Monthly Archives: May 2021
How to clear all event logs with .bat file for CMD
In this tutorial you will be shown how to clear all event logs with a .bat for CMD. This Bat file will come handy to clear stuck events from the logs or if your event viewer is crashing cause by too much data. Let’s get started. Open notepad or notepad++. Copy the contents blow and…
Configure Attack Defense with TP-Link Omada Controller
In this TP-Link Omada tutorial, you will be shown how to configure attack defense security settings with the TP-Link Omada Controller. Why should we properly configure TP-Link Omada Attack Defense? Attack Defense provides protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. TP-Links Omada Attack Defense can…
Configure Wireless Network with TP-Link Omada Controller
In this tutorial, you will be shown how to configure a Wireless Network with the TP-Link Omada Controller. Let’s get started. Before we start this tutorial is under the impression you already have additional networks created. If you need help with creating new VLAN Networks Click Here. You may want to create a VLAN if it…
Configure VLAN Network with TP-Link Omada Controller
In this tutorial, you will be shown how to configure a new VLAN network using TP-Link Omada Controller. Let’s get started. Log into your cloud controller either using the omada.toplinkcloud.com URL or The IP address assigned to the TP-Link Omada Controller. Once logged in go ahead and expand the menu by sliding your mouse to the left…
Configure Network Segmentation with TP-Link Omada Controller
In this tutorial, you will be shown how to configure network segmentation with the TP-Link Omada Controller. Segmentation is an ideal practice to protect your TP-Link Omada network. What is network segmentation? Network segmentation is, to put it as simply as possible, the practice of dividing a larger computer network into several small subnetworks that…
Lost your iPhone? Someone can use Checkm8 and Checkra1n to jailbreak it.
If you lost your iPhone you should be worried. Someone can hack into it with free software called Checkm8 and Checkra1n to jailbreak it. Essentially they would be able to hack into your phone and by pass any security you have in place. Why should we care about Checkm8? The Checkm8 vulnerability works on 11 generations…
Jetty Vulnerability using Invalid Large TLS Frame causes 100% CPU Usage
This Jetty vulnerability is to be considered as a service availability issue. When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing CPU resources to eventually reach 100% usage. The following packages have been upgraded to a…
Install SSL Certificate Onto A FQDN UniFi Controller
In this tutorial you will be shown how to install SSL Certificate onto a FQDN (fully qualified domain name) UniFi Controller installed on Ubuntu 20.04. [embedyt]https://www.youtube.com/watch?v=sta68NQxZyE&width=425&height=250[/embedyt] Lets Get Started SSH onto your Ubuntu Linux Server Make sure your server is fully up to date with patches. Check and see what type of pre-existing firewall your…
Install UniFi Controller On Ubuntu 20.04 Linode
In this tutorial you will be shown how to install the UniFi Controller software with SSL on Ubuntu 20.04 using a Linode VPS. The current version of UniFi SDN Controller that we will be installing is 6.2.23 Of course new packages will be released and they can be found on there UniFi Software Download Page. The script…
Add SSL Certificate Onto Hestia Control Panel Ubuntu 20.04
In this tutorial you will be shown how to add Let’s Encrypt SSL Certificates onto Hestia Control Panel port 8083 installed on Ubuntu 20.04.