UniFi Tutorials

How to Add Unifi Protect Cameras On A VLAN

In this tutorial you will learn how to configure a VLAN with DHCP on UniFi Controller 7.0 and then add UniFi Protect Cameras to the VLAN.

Task Details

  1. Log into Your UniFi Controller.
  2. Create a virtual network (VLAN).
  3. Identify Camera Ports and apply VLAN.

Task 1: Log Into your UniFi Controller

  1. Open a browser tab and go to the Ubiquiti Account Portal using URL https://unifi.ui.com/
  2. Sign in with your username and password on Ubiquiti Account Portal.
  3. Select your Unifi Controller.

Task 2: Create Virtual Network

  1. Click Settings 

  2. Click Networks 

  3. Once the page loads click on Create New Network.

  4. Name your Network: UniFi Protect.

  5. Uncheck Auto Scale Network.

  6. Change the 3rd octet to any number you like, this will also be used as the VLAN ID.

  7. Scroll down to Advanced Configuration and select Manual.
  8. Change the VLAN ID to 200.
  9. Enable IGMP Snooping for better performance. 
  10. Scroll
Read the rest

Millions Phished On Facebook Messenger

An incredibly dangerous phishing scam has been discovered that takes advantage of Facebook’s messaging system. Millions of Facebook users fell victim to it, and millions more may still be tricked.

There is a phishing scam on Facebook. A recent report says that a huge number of Facebook users have fallen for this scam and given up their passwords. The scam is still happening, and around 10 million users have fallen for the phishing scam.

According to a report published by researchers at PIXM Security, a scam has been targeting Facebook users for months. This cyberattack started last year and increased in September. The researchers believe that millions of Facebook users were exposed each month by the scam. The attack remains active today.

PIXM has allegedly uncovered that the scammer is one person, who is located in Colombia. The reason PIXM believes this is because each message links back to a … Read the rest

Ubuntu Tutorials

How to Upgrade Ubuntu Server 20.04 to Ubuntu 22.04

In this tutorial you will learn how to upgrade your Ubuntu Server 20.04 LTS to Ubuntu Server 22.04 LTS.

Ubuntu 22.04 Dates

Below you can find list of some important dates relating to Ubuntu 22.04 LTS

  • Official Release: April 21, 2022
  • End of Life (end of official support): April 2027
  • Extended Support End of Life (available with subscription): April 2032

What’s New?

Ubuntu 22.04 provides major enhancements, new capabilities, and a number of new software packages such as:

  • PHP 8.1.2
  • OpenSSL 3.0
  • Ruby 3.0
  • Python 3.10.4
  • MySQL 8.0.28
  • PostgreSQL 14.2
  • Linux kernel v5.15.0-25 & MESA 22

For a comprehensive list of all the new features and software packages, check out the release notes.

Prerequisites

  • Make sure to have a minimum of 20GB of available storage.
  • Create a Backup before upgrade!
  • Use Putty to SSH and upgrade.

Lets get started 

1. Lets make sure we have all the installed … Read the rest


Workaround For One-Click 0Day Vulnerability Follina

Microsoft announced its workaround for a zero-day vulnerability that has already been used by hackers. A threat actor already has exploited the vulnerability to target organizations in Russia and Tibet, researchers said. This vulnerability was identified back in April and is dubbed ‘Follina’.

Microsoft’s own tool reported a flaw in the way it handled remote control of its products. The remote-control execution (RCE) flaw, tracked as CVE-2022-3019, is associated with the Microsoft Support Diagnostic Tool (MSDT), which, ironically, itself collects information about bugs in the company’s products and reports to Microsoft Support.

If hackers get into your system, they can install programs, view, change, or delete your data, or create new accounts.

“A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word,” Microsoft explained in its guidance on the Microsoft Security Response Center. “An attacker who successfully exploits

Read the rest

Snake Keylogger Spreads Through Malicious PDFs: A Comprehensive Analysis

Discover how the Snake Keylogger malware spreads through malicious PDFs in a comprehensive analysis of its tactics and evasion techniques.

Introduction

In the ever-evolving landscape of cyber threats, a new campaign has emerged, exploiting unsuspecting victims through a combination of a malicious PDF file and a 22-year-old Office bug. The campaign, discovered by the diligent researchers at HP Wolf Security, showcases the ingenuity of attackers in their relentless pursuit of compromising sensitive information. This article aims to provide a comprehensive analysis of this “unusual” campaign and shed light on the tactics employed by cybercriminals to propagate the Snake Keylogger malware.

The Rise of PDF Malware

Traditionally, malicious email campaigns have relied heavily on Microsoft Office file formats, such as Word and Excel, to conceal and distribute malware. However, the discovery of this campaign demonstrates a shift in tactics, as attackers utilize weaponized PDF documents to infiltrate unsuspecting systems. While PDFs … Read the rest

Microsoft Azure Tutorials

How To Create an Azure Load Balancer – Lab9

In this tutorial you will learn how to create a Load Balancer in Azure. This lab I will walk you through the steps to deploy a load balancer to load balance virtual machine traffic.

