OS Detection Techniques
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
"A Coronal Mass Ejection has happened and the effects of that are expected to arrive later tomorrow evening" /me downloads skyview augmented reality star map and aurorawatch UK. Now looking…
This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…
Malware detection on Plesk systems using maldet and clamav Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the…
This is a short post on how to factory restore android on chuwi hi10 1) Download and install intel phoneflashtool https://01.org/android-ia/downloads/intel-platform-flash-tool-lite 2) Download the version of android you need from…
Configuring free ssl certs with letsencrypt in centos Using letsencrypt in centos requires a few modifications to your centos before you can run the letsencrypt client. The setup for vhosts…
How to copy a file to multiple locations in linux. cp doesnt let you copy one file to multiple locations; There are a few ways to do this, but the…
This post will show you how to use iptables on centos7. Centos7 has moved its firewall service to firewalld, away from iptables, but if you have been running centos for…
Characteristics of SOA services Granularity Size / Scope of service Encapsulation Separation of interface form implementation Modularity Business processes can be decomposed into services which can be decomposed into smaller…