Ubuntu Tutorials

How To Understand Ubuntu CPU Load

It’s really important to know what your Ubuntu CPU load averages mean. The three numbers represent an average over progressively longer periods of time (one, five, and fifteen-minute averages), and the lower the number, the better. The higher the number, the more overloaded your machine is. But what’s an acceptable range? When should you be concerned?

Lets Access The Ubuntu Server’s Processes

In this tutorial we will use the top command on Ubuntu. This is used to show the Linux processes. It provides a dynamic real-time view of the running system. Usually, this command shows the summary information of the system and the list of processes or threads which are currently managed by the Linux Kernel.

As soon as you will run this command it will open an interactive command mode where the top half portion will contain the statistics of processes and resource usage. And Lower half contains a … Read the rest


Review Tripp Lite SMART1500LCD 1500VA Smart UPS Battery Back Up

The Tripp Lite SMART1500LCD 1500VA Smart UPS Battery Back Up can handle up to 900W. The battery backup is a 2u rack unit with a 3 Year Warranty and $250,000 Insurance.

Power outages are common, but they can be scary. You’ve worked hard on your network, and the last thing you want is to lose access to your network. That’s why this device is so awesome. It’s like a tiny battery powered alarm that saves you during power surges. The alarm is loud, so you can’t miss it. 

I have deployed this unit to a few small business clients with wall mount cabinets. It can easily handle:

  • Modem
  • Firewall
  • 48 Port Switch
  • A few other devices

This UPS powers firewalls and switches to make sure VoIP phones continue to work in a power outage. Have had no problems keeping two 24-port switches and a dozen phones up for an hour. Read the rest


New Windows malware strain creeps quietly past your antivirus

Security researchers have discovered a new malware campaign that uses code signing certificates and other techniques to avoid detection by antivirus software. A recent blog post from Elastic Security, the cybersecurity firm, reveals that its researchers discovered a cluster of malicious activity after reviewing its threat prevention telemetry.

Cybercriminals are getting smarter. They have figured out how to use valid digital certificates to sign their malware, so security programs won’t find them. However, this new campaign from Blister is different. The cybercriminals have created a new kind of loader for the malware. It has been named Blister by researchers because it burns like a blister on the skin, but you will never see it until it is too late.

With the help of valid code signing certificates and other counter-detection measures, these cybercriminals have been running this campaign for the past few months.

Blister malware

Cybercriminals have been using a … Read the rest


Can Someone Spy On You Through Your Webcam or Phone Camera?

Are hackers spying on you through your computer camera and phone camera? Yes, it is true. Your webcam or phone camera can be hacked, which means that the hacker can monitor you and potentially steal your personal information. However, there are ways to prevent or identify the hacking of your webcam and phone camera.

What would a hacker do with a device’s camera?

If you see a camera icon at random, when you know none of your trusted apps are running, your device may be hacked. The good news is that modern devices use a light to indicate whenever the camera has been activated. If you see this light even though you know no app is running, it might be time to back up your data and wipe your device clean.

If a hacker infiltrates your device, they’re probably looking for something specific. But usually they’re after big data, rather … Read the rest

UniFi Tutorials

How To Configure Unifi UDM-PRO Security Settings

In this tutorial you will be shown how to configure Unifi’s Network Security Settings so you can properly secure your networks. In this tutorial I will be utilizing a Unifi UDM-Pro.

How To Configure Unifi Controller 7.0.22 UDM-PRO Security Settings

 

Key Knowledge

  • An Intrusion Prevention System (IPS) is a type of engine that identifies malicious traffic by checking the signatures. The signatures contain known traffic patterns or instruction sequences used by malware. This type of signature-based engine can only detect anomalies based on known malicious traffic patterns.
  • An Intrusion Detection System (IDS) is a network security technology originally built for detecting vulnerability exploits against a target application or computer. IDS only listens for issues and alerts you and does not take preventative action.
  • GeoIP Filtering is a technology that can block web traffic from entire countries, can be an effective way to stop hackers from attacking your business. As the
Read the rest

4 Steps to Take If Your Social Security Number Has Been Stolen

Whether your personal information has been subjected to by hacking or you’ve been a victim of identity theft, before you panic, there are steps you can take to minimize the damage.

