Android Phones Vulnerable Due To Pulse Secure VPN

Hackers are exploiting existing vulnerabilities in Pulse Secure VPN and Android Phones. The flaw tracked as CVE-2019-1150, has been rated ‘Highly’ critical. This arbitrary read file vulnerability affects multiple versions of Pulse Connect Secure and Pulse Policy Secure. This flaw allows remote attackers to connect via HTTPS to an enterprise network without the requirement of any valid username or password.

Attackers can use the flaw to view logs and files, turn-off multifactor authentication, download arbitrary files and execute malicious code on enterprise networks.

Good News is Pulse Secure has released a security update to address the issue and users are urged to apply the patches immediately to mitigate such attacks.

Read the rest

Your NETFLIX Membership Has Expired Phishing Email

Did you know that your Netflix Membership has expired on Dec 31st 2019? Hackers are using these types of Phishing emails to try and gain access to your account to obtain private information and maybe watch some NETFLIX on your dime.

Some common tip-offs that an email is phony are typos, grammatical mistakes, awkward language, missing words, extra spaces, and other signs that the email was written unprofessionally. Such emails might also ask you to look at an attachment or click a link and then give your personal information on a Web page or in a form. Or the sender’s email address might look suspicious. If you hover over the links you can even see that it would not direct you to legit URL. Here Are A Few Email TIPS 

Read the rest

WordPress 5.3.1 patches four security vulnerabilities

WordPress has pushed out version 5.3.1 patching four security issues.

WordPress versions 5.3 and earlier contain a few vulnerabilities and the WordPress is recommending users that utilize WordPress to download the the latest version. This is a short-cycle maintenance release and soon will be superseded by a full update when version 5.4 is released.

WordPress did not make note of any CVEs, but they did say in a PUBLIC MESSAGE that the vulnerabilities included contained an issue where a unprivileged user could make a post sticky via the REST API; an problem where cross-site scripting (XSS) could be stored in well-crafted links; a stored XSS vulnerability using block editor content and the fix also hardens wp_kses_bad_protocol() to ensure that it is aware of the named colon attribute.

Read the rest
Dell Network Tutorials

Update Firmware On Dell N2024 Switches

These are a few steps on how to Update Firmware On Dell N2024 Switches

  1. Before making any configurations, we will want to make sure that the switches have latest firmware.
  2. Grab the Switch Service Tag and go to the dell website and download the latest firmware.
  3. Since the creation of this article the latest firmware for my Dell N2024 is N2100v6.6.0.13.A03
  4. We will need a USB Thumb Drive and extract the firmware N2000Stdv6.6.0.13.stk and place it into the root of the USB Drive.
  5. We will be updating the switches individually plug in your usb drive to the front of the switch.
  6. Plug in your console cable from the switch to your computer.
  7. Plug in the power cable just to the one switch and it should start booting up
  8. Use Putty to get connected to COM3 through whatever COM number.
  9. Once you see the following we are ready to throw some
Read the rest
Dell Network Tutorials

Restore Dell N2024 or N2048 Switch to factory defaults

To restore the Dell N2024 or N2048 switch to factory defaults you can follow the below procedure:

  1. Manually reboot your switch
  2. While the switch is booting up keep an eye on the bootup screen and find “Dell Networking Boot Options” and select option #2 (Display Boot Menu) within 3 seconds.
  3. On Boot Main Menu, enter choice # 10 for enable password removal.

Dell Networking Boot Options

Select a menu option within 3 seconds or the Operational Code will start automatically…

1 – Start Operational Code

2 – Display Boot Menu

Select Cl , 2) # 2

Boot Main Menu

1 – Start Operational Code
2 – Select Baud Rate
3 – Retrieve Logs
4 – Load New Operational Code
5 – Display Operational Code Details
9 – Reboot
10 – Restore Configuration to Factory Defaults
11 – Activate Backup Image
12 – Start Password Recovery
Enter Read the rest

PowerShell Tutorials

How to Re-Establish Domain Relationship trust using PowerShell

If you are looking for a how to on an easy way to Re-Establish Domain Relationship trust using PowerShell you have come to the right place.

Introduction

In today’s digital age, establishing and maintaining domain relationship trust is crucial for the smooth functioning of various network operations. With the help of PowerShell, a powerful scripting language and automation framework developed by Microsoft, administrators can efficiently manage and restore domain relationship trust. This article will guide you through the process of re-establishing domain relationship trust using PowerShell, providing you with step-by-step instructions and valuable insights.

Why is Domain Relationship Trust Important?

Domain relationship trust forms the foundation of secure and reliable network communication. It allows different domains within a network to establish a trusted connection and share resources seamlessly. When the trust relationship between domains is compromised or broken, it can lead to authentication issues, limited access to shared resources, and … Read the rest

Windows Tutorials

How To Remove Sophos Tamper Protection

In this tutorial you will be shown How To Remove Sophos Tamper Protection from the Sophos Central Endpoint Software on your windows system. This comes handy when you no longer have access to Sophos Central available and you have a device with Sophos Endpoint software installed. 

Follow the magical steps below to obtain freedom from Sophos.

  1. Open up MSConfig.exe
  2. Click Boot tab 
  3. Select checkbox Safe boot with radio minimal selected
  4. Click apply and reboot
  5. Open the command line (Shell) and execute the following commands:

    REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SAVService" /t REG_DWORD /v Start /d 0x00000004 /f

    REG ADD"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sophos MCS Agent" /t REG_DWORD /v Start /d 0x00000004 /f

    REG ADD “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sophos Endpoint Defense\TamperProtection\Config” /t REG_DWORD /v SAVEnabled /d 0 /f

    REG ADD “HKEY_LOCAL_MACHINE\S

Read the rest

Facebook Exposed 267M Users Phone Numbers

Researchers have found a database which exposes the names, phone numbers and Facebook user IDs of 267M of the Facebook users. This database was left unsecured on the web for nearly two weeks before it was removed.

The Data Exposed

In total 267,140,436 records were exposed. Most of the affected users were from the United States. Diachenko says all of them seem to be valid. Each contained:

  • A unique Facebook ID
  • A phone number
  • A full name
  • A timestamp

“A database this big is likely to be used for phishing and spam, particularly via SMS,” according to the Thursday report. “Facebook users should be on the lookout for suspicious text messages. Even if the sender knows your name or some basic information about you, be skeptical of any unsolicited messages.”

Facebook users can make some changes in their profiles from being scraped by strangers by adjusting their account privacy

Read the rest

How To Fix Your Trusted Platform Module Has Malfunctioned

How To Fix Your Trusted Platform Module Has Malfunctioned for Microsoft Outlook 2016 and 2019 and 365. This error effects your outlook login by prompting you for a password or not even displaying the window.

 

How you would go about to fix this Trusted Platform Module Has Malfunctioned error is be doing the following steps:

  1. Close Outlook
  2. Open Regedit
  3. to to following path HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
  4. Create REG_DWORD
  5. Name it: EnableADAL
  6. Make sure the value is: 0
  7. Open Outlook and you should be properly prompted.
Read the rest

Set A New Public Time Server

Here are a few commands to set a new public time server. 

Run CMD in Admin mode and run the following commands.

  1. net stop w32time
  2. w32tm /config /syncfromflags:manual /manualpeerlist:”0.it.pool.ntp.org 1.it.pool.ntp.org 2.it.pool.ntp.org 3.it.pool.ntp.org
  3. net start w32time
  4. tzutil /s “Eastern Standard Time”
  5. w32tm /config /update
  6. w32tm /resync /rediscover
     
Read the rest

Stay Informed

Receive instant notifications when new content is released.