1IT: PRIMERY IT NEWS, HOWTOS & GUIDES

How To Remove Your Trace After Hacking A System

How To Remove Your Trace After Hacking A System As a hacker, the final stage of exploitation is covering their tracks, which involves wiping all activity and logs so that they can avoid being detected. It’s especially crucial for persistence if the target will be accessed again in the future by the attacker. Step 1 …

How To Unlock Adobe PDF Without Password?

How To Unlock Adobe PDF Without Password? Do you know you can unlock Adobe PDF without password? Yes, you heard right! You can easily open or edit a PDF document with read-only restrictions. In this tutorial, we’ll show you the top 2 efficient ways to unlock secured PDF with ease. Generally, a lot of users …

How to Crack windows and Unix passwords

How to Crack windows and Unix passwords According to Gartner’s research conducted in 2018, weak and stolen credentials contribute to 80% of the cyber breaches in the world. This means that every 4 out of 5 attacks take place owing to weak passwords. The windows passwords are located in the C:\windows\system32\config\SAM whereas the UNIX passwords are stored in /etc/shadow …

Cloudflare Firewall Rules for Securing WordPress

This guide is aimed at security-minded webmasters who run a WordPress site or blog on a Cloudflare-enabled domain. On the free plan, Cloudflare grants five firewall rules that are empty by default. By adding WordPress-specific rules I describe on this page, you can secure your site and block attacks before they even reach your web …

KVM with use of all IPs – The easy way

KVM setup on Ubuntu 10.04 “Lucid Lynx”. Contents There are many role models on this wiki, where you can find out how it is possible to use all IP addresses in a network with KVM virtualized machines. Introduction A problem with that is that this is not about simple manners: for example for KVM_using_all_IPs_from_subnets you …

IPSec Site-to-Site VPN Cisco ASA – Openswan

1. How IPsec VPN Site-to-Site Tunnels Work? 1.1. What Is IPsec? 1.2. What Is Virtual Private Network or VPN? 1.3. What Is a Site? 1.4. How Site-to-Site VPN Works With IP Sec? 2. VPN Parameters 3. Cisco ASA Configurations 4. Openswan 4.1. Installation 4.2. Configuration 4.2.1. Locations 4.2.2. Global Configuration Parameters 4.2.3. Connection Specific Parameters …

Site-to-Site VPN between AWS VPC and Customer Site using Linux

VPN Configuration on AWS VPC VPN Configuration on Local Site Restart the IPSec Service & verify its status on both Sides: Verify the IPSec Tunnel status on both servers Verify the Route Table on both servers route -n Verify that the Traffic is passing through the Tunnel References https://rbgeek.wordpress.com/2014/04/26/site-to-site-vpn-between-aws-vpc-and-customer-site-using-linux/

VPN Site-to-Site Openswan And ASA Cisco

I am going to demonstrate the communication between CentOS 7 Linux distribution and ASA (Adaptive Security Appliances) is straight. We will only need to check the cryptography configuration and that it, the connection is established. 1. Installing Openswan The installation processs is very easy because can be done via yum: After the installation we initiate …