Tuesday, January 25, 2022
Configuring certificates for the Netcool email probe when using Office365
›
Background If your company uses Office365 for email, and you need to use the Netcool Email Probe, you will have to configure a KeyStore dat...
Friday, January 7, 2022
10 Things to Avoid Doing in MS Excel and Their Alternatives
›
Microsoft Excel is an amazingly powerful tool that has more capabilities than most people can imagine. Today I ran across this video that c...
Tuesday, December 28, 2021
The best video I've ever seen for learning Regular Expressions
›
I've worked with regular expressions for a long time now, and I'm always working on getting better at them. I ran across this 20-min...
Monday, December 20, 2021
The Zero-click exploit that Google researchers say is 'the most technically sophisticated exploit ever seen'
›
In contrast to the trivially-exploitable Log4j2 exploit, here's a zero-click exploit from NSO group. Here's an article describing i...
Tuesday, December 14, 2021
Interesting article on the new frontier of botnets identifying C2 servers using "memo" data in blockchain transactions between known wallets
›
The title tells you the gist of the story, but here's the full article: https://gizmodo.com/how-cybercriminals-are-using-bitcoins-block...
Example and video of log4j2 exploit
›
This is a great example of the exploit in action: https://github.com/ilsubyeega/log4j2-exploits Here's the video showing it in action: ...
Monday, December 13, 2021
Quickest log4j2 vulnerability remediation I've found on Linux
›
Quickest Linux fix I've found for the #log4j2 vulnerability: find / -name "log4j-core-*.jar" -exec zip -q -d {} org/apache...
‹
›
Home
View web version