Categories
How-To Software Technical

SharePoint 2013: Upgrade to Claims Based Authentication

Claims-based authentication is an essential component to enable the advanced functionality of SharePoint 2013. To move classic-mode web applications from SharePoint 2010 Products to SharePoint 2013, you can convert them to claims-based web applications within SharePoint 2010 Products, and then migrate them to SharePoint 2013. The procedures in this post will address the issue I […]

Categories
How-To Software

Firefox: Add a Trusted Certificate Authority

By default Firefox has its own certificate store from well-know and trusted commercial Certificate Authorities. So today when I pushed out an internal self signed certificate; Firefox did not reconcile it as valid. To correct this issue I did the following: Launched Firefox Opened the options panel and selected Advanced Selected View Certificates to access […]

Categories
News Software Technical

Chat with no central authority using BitTorrent Chat

With the many communication platforms out today it’s a hard for I or anyone else for that matter to recommend one that is best for you. One this is similar about many of them today. They all relay on some centralized server to route and store all of your communication. They also store what you […]

Categories
How-To Software Technical

My Quick TOR Socks / Web Proxy

I originally preformed similar steps to setup a raspberry pi for this reason, later using a very tiny Ubuntu server install. Using a clean Ubuntu / or / Debian installation (recommended, not necessary) add the following repositories to /etc/apt/sources.list: deb http://deb.torproject.org/torproject.org <DISTRIBUTION> main to figure out the name of your distribution. A quick command to run […]

Categories
News Technical

dSploit – An Android network penetration suite

Not to cause paranoia; Just know that there are people out there looking to compromise your security, especially when you are using wireless networks via your laptop, tablet, or smartphone. One of such tools are the well known tool called dSploit. dSploit, a security toolkit for Android, makes that process so simple anyone can do it. This network […]

Categories
How-To News

Twitter Wants to Start Tracking You

Many sites do it today, why not Twitter right? Today, Twitter announced that they will be experimenting with targeted adds. What this means is they are going to go down the same path as well known sites such as Facebook and track you around the web and share information about you with advertisers. For now […]