Output your microphone to a remote computers speaker
Read More »Advanced Persistent Threat Activity Exploiting Managed Service Providers
Organizations should configure system logs to detect incidents and to identify the type and scope of malicious activity. Properly configured logs enable rapid containment and appropriate response. Response An organization’s ability to rapidly respond to and recover from an incident begins with the development of an incident response capability. An …
Read More »Setting Up A Free TLS/SSL Certificate With “Let’s Encrypt”
SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. SSL is an industry standard and is used by millions of websites …
Read More »Mass delete files in FTP server
Ran into a little problem today, something I don’t really do often and something many would never do! Yeah, I’m talking about FTP .. the old pre-historic service of a thing that was originally RFC’d back in 1971. I had to mass delete files in FTP server, empty a folder …
Read More »Fix sound mute in Kali Linux on boot
If you’ve installed Kali Linux then you already know that the sound option is mute or disabled at the boot. No matter what you do, next time you restart Kali Linux, you will again have sound mute in Kali Linux on boot. You might want to start Kali Linux with …
Read More »