Nmap (“Network Mapper”) is a free and open source utility for network discovery and security auditing. I along with many other systems and network administrators also find it to be a useful tool for the right job. Nmap can be installed and used in Windows, and mostly common in Linux distributions such as Debian and the […]
Tag: Security
Coming Soon! In August 2013, Google will start the process of switching its SSL Certificates over to 2048-bit for its services adding stronger security. This information was made public on Stephen McHenry’s, Director of Information Security at Google Blog. The completion of this project is set to be completed by the end of the 2013 year. […]
Microsoft Office 2013 DocRecrypt Tool
Yup! That one employee encrypted his/her Microsoft Office documents and forgot the password or worse has left the company Fortunately Microsoft has a solution for situations such as this and its called Microsoft Office 2013 DocRecrypt Tool. This tool allows admins to unprotect or change the password on password protected OOXML Word, Excel and PowerPoint files. The tool gives […]
That which you do not know, the doing will quickly teach you. – Po (Kung Fu – 1972) Here is a situation where you have a virtual machine joined to an active directory domain and it’s reverted to an earlier state which then invalidates its domain security key. Rather than removing this machine and joining […]
This little how-to is more of a way to pass socks proxy parameters to a java app, however my focus here is on doing this with the Java game Minecraft over the TOR Network. Why you ask? Because I wanted to know if it was possible and if I could do it. Items Needed: Minecraft Account […]
I do this with my other linux host over here @ jermsmit.com so why not with my ESXi 5 hosts. Using OpenSSH Public Key Authentication on ESXi 5 required a few things. You need to enable SSH You need an SSH client (I use putty) If you already have a authorized_keys file handy use it or make […]