Automation can save employee and customer time through reduced manual action and reduced errors. The less human interaction required the less likely errors are to occur because a reliable repeatable process has been created. Typing commands into a terminal can suffer from misspelling and commands entered in an improper order. Conversely, too much automation can... Continue reading To Ask or Not to Ask?
(Bourne-Again SHell) If you’re looking for root account and operating system tests, and operator input error handling for your bash script, you’ve come to the right place. The example commands I’m using are from an installation script that I created for my company using if and nested if statements. If statements are a type of... Continue reading A Little Bash
This configuration tutorial is for an unroutable single forest domain. Unroutable domains are any top-level domains that cannot be used on the internet such as .local. The scenario is an on-premise Active Directory domain with a Forest Functional Level of Windows Server 20102 R2 that need seamless single-sign-on (SSO) for Microsoft 365 online resources such... Continue reading Seamless SSO Configuration Tutorial Part 1
You can use a cache server for a small to medium-sized business no matter the industry or for whatever you would like. A DNS cache doesn’t have to be high maintenance or a menace to other people and organizations as long as you take certain precautions in the configuration. My reasons for creating a DNS... Continue reading Reduce Web Page Load Times and Improve Privacy Control
For the second installment of our DVWA series, we are going to look at cross-site scripting (XSS) vulnerabilities and how to exploit them in our Damn Vulnerable Web Application. If you missed part one of this series that shows you how to set up DVWA, you can check it out here. What is XSS? Cross-site scripting... Continue reading DVWA Part 2: Exploiting Cross-Site Scripting (XSS) Vulnerabilities