Hey Guys ! I am so sorry its been so long since I have posted life gets in the way sometimes. I hope to be back with a regular schedule soon!!. I have been asked before to create a video on how to use the Threshold plugin for Cacti I created this in depth video […]
Enabling 2 factor security on your server via SSH is a great way to add a extra step of protection for your server this is very easy to setup First install the google authenticator library on your Ubuntu server sudo apt-get update sudo apt-get install libpam-google-authenticator next we will add the following line to
Hey All see below on how to monitor Bandwith traffic with Untangle !
Hello Everyone! Every wondered if you antivirus is working ? Ever wanted to test the real-time protection of your antivirus and its effectiveness of threat detection ? Well there is a free online resource you can use to download different types if files such as .zip files .com or .html file that should set off
Hello all, Here is a little snippet of information on the importance of applying an access list to your edge router to IP blocks that are listed on the bogon list What is the bogon list? The bogon list is a list of ip subnets that are either invalid non routable ip blocks such as
Hello all, Here is a simple script to automate and explorer the reaver exploit and test your Wi-Fi access points againts reaver The below assumes you have reavers installed ! Please Note: This information and script is for educational purposes only i am not respoisble for any actions taken on your part ! to use