72.4 F
High Point

SSH Tunneling

SSH Tunneling When you need to access a server/client behind a firewall that doesn't allow port forwarding you can use SSH tunneling to bypass that if an SSH server is running. Pivoting is a sneaky technique that hackers use to access computers, servers, and services behind firewalls. These examples will use OpenSSH. I think most examples don't explain this well...
Docker Compose: WORDPRESS_CONFIG_EXTRA The Docker image for WordPress contains a property called "WORDPRESS_CONFIG_EXTRA", this allows code to be passed directly to the wp-config.php file. This is great because you can fully customize your WordPress wp-config.php file. Queryable Variable for Enabling Debug My normal PHP code will not work: The trick to getting this code to work is escaping the "$" in Docker. This...
Must Haves for the IT Professionals Over the years I've used some really cool devices and services and I find these all to be very useful tools that I personally must own. DeepCool So, I was a hacker party once and my friend was like, "You have to try this.". This product sits beneath your laptop while circulating air and improving the...
Beyond Compare
The Greatest Tool Ever: Beyond Compare If you've never used this tool, prepare to have your life changed. Seriously! This tool makes the incredibly complex and tedious task of comparing two files or two directories of files EASY! No sarcasm here but this tool is beyond awesome. It also comes with an incredibly low sticker price of $60/per user (October...
Lessons Learned from Web Hosting Disaster Recovery I host websites for friends and family and I am responsible for about 15 websites. In an unfortunate event the web host I was using out of Raleigh, NC "crashed". Actually, I don't know what happened but their entire reseller accounts server was blown away and took them 3 days to fully restore....

Force TLS in .NET

Force TLS in .NET Versions before ASP.NET 4.7 default to making outbound connections using TLS 1.0. This is a real problem for security for many reasons. It's now been deprecated with many CVEs. Some of these vulnerabilities make TLS 1.0 vulnerable to man-in-the-middle attacks. A lot of APIs will not accept incoming requests from TLS 1.0 because of this. TLS 1.0...
TypeScript Experimental Decorator Error in Visual Studio/Code I ran into this issue in Visual Studio 2019 while working on a .NET Core/Angular 8 project. It seems like every new component I created displayed an error or a warning for experimental decorators. After doing a bunch of research this issue seems more prominent in Visual Studio Code so I thought I...
Ubiquiti Edgerouter Lite
Upgrading Firmware on a Ubiquiti Edgerouter Lite with SSH The Ubiquiti Edgerouter Lite provides the ability to create a virtual LAN (vLAN) for $129 dollars. This is a quality VPN solution that was highly recommend from someone who owns a data center. Seriously... well worth the money. Upgrading my router from firmware version 1.2 was difficult because there is a bug...
Gutenberg Plugin: Terminal Display Currently building a Gutenberg plugin to display Parrot OS terminal output. Github: https://github.com/mrjamiebowman/Gutenberg-Terminal-Display Parrot Security OS Parrot Security OS ┌───└──╼ $ nmap -sV Terminal Display) PowerShell PS C:Usersuser> nmap -sV Terminal Display) BlackArch Kali
Running Terraform in Docker Locally Here are some quick tips on how to run Terraform locally in Docker. To get started pull the Docker image of Terraform. This image is built on the golang/alpine image. Running a Script There's a couple of things here worth noting. I'm mapping in my scripts using the volume command in Docker. The entry point script executes Terraform...
Software Architect


High Point
clear sky
72.4 ° F
73.7 °
70.1 °
53 %
2 %
79 °
73 °
68 °
69 °
68 °



Random article