What is an Azure Load Balancer?

  • An Azure load balancer provides high availability by distributing incoming traffic among healthy VMs and it works at Layer- 4 of OSI Reference Model using the TCP and UDP protocols to manage transaction traffic based on a simple load balancing algorithm and basic information such as server connections and response times.

Task Details

  1. Log into Azure Portal.
  2. Create a virtual network.
  3. Create NAT gateway.
  4. Create load balancer.
  5. Create 3 virtual machines.
  6. Install IIS.
  7. Test the load balancer.

Task 1: Log into Azure Portal

  1. Open a browser tab and go to the Azure portal using URL https://portal.azure.com.
  2. Sign in with your username and password on azure portal.

Task 2: Create

Read the rest

Azure Fundamentals AZ-900: The Foundation for Cloud Success

Gain the essential knowledge and skills for cloud success with Azure Fundamentals AZ-900. Unlock the potential of Microsoft Azure Foundation.

Introduction

I am happy to announce that I achieved my Microsoft Azure Fundamentals AZ-900 Certification. The AZ-900 for me was an interesting exam. I went in thinking I was going to fail even after putting in 20+ hours of studying. I suppose it’s better to over prepare though. I was hoping to get 55 questions, so it gave me room for more mistakes however they only gave me 35 questions and I was shocked right out of the gate. With all my over studying I was able to breeze through the questions and pass the Microsoft Azure Fundamentals Az-900 with a score of 805. It’s also to remember scores are no big deal a pass is a pass, and you achieved your certification. The most important thing is to schedule … Read the rest

Windows Tutorials

How To Manage OneDrive With Group Policy

In this tutorial you will learn how to manage OneDrive with group policy (GPO). The OneDrive Group Policy objects work by setting registry keys on the computers in your domain. When you enable or disable a setting, the corresponding registry key is updated on computers in your domain.

I will guide you through obtaining the required GPO policies and importing them to Group Policy Management. Afterwards we will go through a simple deployment of OneDrive policies using Group Policy.

Task Details

  1. Install OneDrive Policies
  2. Explain OneDrive Policies
  3. Deploy OneDrive Policies

Task 1: Install OneDrive Policies

  1. You can download the OneDrive GPO Templates From Here.
  2. Locate these two files.
    • OneDrive.adml
    • OneDrive.admx
  3. If you just want to review OneDrive policies in Group Policy Management, you can put these files your local store:

    • Copy ONEDRIVE.ADML to C:\Windows\PolicyDefinitions\en-US
    • Copy ONEDRIVE.ADMX to C:\Windows\PolicyDefinitions\
  4. To use the OneDrive polices on your corporate network, you can put

Read the rest

Increase Your Cyber Security Resilience

Increase Your Cyber Security Resilience because cyberattacks can come from any direction. They can paralyze an entire company.

Introduction

As cyberattacks become more sophisticated, security breaches have become a fact of corporate life. Cyberattacks are accelerating at an alarming rate as hackers and their use of technology, techniques, and procedures become more sophisticated and more cunning.

How can organizations stay ahead of cyber-criminals? Can they? Can they fight back or will they forever be playing catch-up? Is it enough to just use technology or must other approaches be taken?

As the world becomes more and more digital, people are becoming increasingly concerned about cyberattacks. The current security approach is to simply protect against external hacking. But it doesn’t work. To stand resilient against threats, companies must protect against cyberattacks continually and holistically, with enterprise-wide knowledge, skills and judgment.

 

Cyber Security Resilience

Cyber security resilience is about being prepared to protect … Read the rest

Microsoft Azure Tutorials

How To Create Network Security Groups In Azure – Lab8

In this tutorial you will learn how to create Network Security Groups in Azure. This lab will walk you through the steps to deploy a virtual machine and then edit network security groups in azure to allow specific traffic like RDP and HTTP.

What are Azure Network Security Groups (NSGs) ?

  • A network security group contains security rules that allow or deny inbound and outbound network traffic, to and from, several types of Azure resources. You can specify source and destination, port, and protocol for each rule.

Task Details

  1. Log into Azure Portal.
  2. Deploy a virtual machine.
  3. Allow RDP traffic with NSG rules.
  4. Install IIS on virtual machine.
  5. Allow HTTP traffic with NSG rules.
  6. Access the web page with browser.

Task 1: Log into Azure Portal

  1. Open a browser tab and go to the Azure portal using URL https://portal.azure.com.
  2. Sign in with your username and password on azure portal.
Read the rest

Stay Informed

Receive instant notifications when new content is released.