-
Recent Posts
- Create Compressed, Encrypted Archives with tar + gpg on Linux
- # Beware of the Malware: CISA’s Latest Warning
- —title: A Critical Warning: Don’t Let Your Firebox Go Up in Flames!author: [Your Name Here]date: [Insert Date Here]tags: security, WatchGuard, Firebox, vulnerability—
- # 🚨 Critical Update: Google Patches Chrome Zero-Day Exploit!
- # Beware of the Groundbreaking New Ransomware: HybridPetya
Categories
- Android (80)
- Android Apps (74)
- Apache (4)
- Arch (10)
- Bill 'em (2)
- CentOS (20)
- Cisco (2)
- Development (12)
- DevOps (3)
- Dominion Companion (15)
- Fedora (20)
- Good Shepherd Knights of Columbus (2)
- Good Shepherd Online App (2)
- GS Chinese Auction (2)
- Guides (53)
- Hacks (10)
- Harptabs.com (68)
- Harptabs.com Mobile App (26)
- Landscaper Tracker (1)
- Linux (81)
- myCookieFortune.com (3)
- Networking (8)
- News (198)
- Our Apps (58)
- Payup (1)
- PHP IP Logger (6)
- Security (21)
- Time Off Tracker (6)
- Website Loader (1)
- Websites (20)
- Windows (4)
Tags
android apps arch beta Bill 'em block bluetooth bug fix Captcha css dc delete development domain controller dominion companion downloader draft email flash FSMO hard disk harptabs Harptabs.com Harptabs.com Android App inode iptables linux Maintenance mobile mobile app mount pacman password photos PHP IP Logger QR security smartctl special character ssh terminal testing time off tracker update upgradeAds by Google
Join us on Facebook
Category Archives: Guides
How to fix Window is Not Genuine error | Tech & Filmmaking
If you are seeing a error on your desktop bottom right corner saying “The copy of Windows is not genuine” then that means either you are using the OS Source: How to fix Window is Not Genuine error | Tech … Continue reading
Posted in Hacks
Leave a comment
2 Factor Authentication for SSH
If you are like me you used two factory authentication everywhere that you can. This is a nice tutorial on how to added it to your ssh authentication. https://www.howtoforge.com/tutorial/secure-ssh-with-google-authenticator-on-centos-7/
Posted in Linux
Leave a comment
Practice Hacking
This is a good list of software to practice Hacking with https://www.dionach.com/blog/review-of-purposefully-vulnerable-applications-to-practice-hacking
Posted in Hacks
Leave a comment
See the Contents of Password Fields Easily
When you go to a site that shows a password field, have you ever wondered what was behind those stars? Instead of viewing source and finding that spot in the code you can easily run this piece of javascript in … Continue reading
Posted in Hacks
Leave a comment
How To Patch and Protect Linux Server Against the VENOM Vulnerability
http://www.cyberciti.biz/faq/cve-2015-3456-patch-venom-on-debian-ubuntu-fedora-centos-rhel-linux/
Posted in Linux
Leave a comment