How to mount cifs file systems in Linux

Step by step guide on mount file systems in Linux distributions File systems hosted on other platforms such as Microsoft Windows are accessible on the Linux and Unix platform by simply using the mount command. Mounting The procedure requires elevated privileges and a minimum of read access to the share you are connecting to. -f… Read more »

How to break WPA2 key with Reaver WPS Attack

How to break WPA2 key with Reaver WPS Attack When routers are enabled with WPS (aka Wi-Fi Protected) they are anything but “protected”, the way WPS works is by a eight digit key exchange between device and router. The key exchange is not encrypted and can be “brute forced” exposing the WPA or WPA2 wireless encryption… Read more »

How to fix “inaccessible” virtual machines in VMware ESX

How to fix “inaccessible” virtual machines in VMware ESX Occasionally my storage goes offline, this can put VMware ESXi into a bit of a spin if your VM guests are hosted on the storage that went offline. The guests on the datastore will be greyed out with “(inaccessible)” next to them. There is a quick… Read more »

Cisco “Exit Interface Failed Test” using SDM or CCP

Cisco “Exit Interface Failed Test” using SDM or CCP When doing Cisco connectivity tests, you can stumble upon vague error messages that leave you feeling a little inadequate. I encountered one recently when reconfiguring my Dialer0 outside interface for a DSL connection, it ended up being so simple so I thought I’d share it with… Read more »

How to block telnet and SSH on outside interface on Cisco routers

How to block telnet and SSH on outside interface on Cisco routers By default, a lot of Cisco routers allow Telnet and SSH on the outside interface, this can cause a large security risk of being brute force attacked. Ideally Telnet should be blocked completely as it is an unsecure protocol and SSH should only… Read more »

How to Shrink a Thin VMDK on ESXi 5.x Offline

How to Shrink a Thin VMDK on ESXi 5.x Offline Over time virtual machine guests will grow in size if provisioned as a thin disk due to files being copied or log files being generated, once the files are unallocated (deleted or moved) the vmdk still reserves the location as used thus causing excessive white… Read more »

How to install and configure fail2ban on Linux

How to install and configure fail2ban Reducing your attack area is ideal but in the situations where you need to expose services to the wild, you should reduce the effectiveness of attacks, this is where Fail2Ban comes in handy, it constantly reads logs you specify in the configuration file for multiple user pass attempts, if… Read more »

How to disable root SSH logins

How to disable root SSH logins One of the biggest security holes you could open on your Linux server is to allow directly logging in as root through ssh, because any cracker can attempt to brute force your root password and potentially get access to your system. It’s much better to have separate account that… Read more »

Five Handy & Hidden Windows 7 Features

It happens with most things that come to market, there are usually a hidden secret or other uses for certain products, software is no exception, it’s always been there, you just have to know how to “access” it. God Mode Ever wanted one place that has all your settings for Microsoft Windows 7? To turn… Read more »

Vi Cheatsheet

Quitting 😡 Exit, saving changes :q Exit as long as there have been no changes ZZ Exit and save changes if any have been made :q! Exit and ignore any changes Inserting Text i Insert before cursor I Insert before line a Append after cursor A Append after line o Open a new line after… Read more »