I know one of the first questions that come to mine are why do you feel the need for encryption, especially in instant messages on something such as Facebook? Well what if I wanted to discuss something of nature which I deemed as being sensitive and personal. Yes! Sometimes the man who shares things what’s […]
Category: Technical
I have been testing various features and functionally of a recent SharePoint 2010 to SharePoint 2013 upgrade I preformed. When I encountered an issue involving a list item used heavily buy one of my departments. The issue presented itself when the users attempted to create new work items and this is when SharePoint 2013 displayed […]
Back in July of 2013 I faced an issue with my Exchange 2013 Server running on Microsoft Server 2012. Our server would unexpectedly reboot ( — chuckles — aren’t all reboots without notice unexpected). The message I kept running into was regarding a faulting application which caused the reboot was the local security authority subsystem […]
The site where “expert answers to your questions” has the answer for us on the go in today s mobile times. A mobile application to access this ever growing and fast network of tech folks who answer questions based on diverse topics ranging from software, hardware, photography and even how to make a bed. Setting […]
Here are some simple steps to get you going with getting services you want to host under the Tor network hidden service. While they don’t seem simple up front they are. These notes are based on my own testing and using my headless tor proxy server setup. Requirements Tor installed Tor running Now my steps […]
The tor network is a system of proxy servers that use multiple layers of encryption. This method is called Onion Routing and it was designed by the U.S. Navy for security and anonymity of its users. The goal was for agents and field reporters alike to communicate and share information without being caught, and spied […]