Microsoft Warns Log4j Flaw Attacks Remain High

Microsoft has warned that Windows and Azure customers should be on high alert after spotting state-sponsored and cyber-criminal hackers probing systems for a flaw in the Log4j. Microsoft says it spotted attackers using the Log4j flaw through December.

The Apache open source project disclosed on December 9 and will likely take a long time to fix the Log4j flaw. The problem is widespread because the open source project is used in many applications and services.

Microsoft says that this problem is not just in your organization; it’s everywhere. The company has released updates to its security software to help you identify the vulnerability and protect yourself from attackers.

“Exploitation attempts and testing have remained high during the last weeks of December. We have observed many existing attackers adding exploits of these vulnerabilities in their existing malware kits and tactics, from coin miners to hands-on-keyboard attacks,” the Microsoft 365 Defender Threat

Read the rest

Hestia Control Panel with A2 Hosting

In this tutorial you will be shown how to setup a website server using Ubuntu 20.04 and Hestia Control Panel within A2 Hosting. I have made my move from Linode VPS to A2 Hosting VPS to host my website server. 

 

Now the few reasons I have decided to move my Hestia Control Panel over to A2 Hosting was due to a few issues with Linode servers. I had horrible server performance, however they would move me to less nosey shared VPS servers I would continue to suffer after a few hours. I also believe that Linode’s environment may be suffering from many bot crawls and DDOS attacks on their client base. After performing a live move to A2 Hosting and testing it out for a few days I have noticed increased performance. Pages loaded quicker and there has been less noise on the server from bot crawls and DDOS attacks. … Read the rest

VMware Tutorials

Ideal VMware Home Lab Setup

Discover the perfect VMware Home Lab Setup for your virtualization needs. Explore an ideal environment to enhance your skills and test various configurations efficiently. Unlock the power of virtualization at home!”

A great way to learn about VMware technology is by starting a home lab. A home lab will help you learn about technology by providing you with an enjoyable, low-stress way to do so. It will also help you find out the areas of technology you are interested in. In addition, a home lab is practical because you can use it to service your own home.

 

What is a VMware Home Lab?

A VMware Home Lab is a place for experimentation, for testing new ideas, for learning new things about VMware, and for having fun. It is a place outside of the office where you can do personal projects that may lead to professional development. Well, it depends on … Read the rest

Ubuntu Tutorials

How To Understand Ubuntu CPU Load

It’s really important to know what your Ubuntu CPU load averages mean. The three numbers represent an average over progressively longer periods of time (one, five, and fifteen-minute averages), and the lower the number, the better. The higher the number, the more overloaded your machine is. But what’s an acceptable range? When should you be concerned?

Lets Access The Ubuntu Server’s Processes

In this tutorial we will use the top command on Ubuntu. This is used to show the Linux processes. It provides a dynamic real-time view of the running system. Usually, this command shows the summary information of the system and the list of processes or threads which are currently managed by the Linux Kernel.

As soon as you will run this command it will open an interactive command mode where the top half portion will contain the statistics of processes and resource usage. And Lower half contains a … Read the rest


Review Tripp Lite SMART1500LCD 1500VA Smart UPS Battery Back Up

The Tripp Lite SMART1500LCD 1500VA Smart UPS Battery Back Up can handle up to 900W. The battery backup is a 2u rack unit with a 3 Year Warranty and $250,000 Insurance.

Power outages are common, but they can be scary. You’ve worked hard on your network, and the last thing you want is to lose access to your network. That’s why this device is so awesome. It’s like a tiny battery powered alarm that saves you during power surges. The alarm is loud, so you can’t miss it. 

I have deployed this unit to a few small business clients with wall mount cabinets. It can easily handle:

  • Modem
  • Firewall
  • 48 Port Switch
  • A few other devices

This UPS powers firewalls and switches to make sure VoIP phones continue to work in a power outage. Have had no problems keeping two 24-port switches and a dozen phones up for an hour. Read the rest


New Windows malware strain creeps quietly past your antivirus

Security researchers have discovered a new malware campaign that uses code signing certificates and other techniques to avoid detection by antivirus software. A recent blog post from Elastic Security, the cybersecurity firm, reveals that its researchers discovered a cluster of malicious activity after reviewing its threat prevention telemetry.

