Robocopy Example to Sync Altered Files/Folders
The following command will copy all contents from drive D: to drive E: If the process is interrupted, the same command makes sure to pick up where the earlier process left off, meaning already copied files won't be transferred again. /COPYALL: copies all files, folders
/E: includes empty folders as ... Read More
/E: includes empty folders as ... Read More
What is PKI and why do we need it? PKI stands for Public Key Infrastructure, that utilizes public and private key asymmetric encryption to create an encrypted channel between two parties through a public medium. Let’s see what we mean ... Read More
Modify the Limits If you get the following error message, saying the max upload filesize in php.ini is too small, you simply need to edit the php.ini file, increasing the required values as seen below. Note that both 1 ... Read More
You might have been wondering: do I really need to type in my long password every time I SSH into a remote server, possibly making a typo and starting the password all over again without seeing any feedback on the ... Read More
Making the PowerShell connection to the remote Exchange Online Office365 servers and connecting to an on premises server that is local to the organization are slightly different. Connect to Office365 Connecting to Office365 consists of three different, separate connections. One ... Read More
To see how to deploy a WordPress site from scratch please check out this previous article where we went through the process step by step. In this article we set up automatic HTTPS, that means all the HTTP requests are ... Read More
In this tutorial we will deploy a WordPress site for http://protectigate.com We assume that a web server is already ready for us. If you don’t have one you can check the installation process for Debian (like Ubuntu) and RHEL (CentOS) ... Read More
Before You Begin A minimal installation of Debian or Ubuntu linux is the starting point, with network connectivity. L.A.M.P is an acronym, stands for the building elements of a fully working website:
- Linux is probably the most stable and ... Read More
If you desperately need an SSL certificate signed by a publicly trusted CA, and you want it for free, Let’s Encrypt is certainly an option. They are valid for 3 months, and even though linux boxes are equipped to request ... Read More
I'm sure you have faced a situation at some point when you needed to RDP in to a client machine but without any luck. That is because the computer must have not had the RDP connections enabled. Even though the ... Read More
To make use of a trunk interface connected to our linux box with a single interface we can configure subinterfaces accessing specific VLAN segments, here we will use Debian and RHEL, assigning two subinterfaces, to each, on will use DHCP ... Read More
I’ve come across a company this week, while sorting the SSL certificate on their RRAS server I noticed that all of their nodes had 192.169.0.0/24 IP addresses assigned in their network. When I asked them about why they were using ... Read More
Recently I came across a situation where a small office needed a direct IPSec tunnel between two offices temporarily, but they only had a router from their ISP which was not configurable, or at least not by them and they ... Read More
Time to time we can face the problem that our storage is running out of space on our Linux box. Now what options do we have? We can attach a new storage to the system and mount it in the ... Read More
Text Mode Many times it is preferable to run the CentOS linux installer in text mode, avoiding the GUI. For instance when using an older machine with less resources or when deploying a VM when console access might be limited, ... Read More
Another interesting topic. First of all, what is an egghunter? You will encounter a scenario sooner or later when you can use a buffer overflow condition to execute your code on a target, but the memory space for that is ... Read More
Hopefully you have read my post about bind shells that covered a lot of basics which is really important to understand how these codes work. However, compared to bind shells reverse shells tend to be much more popular, because of ... Read More