Friday, 27 June 2025
  • Privacy Policy
  • Contact Us
  • My account
    • Checkout
    • Cart
James Eduard
  • Home
  • How To’s
  • Microsoft
    • Microsoft 365
    • Microsoft Defender
    • Microsoft Intune
    • Microsoft Entra
    • Microsoft Sentinel
    • Azure AD
  • Linux
    • CentOS
    • Debian
    • ElementaryOS
    • Fedora
    • Kali Linux
    • FreeBSD
    • Linuxmint
    • Redhat
    • RHEL
    • Open Suse
    • Ubuntu
  • MacOS
  • Cloud
    • VMWare
    • Azure
    • AWS
    • Cloudflare
    • DevOps
      • Dynatrace
      • Terraform
      • Docker
  • Security
    • Capture the Flag
      • HackTheBox
    • Hardware Hacking
    • Forensics Tools
    • Hacker Conference
    • InfoSec
    • Exploit

Breaking News

  • RootCON 9 – Hacker Conference [Activities] 10 years ago
  • Facebook CTF is Now Open Source! 9 years ago
  • REMnux – A Linux Toolkit for Reverse-Engineering and Analyzing Malware 10 years ago
  • How to Patch VENOM Vulnerability [CVE-2015-3456] on Linux 10 years ago
  • XSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation 10 years ago
  • Mr. Robot “Our Democracy has been Hacked” – Official Extended Trailer 10 years ago

Security

How to Set Up a Temporary Access Pass in Microsoft Entra ID

How to Set Up a Temporary Access Pass in Microsoft Entra ID

January 23, 2025 0 Comment

In today’s digital landscape, ensuring secure and seamless access to resources is crucial. Microsoft Entra ID offers a feature called…

How to Manage Windows Defender SmartScreen for Unrecognized Apps

How to Manage Windows Defender SmartScreen for Unrecognized Apps

September 2, 2024 0 Comment

Introduction If you’ve ever encountered the message “Windows Defender SmartScreen prevented an unrecognized app from starting,” you’re not alone. This…

TerraGoat – Vulnerable Terraform Infrastructure

TerraGoat – Vulnerable Terraform Infrastructure

February 13, 2022 0 Comment

TerraGoat was built to enable DevSecOps design and implement a sustainable misconfiguration prevention strategy. It can be used to test…

How to Check your Server’s Log Files

November 23, 2021 0 Comment

[vc_row][vc_column][vc_column_text] In this article we’ll guide on you how to check your server’s log files in windows and linux system.…

LDAP Monitor = Monitor creation, deletion and changes to LDAP objects

LDAP Monitor = Monitor creation, deletion and changes to LDAP objects

November 9, 2021 0 Comment

[vc_row][vc_column][vc_column_text] LDAP Monitor Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration! With this…

Firefox Security Toolkit – A tool that transforms Firefox browsers into a penetration testing suite

June 10, 2016 0 Comment

Firefox Security Toolkit is A tool that transforms Firefox browsers into a penetration testing suite. How? It downloads the most…

WPHardening – Fortify the security of any WordPress Installation

September 23, 2015 0 Comment

Installation: Installing WPHardening requires you to execute one console command: $ pip install -r requirements.txt Usage: $ python wphardening.py -h…

How To Encrypt / Decrypt Files in Ubuntu/Debian with Two Commands

July 18, 2014 0 Comment

In this tutz, I will discuss how to easily and quickly encrypt and decrypt files using very simple commands on…

theharvester – Information Gathering

July 2, 2014 0 Comment

TheHarvester – this tools is intended to help Penetration testers in the early stages of the project It’s a really…

ClamAV 0.98.4 has been Released!

June 19, 2014 0 Comment

ClamAV is an open source (GPL) antivirus engine designed for detecting Trojans, viruses, malware and other malicious threats. It is…

Posts pagination

1 2 Next
  • LinkedIn
  • Twitter
  • Facebook
  • RSS Feed

HackTheBox Badge

HTB Badge
Klook.com Klook.com

Recent Posts

  • Introducing Quick Machine Recovery: Microsoft’s Solution to Driver-Induced Blue Screens
  • DevToys: The Ultimate Swiss Army Knife for Developers and Security Analysts
  • How to Renew the Apple MDM Push Certificate
  • How to Create a New Apple ID for MDM – A Step-by-Step Guide
  • How to Install PowerShell on Windows, Linux, and macOS

Categories

  • Azure
  • DevOps
  • Docker
  • How To’s
  • Linux
  • Malware
  • Network Security
  • Powershell
  • Security







Klook.com
Follow on LinkedIn

© Copyright 2011 James Eduard