Skip to content
Question Defense
Technical answers for technical questions
Question Defense
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact
Linkedin page opens in new windowTwitter page opens in new window
Search:
Search
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact

Blog

You are here:
  1. Home
OWASP Top 10 Vulnerabilities

What Are The OWASP Top 10 Vulnerabilities?

SecurityBy alexOctober 7, 2019Leave a comment

Securing computer applications and software is simply one of the most important stages of planning for development. After all, the level of usage is what determines success, and it reflects the number of active users in the app. There is no way you would refer about safety without referencing OWASP. The acronym OWASP is short…

Details
Improving Wordpress: Security Tips

Improving WordPress: Security Tips

SecurityBy alexOctober 2, 2019Leave a comment

Once you start your WordPress website, you have to pay attention to all security measurements in order to make your website safe for visitors. The below WordPress security tips will assist with the beginning steps to make WordPress more secure. Websites have constant attacks from hackers that try to take some personal data, take over…

Details
MacOS

MacOS Configure Default Mail Client

InsightsBy alexSeptember 30, 2019Leave a comment

On a Mac when you click a link that is a mailto link it will open the default email application, which is the MacOS Apple Mail app or just Mail.app. Many times you might have another email client such as Outlook or Spark, so you will need to change the default mail client to the…

Details
iterm2 Terminal Emulator For MacOS

iTerm2 On OSX – Copy Text In vim On Debian Stretch

InsightsBy alexSeptember 27, 2019Leave a comment

I use iTerm2 in place of the default Terminal on MacOS or OSX. I was working on a project that has some Debian Stretch VM’s in Google Cloud, so I was logged into those VM’s via SSH using iTerm2. On previous operating systems I would SSH into using iTerm2 I had been able to simply…

Details
phpMyAdmin - Block Access Via IP Address

Block phpMyAdmin Access Via IP Address

SecurityBy alexSeptember 26, 2019Leave a comment

I recently launched a WordPress website using Google Cloud’s Click to Deploy for a client and during that process phpMyAdmin is installed. Since this will allow full control of all of your MySQL database data, one thing that should be done immediately is to lock down phpMyAdmin so access is restricted and attackers cannot even…

Details
Tor Browser

Browse Privately Online – Tor vs Brave

SecurityBy September 25, 2019Leave a comment

Ever considered getting better privacy with a browser that’s been designed to shield online browsing sessions from prying eyes? Tor has been around for a long time and is widely considered one of the most popular private browsers out there. But the competing newcomer, Brave, has provided privacy-oriented people with a strong alternative. Both are…

Details
OWASP - DTD Attacks

DTD Attacks or Document Type Declaration Attacks

SecurityBy September 24, 20191 Comment

Some of us, neophytes in security vulnerabilities, underestimate the damage XXE attacks can cause to a system. DoS attacks, sensitive data leaks, or server side forgery requests are only some of the threats that systems with XXE vulnerabilities are exposed to. Before we dive deeper into security aspects and attack types, it is important to…

Details
Belkin WEMO Starter Kit Link Controller and Two A19 LED Bulbs

WEMO Application Not Detecting LED Bulbs

InsightsBy alexJuly 11, 20161 Comment

When I first purchased the Belkin LED Lighting Starter Kit I didn’t have any issues getting the two A19 LED bulbs working with the Belkin WEMO Link Controller. I recently moved and had all sorts of problems getting the WEMO iPhone application to not only configure the WEMO Link Controller but once configured I could…

Details
TokuDB Percona Server for MySQL

TokuDB Google Cloud Install: Starting MySQL… ERROR! The server quit without updating PID file

ErrorsBy alexJanuary 19, 2015Leave a comment

I am fairly new to TokuDB but so far I am impressed with the compression it provides to the data stored within. One of my clients has a ton of data that is constantly growing and thus TokuDB made a lot of sense for the solution that was created. While becoming more familiar with this…

Details
12345…
6789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173
174
Categories
  • Code Snippets
  • Errors
  • Insights
  • Labs
  • Security
Recent Posts
  • What Are The OWASP Top 10 Vulnerabilities? October 7, 2019
  • Improving WordPress: Security Tips October 2, 2019
  • MacOS Configure Default Mail Client September 30, 2019
Question Defense
© 2021 question-defense.com
Go to Top