using group policy in a Windows domain and have been very useful in limiting the execution of arbitrary executable files. AppLocker takes the approach of denying all executables from running unless they have specifically been whitelisted and allowed. AppLocker is available in Windows Desktop and Servers. Desktop Windows […]
The bad guys are at it once again and now have a new slick way of stealing your login credentials, by sending you an invite via email to open a SharePoint document. The link(s) takes you to an actual SharePoint page where you will see a OneDrive prompt. This prompt will have an “Access Document” […]
How to search for Open Amazon s3 Buckets and their contents — https://buckets.grayhatwarfare.com GrayHatWarfare created https://buckets.grayhatwarfare.com/ a free tool that lists open s3 buckets and helps you search for interesting files. For an intro on what Amazon open buckets are, please read the following: https://blog.rapid7.com/2013/03/27/open-s3-buckets/ In essence, many files are publicly accessible, some by design. These files sometimes […]
**** ATTENTION !!! **** **** Please be sure to BACKUP any related databases The following steps provide information on removing virtual machines from VMWare vRealize Automation (vRA). These steps are to be used when the following conditions exist: A virtual machine that is being managed without being deleted from the endpoint. You want to […]