These are my links for 18 Apr 2016 through 22 Apr 2016:
- Alfresco: some useful database queries – Blog dbi services – In my previous post, I talked about the Lifecycle of Alfresco Nodes. You may have noticed that I tried to insert in my explanations some elements that are specific to databases (tables, fields, aso…). These elements are quite essential to prepare a post like this one: more database oriented. I already explained what exactly are the consequences on the database side when a node is removed and I will try in this post to share some useful queries regarding these points but not only! For this post, I used my local Alfresco Community 4.2.c installation with a PostgreSQL database. For your information, it just take 30 minutes to get this test environment ready with the Alfresco’s installer (Windows, Mac or Unix). Of course, use the Database only for your daily administration work is certainly not the best idea but in some cases, it can really be faster and easier to just run some SQL commands at the DB level…
- tweekmonster/tmux2html: :cat2: Render full tmux windows or individual panes as HTML – Render full tmux windows or individual panes as HTML
- Shrinkpdf – A simple wrapper around Ghostscript to shrink PDFs (as in reduce filesize) under Linux. Inspired by some code I found in an OpenOffice Python script (I think). The script feeds a PDF through Ghostscript, which performs lossy recompression by such methods as downsampling the images to 72dpi. The result should be (but not always is) a much smaller file
- Cisco ASA privilege separation for a local user or read only user on ASA | yurisk.info
privilege show level 3 mode exec command running-config username jonghe password Ohsaib1soh privilege 3
- How to create a read only user in Cisco devices | Cisco & Juniper Networking Note Book
Here is the thing, can you believe there is no straight forward way to configure a read only user in Cisco devices. If you know any way to do it please correct me here.
These are my links for 22 Apr 2016 through 23 Apr 2016:
- How to use Powershell in an exploit · rapid7/metasploit-framework Wiki
PowerShell is a scripting language developed by Microsoft. It provides API access to almost everything in a Windows platform, less detectable by countermeasures, easy to learn, therefore it is incredibly powerful for penetration testing during post exploitation, or exploit development for payload execution. Take Metasploit’s windows/smb/psexec_psh.rb module for example: it mimics the psexec utility from SysInternals, the payload is compressed and executed from the command line, which allows it to be somewhat stealthy against antivirus. There’s only less than 30 lines of code in psexec_psh.rb (excluding the metadata that describes what the module is about), because most of the work is done by the Powershell mixin, nothing is easier than that. The command line will automatically attempt to detect the architecture (x86 or x86_64) that it is being run in, as well as the payload architecture that it contains. If there is a mismatch it will spawn the correct PowerShell architecture to inject the payload into, so there is no need to worry about the architecture of the target system.
- HOWTO use geoiplookup – Fail2ban
You may be interested in a quick summary of the countries where the attacks come from. This document explains how to find these information.
- IP Address Details – ipinfo.io – Simple, reliable, and affordable IP geolocation data.
- Cryptocat – Chat with your friends, privately.Cryptocat is free software with a simple mission: everyone should be able to chat with their friends in privacy.Open source. All Cryptocat software is published transparently.
Encrypted by default. Every message is encrypted, always.
Forward secure. Chats can’t be decrypted even if your keys are stolen.
Multiple devices. All devices linked to your account will receive forward secure messages, even when offline.
File sharing. Securely share files with friends.
Group chat. Chat with multiple buddies at once (coming soon).
I’ve received an email from Neil Anderson that point my attention to his free ebook on how to build a free NetApp.
If you’re interesting in a job in enterprise environment, NetAPP is something that you may encounter and it’s worth learning about it anyway.