-
Recent Posts
- Create Compressed, Encrypted Archives with tar + gpg on Linux
- # Beware of the Malware: CISA’s Latest Warning
- —title: A Critical Warning: Don’t Let Your Firebox Go Up in Flames!author: [Your Name Here]date: [Insert Date Here]tags: security, WatchGuard, Firebox, vulnerability—
- # 🚨 Critical Update: Google Patches Chrome Zero-Day Exploit!
- # Beware of the Groundbreaking New Ransomware: HybridPetya
Categories
- Android (80)
- Android Apps (74)
- Apache (4)
- Arch (10)
- Bill 'em (2)
- CentOS (20)
- Cisco (2)
- Development (12)
- DevOps (3)
- Dominion Companion (15)
- Fedora (20)
- Good Shepherd Knights of Columbus (2)
- Good Shepherd Online App (2)
- GS Chinese Auction (2)
- Guides (53)
- Hacks (10)
- Harptabs.com (68)
- Harptabs.com Mobile App (26)
- Landscaper Tracker (1)
- Linux (81)
- myCookieFortune.com (3)
- Networking (8)
- News (198)
- Our Apps (58)
- Payup (1)
- PHP IP Logger (6)
- Security (21)
- Time Off Tracker (6)
- Website Loader (1)
- Websites (20)
- Windows (4)
Tags
android apps arch beta Bill 'em block bluetooth bug fix Captcha css dc delete development domain controller dominion companion downloader draft email flash FSMO hard disk harptabs Harptabs.com Harptabs.com Android App inode iptables linux Maintenance mobile mobile app mount pacman password photos PHP IP Logger QR security smartctl special character ssh terminal testing time off tracker update upgradeAds by Google
Join us on Facebook
Category Archives: Guides
Recover FSMO Roles from a dead DC
As a system administrator you work hard to make sure it never happens by having as much redundancy as you can but sooner or later you will lose a domain controller which has a role assigned to it. If you … Continue reading
Add a User to a Linux Group
If you need to add an existing user to a Linux group it is very easy, just run the following command: usermod -a -G <group name> <user name>
RFID Thief v2.0
This is an interesting project that shows you how you can create a long range RFID reader. This is another reason why wireless, no matter how short the range, is insecure. Source: RFID Thief v2.0 – scund00r
Posted in Hacks
Leave a comment
Using iptables to route OpenVPN traffic
To have your vpn traffic be able to reach the internet you just need to add the following iptable rules: iptables -A FORWARD -i tun0 -j ACCEPT iptables -A FORWARD -i tun0 -o eth0 -m state –state RELATED,ESTABLISHED -j ACCEPT iptables -A FORWARD … Continue reading
NTFS permissions for Redirected Folders (or Home Directories) | Off Campus
Source: NTFS permissions for Redirected Folders (or Home Directories) | Off Campus
Posted in Guides
Leave a comment