Security breaches at large corporations are common. In fact, according to the National Cyber Security Alliance, over 143 million Americans have had their information stolen in recent years. Many of these individuals have had their Social Security numbers stolen, which has led to identity theft. These are just a few examples of the many large-scale security breaches that have occurred in recent years.

If your Social Security number were stolen, it could be taken from documents in your mailbox or trash can, or by someone fraudulently posing as a representative of a trusted institution. If you think that your Social Security number has been stolen, here are three things you can do to protect yourself:

 

  1. If you believe your

Read the rest
Windows Tutorials

How to repair Windows Server 2019 installation with DISM

In this tutorial you will learn how to repair Windows Server 2019 installation with DISM. If you’re experiencing problems with your Windows Server 2019 installation, using the DISM /restorehealth can help repair it. DISM is a command-line tool that can scan and fix issues with Windows images, including those used by the Server operating system. This process can be done by following a few simple steps such as opening an elevated command prompt, running the DISM tool, waiting for the process to complete, and restarting your system. 

Remember to always have a backup. Or if it’s a virtual machine at least a snapshot. 

1.Lets get started by Opening up CMD as administrator and running the following:

dism /online /cleanup-image /scanhealth

2. Once /scanhealth is complete, run the following.

dism /online /cleanup-image /checkhealth

3. Now lets mount your Windows Server 2019 ISO as a drive. Take note of your mounted drive … Read the rest

Windows Tutorials

Windows devices can’t connect to RADIUS 802.1X Wifi

There is a known issue with a windows patch that will cause some Windows 10 and 11 devices unable to connect to RADIUS 802.1x Wifi, luckily there is a workaround.  

 

Windows RADIUS Wifi Access Workaround

  1. On your Windows device open search, type Control Panel and open the Control Panel application.


  2.  Once the Control Panel window is open click on [ View network status and tasks ].


  3.  Once your within the Network and Sharing Window locate and click on [ Set up a new connection or network ].


  4.  Now we will click on [ Manually connect to a wireless network ] followed by clicking Next.


  5.  In the Network name field type in your WIFI SSID name. In Security type, click the dropdown and select WPA2-Enterprise. Afterwards click Next.


  6.  You will now be presented with a Successfully added your wifi ssid message. However
Read the rest

An ideal tactic for security training engagement

In this article, we’ll explore the two main approaches to employee engagement: the carrot and the stick. We’ll look at what motivates employees to engage in security awareness training, and how each strategy can positively impact a company’s security program.
 
When businesses get punished for bad security practices, they often try to avoid the punishment in the future. However, punishing a business for bad security is not the best long-term strategy. This is according to the panelists who spoke at CyberRisk Alliance’s InfoSec World conference. They said that when businesses are punished for security breaches, they often try their best not to get caught again. But in the long run, this can actually harm consumers and businesses alike.
 
But, the panelists suggested, companies should not focus on scaring people into thinking that their information will be stolen. Instead, these companies should instill good cyber habits by providing positive reinforcement and
Read the rest

Windows Zero-Day Allows Privileged File Access

A Windows security vulnerability could allow information disclosure and local privilege escalation (LPE), researchers have warned. The issue (CVE-2021-24084) has yet to get an official fix, but there is a way to protect yourself. A micropatch has been rolled out as a stop-gap measure.
 
 
Security researcher Abdelhamid Naceri reported a bug in Microsoft’s Autopilot software last October. Microsoft patched it in April, but it has not yet been released. Naceri recently discovered that CVE-2021-24084 could also be exploited for local privilege escalation. He demonstrates that users can copy files from a chosen location into a Cabinet (.CAB) archive, which they can then open and read.
 
 
The process of exploiting the bug is very similar to the LPE exploitation techniques used in a vulnerability in Windows 10, CVE-2021-36934. This bug affects the Security Accounts Manager (SAM) database, which houses user account credentials and network domain information.
 

Windows 10 Bug Exploitation Details

Read the rest

Stay Informed

Receive instant notifications when new content is released.