Sure, we can spoof a MAC Address to something totally random when involved in some... shenanigans... but what if you REALLY wanted to troll someone?

0
0
0
s2sdefault

Unlike many home users, I have an actual firewall protecting my internet connection. And unlike many businesses I've worked with, I want the tightest security possible, not just An-Any-Allow as is so depressingly common. I've managed to do so, but not without a few hiccups along the way. Here are a few of the extra ports and rules I've had to create.

0
0
0
s2sdefault

Several months ago I read a brief article going over some of the primary limitations of WAF which echoed my own personal viewpoint, and far better written than I could reasonably accomplish. While that part was very insightful, the last bit quickly descended into a sales pitch. Since then, I have wanted to reference that article at work, but couldn't really do so since the sale pitch was for a product that wasn't "ours". So I'm just going to poach the content I want, leave out the sales pitch, and credit the source. :D

0
0
0
s2sdefault

For a while now I have been wanting to set up some kind of Kali HackBox. Sure, it's a piece of cake to simply spin up a VM or cloud instance, but lacking hardware powerful enough to run VMs, and budget for Clouds, what is one to do? I have an old laptop here... what would it take to make this a fully remotely accessible HackBox?

0
0
0
s2sdefault

Something happened in your environment, and suddenly you no longer have any contracts or subscriptions to run any of the Sophos software on your purchased Sophos appliance. So the software is useless, but the appliance is otherwise functional and seems to work fine. What else can you install on it? Here's a few lab-tested (by yours truly) options you can consider.

0
0
0
s2sdefault