Categories
News

Goodbye, Google+

Con te partirò , Google+ It’s been truly a fun ride, from private testing to the public launch. great hopes for Google+ as an alternative to other mainstream social media options.  Campaigning to get friends and family over to the social network,  but getting traction against those other platforms was next to impossible. This all comes to a […]

Categories
News

Check your website for Chrome distrust

Hey Friends, The upcoming releases of Google Chrome September 2018 time frame is said to no longer trust certain Symantec, Thawte, GeoTrust, and RapidSSL SSL/TLS certificates. Chrome users will see “Not secure” in the address bar when connecting to websites using a distrusted certificate. The folks over at Qualys wrote: “Google finalized their plans for […]

Categories
How-To Technical

Windows Server 2016, AppLocker Rules

AppLocker rules can be set up by using group policy in a Windows domain and have been very useful in limiting the execution of arbitrary executable files. AppLocker takes the approach of denying all executables from running unless they have specifically been whitelisted and allowed. AppLocker is available in Windows Desktop and Servers.  Desktop Windows […]

Categories
News Technical

Phishing Attacks using Office 365 and SharePoint

The bad guys are at it once again and now have a new slick way of stealing your login credentials, by sending you an invite via email to open a SharePoint document. The link(s) takes you to an actual SharePoint page where you will see a OneDrive prompt. This prompt will have an “Access Document” […]

Categories
News Technical

How to search for Open Amazon S3 Buckets and their contents

How to search for Open Amazon s3 Buckets and their contents — https://buckets.grayhatwarfare.com GrayHatWarfare created https://buckets.grayhatwarfare.com/ a free tool that lists open s3 buckets and helps you search for interesting files. For an intro on what Amazon open buckets are, please read the following: https://blog.rapid7.com/2013/03/27/open-s3-buckets/ In essence, many files are publicly accessible, some by design. These files sometimes […]

Categories
How-To Software

Removing a Orphaned Virtual Machine from vRealize Automation

**** ATTENTION !!! **** **** Please be sure to BACKUP any related databases   The following steps provide information on removing virtual machines from VMWare vRealize Automation (vRA). These steps are to be used when the following conditions exist: A virtual machine that is being managed without being deleted from the endpoint. You want to […]