Skip to content
Question Defense
Technical answers for technical questions
Question Defense
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact
Linkedin page opens in new windowTwitter page opens in new window
Search:
Search
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact

Blog

You are here:
  1. Home
Information Security

View iPhone Image Location Data With Photoshop CS5

SecurityBy alexApril 16, 2012Leave a comment

Yesterday I read an article on location data that is included with all images taken on your iPhone. This type of location data, which is also known as Geo Data or GPS Data, is included behind the scenes on all sorts of media that you create on a day to day basis so while I…

Details
Technology Insights

Using RAID On Z68 Motherboard: Asus Z68 Extreme4 Gen3

InsightsBy alexApril 15, 2012Leave a comment

I recently got a new desktop computer that has a Asus Z68 Extreme4 Gen3 motherboard in it and wanted to configure RAID 0 on a couple terabyte hard drives to provide better performance and more space to my primary volume. Initially I didn’t see how to configure the RAID as I am used to an…

Details
Information Security

How To Tell Exactly How Many Spaces A ESSID Includes Using airodump-ng Or Wireshark

SecurityBy alexApril 14, 2012Leave a comment

The other day I had a wireless network packet capture file saved as a .cap file. The ESSID that was displaying via normal aircrack-ng output of the WPA/WPA2 wireless packet capture lead me to believe there was at least one space included in the beginning of the ESSID and likely after the ESSID since it…

Details
Technology Insights

Cannot Extract .EXE From Zip File On Windows 2003

InsightsBy alexApril 13, 2012Leave a comment

Earlier today while working on a client’s server, which happens to be Microsoft Server 2003, I was unable to extract a .exe file from a zip file I had downloaded. After a moment of thinking I remembered that on Windows 2003 Server there is a default security setting that will simply not extract the .exe…

Details
Information Security

Reset Metasploit Pro Web Console Password For msf User

SecurityBy alexApril 12, 20121 Comment

Awhile back I installed a version of Metasploit Pro while juggling a couple other tasks and unfortunately I noted the password in an encrypted text document and forgot the location which in itself was a fail. Regardless of the mistake I made luckily Metasploit Express and Metasploit Pro make it easy enough to change the…

Details
Technology Insights

How To Remove Hard Drives From Displaying On Mac Desktop

InsightsBy alexApril 11, 2012Leave a comment

Tonight I was asked the question of how to remove the hard drive icons from displaying on a Mac desktop. Pretty much anything on a Mac is customizable so removing the hard drive icons from the OSX desktop is not to hard to accomplish. Follow the directions below to remove the Mac hard drive icons…

Details
Technology Errors

wpscan: [ERROR] Install missing ruby gem.LoadError: no such file to load — nokogiri

ErrorsBy alexApril 10, 20124 Comments

It is possible to receive an error after updating wpscan via “svn up” complaining about the nokogiri gem. This might be confusing because likely you already have the nokogiri gem installed on Backtrack Linux however it is likely a simple path issue. To resolve you can issue the below gem install –user-install command as shown…

Details
sbd Kali Linux

sbd : Backtrack 5: Maintaining Access: OS Backdoors: sbd

SecurityBy alexApril 9, 2012Leave a comment

The sbd command is a netcat clone that offers decent encryption, allows for command execution, and will install on Linux or Windows. You are likely aware of netcat and all of the different ways you can use it including reverse shells, port scanning, etc. The sbd command is a great tool for opening up protected…

Details
bulk_extractor - Forensics Tool

bulk_extractor : Backtrack 5: Forensics: Forensics Analysis Tools: bulk-extractor

SecurityBy alexApril 8, 2012Leave a comment

The bulk_extractor tool is one of the tools on Backtrack that a single article is not going to do it a lot of justice but hopefully after reading the below you will be able to see the benefits and understand basic usage of this amazing tool. The bulk_extractor actually reminds me of various tools such…

Details
1
23456789101112131415
…1617181920…
21222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173
174
Brave Browser

Download the privacy focused Brave browser!
Brave Browser

  • Browse 3x Faster!
  • Block Ads & Trackers
  • Get Rewarded For Browsing
Categories
  • Code Snippets
  • Errors
  • Insights
  • Labs
  • Security
Recent Posts
  • What Are The OWASP Top 10 Vulnerabilities? October 7, 2019
  • Improving WordPress: Security Tips October 2, 2019
  • MacOS Configure Default Mail Client September 30, 2019
Pages
  • Backtrack Linux
  • Contact
  • Documentation
  • Tags
  • Tools
Question Defense
© 2019 question-defense.com

>>> Brave Browser Tipping: Support us by downloading, installing and then tipping us with Brave! <<<
Amazon Associate Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Go to Top