-
Recent Posts
- Create Compressed, Encrypted Archives with tar + gpg on Linux
- # Beware of the Malware: CISA’s Latest Warning
- —title: A Critical Warning: Don’t Let Your Firebox Go Up in Flames!author: [Your Name Here]date: [Insert Date Here]tags: security, WatchGuard, Firebox, vulnerability—
- # 🚨 Critical Update: Google Patches Chrome Zero-Day Exploit!
- # Beware of the Groundbreaking New Ransomware: HybridPetya
Categories
- Android (80)
- Android Apps (74)
- Apache (4)
- Arch (10)
- Bill 'em (2)
- CentOS (20)
- Cisco (2)
- Development (12)
- DevOps (3)
- Dominion Companion (15)
- Fedora (20)
- Good Shepherd Knights of Columbus (2)
- Good Shepherd Online App (2)
- GS Chinese Auction (2)
- Guides (53)
- Hacks (10)
- Harptabs.com (68)
- Harptabs.com Mobile App (26)
- Landscaper Tracker (1)
- Linux (81)
- myCookieFortune.com (3)
- Networking (8)
- News (198)
- Our Apps (58)
- Payup (1)
- PHP IP Logger (6)
- Security (21)
- Time Off Tracker (6)
- Website Loader (1)
- Websites (20)
- Windows (4)
Tags
android apps arch beta Bill 'em block bluetooth bug fix Captcha css dc delete development domain controller dominion companion downloader draft email flash FSMO hard disk harptabs Harptabs.com Harptabs.com Android App inode iptables linux Maintenance mobile mobile app mount pacman password photos PHP IP Logger QR security smartctl special character ssh terminal testing time off tracker update upgradeAds by Google
Join us on Facebook
Author Archives: Nick
Populate a Binary Database Field Using a Local File
You can run the following SQL statement to populate a binary database field using a local file. UPDATE <table> SET <field> = (SELECT BulkColumn from Openrowset( Bulk ‘<full file path accessible by the server>’, Single_Blob) as <field name>) WHERE <where condition>
Bug in OpenSSH Opens Linux Machines to Password Cracking Attack
Critical vulnerability in OpenSSH Opens Linux Machines to Password Cracking Attack Source: Bug in OpenSSH Opens Linux Machines to Password Cracking Attack
Posted in Hacks
Leave a comment
Basic 3D using libGDX | blog.xoppa.com
This tutorial guides you in using the basics of the 3d api LibGDX offers. Source: Basic 3D using libGDX | blog.xoppa.com
Posted in Development
Leave a comment
How to become an ethical hacker
here is an essential guide to becoming an ethical hacker and or penetration tester Source: How to become an ethical hacker
Posted in News
Leave a comment
Disable Java Third Party Offers – Java.com
Disable Java Third Party Offers
Posted in Guides
Leave a comment