Ninth Star Clothing

Search:

Type: Posts; User: Pockets

Search: Search took 0.00 seconds.

  1. Adobe Flash 0-day exploit - Leveraging ActiveX

    Stop us if you've heard this one before: An Adobe Flash zero-day vulnerability is being actively targeted in the wild to hijack victims' Windows PCs.
    Researchers with Gigamon Applied Threat Research...
  2. How to export Actve Directory group members - Server 2008

    Hi,

    If you need to export a list of group members to a text file, run this command (Powershell)


    net group “Group Name” /domain > groupmembers.txt

    :)
  3. Replies
    0
    Views
    818

    So your have Kali Linux?

    https://66.media.tumblr.com/d4845e9a43bdb8a09bda61f2960047d6/tumblr_pi4zuokEDK1xgxs2zo1_500.jpg

    ;)
  4. Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer

    Cybersecurity researchers have revealed an unpatched logical flaw in Microsoft Office 2016 and older versions that could allow an attacker to embed malicious code inside a document file, tricking...
  5. Replies
    0
    Views
    321

    Disable directory listings CentOS 7

    * In this example I am using CentOS 7*

    If you do a search for this solution you'll find a litany of answers such as "Remove Indexes from the Options line"



    <Directory /var/www/>
    ...
  6. Replies
    0
    Views
    229

    iDrac - How to clear foreign disk state

    Replacing SAS drives on a system will "break" the virtual disks configuration. These disks will display a foreign state. To clear this, do the following:

    From the iDrac web interface > Overview...
  7. The Complete 2018 CompTIA Certification Training Bundle: Lifetime Access

    https://78.media.tumblr.com/2bc8310b3d90cdde9c282028925c9f63/tumblr_pf26d9DJF61xgxs2zo1_1280.png

    The Complete 2018 CompTIA Certification Training Bundle: Lifetime Access
  8. ###Wifi Security: Critical weakness found in WPA2

    We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation...
  9. Replies
    0
    Views
    1,811

    Getting started with GNS3

    Download GNS3 here - https://www.gns3.com/


    How to install and GNS Basics -


    https://www.youtube.com/watch?v=vVYWrgAOke4&list=PL3UpcvaDU_Fkfu9wnEBvF_XBR6KeMg8jv
  10. Ethical Hacking - Directory Traversal Attacks

    http://www.youtube.com/watch?v=jJ0ijQ5pADE
  11. Replies
    0
    Views
    1,959

    Design Coding Rap

    http://www.youtube.com/watch?v=a0qMe7Z3EYg

    I know this dude made this a while ago, but its new to me AND full of useful information.

    Listen.
Results 1 to 11 of 11