Categories
How-To Technical

Windows XP WPA2-Enterprise using IEEE 802.1X

On occasions I get a question where someone is trying to connect Microsoft Windows XP to a WPA2-Enterprise level Wireless network using RADIUS authentication. First I would like inform you that in order to so this you need to be running Service Pack 2; I’d recommend you run Service Pack 3, which is the latest […]

Categories
Software Technical

BitTorrent Sync

Looking for a free (and new) way to keep folder in sync using a secure and fast method across multiple computers. Well look no further than BitTorrent. It’s been used for many things and the folks over at BitTorrent have given us BitTorrent Sync. No accounts needed, no subscriptions and best of all it works on a […]

Categories
How-To Software Technical

Disable Internet Explorer Enhanced Security Configuration, Server 2012

Q. How can I disable Internet Explorer Enhanced Security Configuration in Server 2012? A.  You disable IE Enhanced Security Configuration by doing the following: In Server Manager, click on Local Server in the left pane to select the server you are logged into, this will show you in the right pane, in the Properties section In the […]

Categories
How-To Technical

ettercap and urlsnarf fun

Playing around I downloaded the package dsniff (apt-get install dsniff) to get a bunch of tools. One of the tools are urlsnarf which outputs all requested URLs sniffed from HTTP traffic in CLF (Common Log Format) CLF is used by almost all web servers You start this by typing the following: urlsnarf -i eth0 urlsnarf: listening on eth0 [tcp […]

Categories
How-To Software Technical

“Permissions are too open”

No man is above the law and no man is below it: nor do we ask any man’s permission when we ask him to obey it. – Theodore Roosevelt You are attempting to automate your ssh session to a remote system using keys and you get the following “Permissions are too open” message. The problem is, that […]

Categories
News

Microsoft’s fight against Poison Ivy

Info of what is known: Poison ivy (Backdoor:Win32/Poisonivy.E) is a backdoor trojan that allows unauthorized access and control of an affected machine. It attempts to hide by injecting itself into other processes. The following system changes may indicate its infection: The existence of the following file: c:windows:svvchost.exe The existence of the following registry entry: “StubPath” With data: “c:windows:svvchost.exe” in the subkey: HKLMSoftwareMicrosoftActive […]