Categories
How-To Software Technical

Some Basic Use of Nmap

Nmap (“Network Mapper”) is a free and open source utility for network discovery and security auditing. I along with many other systems and network administrators also find it to be a useful tool for the right job. Nmap can be installed and used in Windows, and mostly common in Linux distributions such as Debian and the […]

Categories
News Technical

Google SSL Certificates going to 2048-bit

Coming Soon! In August 2013, Google will start the process of switching its SSL Certificates over to 2048-bit for its services adding stronger security. This information was made public on Stephen McHenry’s, Director of Information Security at Google Blog. The completion of this project is set to be completed by the end of the 2013 year. […]

Categories
Random

Microsoft Office 2013 DocRecrypt Tool

Yup! That one employee encrypted his/her Microsoft Office documents and forgot the password or worse has left the company Fortunately Microsoft has a solution for situations such as this and its called Microsoft Office 2013 DocRecrypt Tool. This tool allows admins to unprotect or change the password on password protected OOXML Word, Excel and PowerPoint files. The tool gives […]

Categories
How-To Technical

How to use Netdom.exe to reset machine

That which you do not know, the doing will quickly teach you. – Po (Kung Fu – 1972) Here is a situation where you have a virtual machine joined to an active directory domain and it’s reverted to an earlier state which then invalidates its domain security key. Rather than removing this machine and joining […]

Categories
How-To Technical

Play Minecraft through TOR

This little how-to is more of a way to pass socks proxy parameters to a java app, however my focus here is on doing this with the Java game Minecraft over the TOR Network. Why you ask? Because I wanted to know if it was possible and if I could do it. Items Needed: Minecraft Account […]

Categories
How-To Technical

SSH into ESXi 5 host using public key authentication

I do this with my other linux host over here @ jermsmit.com so why not with my ESXi 5 hosts. Using OpenSSH Public Key Authentication on ESXi 5 required a few things. You need to enable SSH You need an SSH client (I use putty) If you already have a authorized_keys file handy use it or make […]