What Protocols Does Hydra Work With?

By | Hacking Tutorial

Hydra is a very versatile penetration testing tool that has been successfully used with most modern network security protocols. Some examples include: Cisco Cisco-enable HTTPS-form-get MySQL SSH2 SIP FTP Oracle-listener MSSQL IMAP This is a condensed list of some common protocols that Hydra has been successfully used against in penetration testing and malicious hacking exploits but there are many others…

Read More

Remote Support

By | IT Solutions

Remote Support are IT tools and software that enable an IT technician or a support representative to connect to a remote computer from their consoles via the Internet and work directly on the remote system. Although its main focus is the access to computers located anywhere in the world, the remote support applications also provide features like file transfer, desktop sharing,…

Read More

Microsoft Cluster Server

By | IT Solutions

A failover cluster is a pair or group of Windows servers that work together to make applications and services highly available. The servers in a failover cluster are called nodes. If a node in a cluster fails or becomesunavailable, another node in the same failover cluster starts providing the services that the failed node was offering. This process is called…

Read More

IPSEC

By | Hacking Tutorial

INTRODUCTION Ipsec (IP security) is suite of protocols that provided security ate the network layer. Before entering Specific IPSec, do a few steps back and consider what it means to provide security layer of the network. The layer of the network being able to provide some degree of certainty whether all data carried by all IP datagram were encrypted. This means that whenever a host wants to send a datagram, it should encrypt the data field before sending…

Read More

Mac Domain

By | IT Solutions

  Choose regional setting Select Keyboard To British Do Not turn wifi on Do not transfer information Skip -create Mac account Skip -Mac registration Create user account Set time zone to ‘London-United Kingdom Log in as administrator Close iclou Terminal run command: Sudo /usr/sbin/dseditgroup –o edit –a everyone –t group lpadmin & Sudo scutil –set HostName ‘asset tag’ Reboot System preferences-sharing…

Read More

Manage android From Pc

By | IT Solutions

To manage your android easy from your pc please follow this few steps: Install the application called AirDroid from your computer browser type your android address + the port number Example: http://192.168.1.8:8888 Accept the connection from your tablet You can manage very easy from a web interface your device, you can send message, manage your application, music, photos ecc…., allow…

Read More

Replica Cluster

By | IT Solutions

Hyper-V Replica is a feature that provides a business continuity solution for virtual machines. It allows virtual machines that are running on a Hyper-V host or a Hyper-V failover cluster at a primary site to be replicated to a replica Hyper-V host at a secondary site, (usually across a WAN link). Primary and replicaHyper-V hosts can be part of a…

Read More