Cybercriminals are getting smarter. They have figured out how to use valid digital certificates to sign their malware, so security programs won’t find them. However, this new campaign from Blister is different. The cybercriminals have created a new kind of loader for the malware. It has been named Blister by researchers because it burns like a blister on the skin, but you will never see it until it is too late.

With the help of valid code signing certificates and other counter-detection measures, these cybercriminals have been running this campaign for the past few months.

Blister malware

Cybercriminals have been using a … Read the rest


Can Someone Spy On You Through Your Webcam or Phone Camera?

Are hackers spying on you through your computer camera and phone camera? Yes, it is true. Your webcam or phone camera can be hacked, which means that the hacker can monitor you and potentially steal your personal information. However, there are ways to prevent or identify the hacking of your webcam and phone camera.

What would a hacker do with a device’s camera?

If you see a camera icon at random, when you know none of your trusted apps are running, your device may be hacked. The good news is that modern devices use a light to indicate whenever the camera has been activated. If you see this light even though you know no app is running, it might be time to back up your data and wipe your device clean.

If a hacker infiltrates your device, they’re probably looking for something specific. But usually they’re after big data, rather … Read the rest

UniFi Tutorials

How To Configure Unifi UDM-PRO Security Settings

In this tutorial you will be shown how to configure Unifi’s Network Security Settings so you can properly secure your networks. In this tutorial I will be utilizing a Unifi UDM-Pro.

How To Configure Unifi Controller 7.0.22 UDM-PRO Security Settings

 

Key Knowledge

  • An Intrusion Prevention System (IPS) is a type of engine that identifies malicious traffic by checking the signatures. The signatures contain known traffic patterns or instruction sequences used by malware. This type of signature-based engine can only detect anomalies based on known malicious traffic patterns.
  • An Intrusion Detection System (IDS) is a network security technology originally built for detecting vulnerability exploits against a target application or computer. IDS only listens for issues and alerts you and does not take preventative action.
  • GeoIP Filtering is a technology that can block web traffic from entire countries, can be an effective way to stop hackers from attacking your business. As the
Read the rest

4 Steps to Take If Your Social Security Number Has Been Stolen

Whether your personal information has been subjected to by hacking or you’ve been a victim of identity theft, before you panic, there are steps you can take to minimize the damage.

Security breaches at large corporations are common. In fact, according to the National Cyber Security Alliance, over 143 million Americans have had their information stolen in recent years. Many of these individuals have had their Social Security numbers stolen, which has led to identity theft. These are just a few examples of the many large-scale security breaches that have occurred in recent years.

If your Social Security number were stolen, it could be taken from documents in your mailbox or trash can, or by someone fraudulently posing as a representative of a trusted institution. If you think that your Social Security number has been stolen, here are three things you can do to protect yourself:

 

  1. If you believe your

Read the rest
Windows Tutorials

How to repair Windows Server 2019 installation with DISM

In this tutorial you will learn how to repair Windows Server 2019 installation with DISM. If you’re experiencing problems with your Windows Server 2019 installation, using the DISM /restorehealth can help repair it. DISM is a command-line tool that can scan and fix issues with Windows images, including those used by the Server operating system. This process can be done by following a few simple steps such as opening an elevated command prompt, running the DISM tool, waiting for the process to complete, and restarting your system. 

Remember to always have a backup. Or if it’s a virtual machine at least a snapshot. 

1.Lets get started by Opening up CMD as administrator and running the following:

dism /online /cleanup-image /scanhealth

2. Once /scanhealth is complete, run the following.

dism /online /cleanup-image /checkhealth

3. Now lets mount your Windows Server 2019 ISO as a drive. Take note of your mounted drive … Read the rest

Stay Informed

Receive instant notifications when new content is released.