Category: Technology
-
Cpanel DDNS Update On CentOS Boot
I needed to update a Cpanel Dynamic Domain Name Service (DDNS) entry automatically for a virtual machine (VM) that I manage, to allow a simple address to type rather than obtaining the new dynamic host configuration protocol (DHCP) from the VM’s command-line interface (CLI). Our first step is to log on to the hosting domain’s…
-
Top 32 Nmap Command Examples For Sys/Network Admins – nixCraft
Using NMAP can help identify vulnerable points on your network. One of the more effective tools out there, and as usual, the best are the command line. – AG Nmap command examples and tutorials to scan a host/network, so to find out the possible vulnerable points in the hosts and secure the system. Source:…
-
CCleaner’s August 2017 Release Infected
Back in August a version of CCleaner was released that was infected. More information is available around the web, but the direct release from Piriform is here. Recently Piriform was acquired by Avast. For the full technical details, you can read this post, which contains all the information for hashes, registry entries, etc.
-
Best tutorials for bash beginners
Even just a small amount of coding, or having reference materials, can go a long way when troubleshooting. Reverse engineering code also has it’s merits and these beginner bash tutorials and reference materials compiled by nixCraft are one to bookmark. A list of online tutorials and resources to help you learn bash shell, the default…
-
Setting up a NGINX RTMP Streaming Server
ESports, or non-technically the broadcasting of computer games for others to watch, has moved to the spotlight recently and is gathering a larger following than expected. Who would have thought that just watching video games would be more popular than actually playing them? As I have been playing Internet multiplayer games since purchasing Quake as…
-
Sandboxie – Sandbox Your Applications
Sometimes you may question a download, or just want to browse the web a bit safer, sandboxing can provide help with this. Sandboxes are like their name implies, a child’s playbox, and the term has been in use by IT people for decades.
-
Making Private and Anonymous Cellular Calls
People have always been tracked and calls always monitored, including cellular calls. For most people this is not an issue, but for some it’s a real problem due to the nature of their actions. This article breaks down some simple steps to anonymity if you really need it.
-
Solar Roadways A Reality
Solar roadways, a path to safer highways and enhanced recreational parks? The concepts are pretty cool, and the added bonus of eliminating many of the expenses cities encounter makes it a win-win. Melting snow without plows or salt, changing a basketball court into a kiddie playground, redirecting traffic due to emergencies (think hurricanes) and visual…
-
How To Patch OpenSSL – March 2015
On 19th March 2015, multiple high and moderate severity level vulnerabilities released in OpenSSL, a Secure Sockets Layer toolkit used in a Linux and Unix-like systems. How can I fix these vulnerabilities
-
Computer aided sniper, 1000-yards using Linux
Most technology begins with concepts or utilization in the military and eventually is adapted to civilian use. The process works both way though, and a new scope utilizing an ARM processor and Linux back-end allows targeting at 1000-yards and a third party visual monitoring interface. This is not only cool, but also very unique by…