Why is Microsoft attempting to force Windows 10 updates upon the users of Windows 7 and 8?

Why is the giant Microsoft corporation attempting to force Windows 10 updates upon everyone? If it is to use Windows 10 to spy upon the users, then this does not make any sense. They could just include an update for Windows 7 or 8 that would include such telemetry software functionality. I guess they are … Read more

How to get RHS units to garrison buildings in Arma 3.

The simple CBA_fnc_taskDefend function will enable RHS Escalation units to garrison buildings. The Community Base Addons mod is required for this function. Just place this code in the init of each group leader. [this] call CBA_fnc_taskDefend;[this] call CBA_fnc_taskDefend; This is another example. The troops will head towards the marker named ‘hq’ and occupy buildings around … Read more

Best Software to Protect Your PC

I’m sure most everyone has had the following scenario happen once or twice during there lifetime of owning a computer, or an email for that matter. You log-in to your email account to catch up on work, personal emails, etc.  The first email you see is from your mom.  The subject line is a little weird but … Read more

How to install a Windows feature on server 2012 using Powershell.

This Powershell command will install a Windows feature on your Windows 8.1 or server 2012 machine. I am only using the telnet server as an example. PS C:\Users\Administrator> Install-WindowsFeature telnet-server Success Restart Needed Exit Code Feature Result ——- ————– ——— ————– True No Success {Telnet Server} This is how easy it is to install a … Read more

Some very useful networking tricks for Linux/UNIX users.

Get your gateway IP address with curl on the command line. [homer@localhost ~]$ echo $(curl -# http://ipecho.net/plain) ######################################################################## 100.0% 153.107.97.164[homer@localhost ~]$ echo $(curl -# http://ipecho.net/plain) ######################################################################## 100.0% 153.107.97.164 Another way to list the IP addresses of your network interfaces. Using the ip command. [homer@localhost ~]$ ip a | grep inet* inet 127.0.0.1/8 scope host lo … Read more

Australian government considering draconian anti-terrorism data retention laws.

The Australian government is planning to bring in tough new laws to combat home-grown terrorism. This involves Internet Service providers being forced to hold customer data for two years. Prime Minister Tony Abbots new National Security Committee has signed off on the roll-out of controversial mandatory data retention laws which spy agencies claim are “critical” … Read more

Ubuntu installation and setup for beginners. This video and some tips will help you out.

Ubuntu installation is very easy, this video will help out those who are installing Ubuntu for the first time. After installation; re-boot into your new Ubuntu Linux desktop and open the terminal. Those of you using Unity may use the Ctrl-Alt-t keyboard shortcut to open the terminal window. Then type this command to update all … Read more

Amazon web services. The perfect alternative to a locally hosted server solution.

Amazon Web Services is the perfect solution for hosting a server outside your organization. This allows you to create a cloud hosted database server that takes the strain off your local server infrastructure using Microsoft SQL server 2012 or a Linux based solution in a cloud hosted server instance. There is a free trial that … Read more

How to list users on a WordPress website with the Kali Linux distribution and wpscan.

Kali Linux has available to it a Ruby script that may be used to list all users on a WordPress website. Use the command below to scan a website for security vulnerabilties and see if there are any problems with the website. root@kali:~# wpscan –url mywordpresssite.com –enumerate userroot@kali:~# wpscan –url mywordpresssite.com –enumerate user Use this … Read more

Installing Windows HyperV Server 2012 and creating a new VM instance.

HyperV Server is a standalone hypervisor that allows a machine to host server instances without the overhead of a server operating system like Server 2012 R2. Firstly, download the ISO image here: http://care.dlservice.microsoft.com/dl/download/3/4/7/347A95F0-A63C-492F-BE43-F376AE30C9FE/9200.16384.WIN8_RTM.120725-1247_X64FRE_SERVERHYPERCORE_EN-US-HRM_SHV_X64FRE_EN-US_DV5.ISO. 1.6 Gigabytes. Then burn this at a slow speed to a suitable DVDR disk. Boot from the disk and choose to install … Read more

Watchdogs game showcasing more realistic hacking with Linux and SSH; but the crashes spoil this fine game.

The watchdogs game is a new shooter game that uses strategies such as hacking into phones and streetlights to achieve various game strategies. The intro shows a reverse SSH tunnel and various Linux hacking tools that the protagonist and his friends use against the enemies. This is rather common in modern films as well, Dredd … Read more

Windows XP still used around the world despite the security risks.

Windows XP, the venerable and trusty Windows operating system from Microsoft is still in use around the world. Despite the fact that Munich has switched their computers to the Linux operating system, Windows XP still has a foothold. My local library still runs Windows XP Professional SP3. This is dated 2002 and is obviously quite … Read more

Very useful Powershell commands available in Powershell 4.0.

Some very useful Powershell 4.0 cmdlets that are now available. Get-FileHash this gets the SHA256 hash of a file. PS C:\Users\Homer\Desktop> Get-FileHash .\scammers.png   Algorithm Hash Path ——— —- —- SHA256 92E09BFBBAD2DF6E3FD329CB4AE5F15231AA12B869327706854F7DF9D106971B C:\Users\Homer\Desktop\scammers.pngPS C:\Users\Homer\Desktop> Get-FileHash .\scammers.png Algorithm Hash Path ——— —- —- SHA256 92E09BFBBAD2DF6E3FD329CB4AE5F15231AA12B869327706854F7DF9D106971B C:\Users\Homer\Desktop\scammers.png Save-Help This will download help content from a remote server … Read more