Travis Vendryes

424 Flips | 3 Magazines | 25 Likes | 1 Following | 3 Followers | @traven89 | Keep up with Travis Vendryes on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Travis Vendryes”

DNS-Persist

DNS-Persist is a post-exploitation agent which uses DNS for command and control. The server-side code is in Python and the agent is coded in C++. …

Information Security

Cloud Architecture 201: Why Cloud Security is more than Network, Access, and Identity Management

By: Todd Jobson | Sr. Principal Enterprise Architect; MBA<p><b>Outline :</b><p><b>The foundation of effective "Layered" Cloud Security ? (Network, System/OS,</b> …

How to securely access Unix-based systems from Windows with VNC

Using SSH to tunnel connections to remotely connect to Unix-based servers from Windows computers provides a quick, encrypted way to perform tasks on …

Linux

Edward Snowden's new app turns your old Android device into a stealthy security monitor

If you happen to have an old Android device lying around and a reason to worry about people messing with your business, Edward Snowden has an app for …

The 3 Dividend Stocks You'll Wish You'd Bought 10 Years From Now

Don't wind up saying "could've, would've, should've" with these three stocks.<p>Almost all investors will encounter that sting of regret as they watch …

2017 Smart Home Update

Send MIDI messages faster than ever, right from the command line

Quick! Send a MIDI control change message! Or some obscure parameter!Well, sometimes <i>typing</i> something is the easiest way to do things. And that’s why …

Five Tools for Beginners that Power Up the Command Line

Whether you’re a seasoned veteran or a command line noob, there’s no way you remember every command, manual page, or tooltip. Lucky for you, we have …

Linux

Get this "Linux Command Line Cheat Sheet" eBook, for free

Did you know that there are literally hundreds of Linux commands? Even on a bare-bones Linux server install there are easily over 1,000 different …

10 Windows 7 tips to get the most out of your machine

If you're one of the many business users who has not upgraded their computer to Windows 10, there are still resources to boost your experience. Here …

App for IP Address and CIDR operations

This App provides the custom splunk search commands for IP address operations.<p>E.g:<br>* ip2cidr - returns IP CIDR for given 'ipaddress' & 'ipmask' …

How To: Use Acccheck to Extract Windows Passwords Over Networks

Sometimes you need a password to gain access to an older running Windows system. Maybe it's a machine in your basement you forgot about or a locked …

Error. Page cannot be displayed. Please contact your service provider for more details. (8)

Own Your DNS Data

I honestly think most people simply are unaware of how much personal data they leak on a daily basis as they use their computers. Even if they have …

10 Tips On How to Use Wireshark to Analyze Packets in Your Network

In any packet-switched network, packets represent units of data that are transmitted between computers. It is the responsibility of network engineers …

NetCrunch Network Tools for Windows

NetCrunch Network Tools is a free collection of networking related applications for devices running Microsoft's Windows operating system.The …

A former FBI agent shares 8 qualities the most resilient people share

As an FBI agent, I was assigned investigations where I had no idea how to solve them, but this was my thinking: Drop me in the middle of any squad or any situation, anywhere, anytime.<p>I will not be scared, nor will I give up. If I'm knocked down, I'll drag myself back up and keep at it until I solve …

Self-help

An OSI Model for Cloud

In 1984, after years of having separate thoughts on networking standards, the International Organization for Standardization (ISO) and the International Telegraph and Telephone Consultative Committee (CCITT) jointly published the Open Systems Interconnection Reference Model, more commonly known as …

Cisco Systems

3 Website Hacks to Radically Improve Your Conversion Rates

Is your website getting good traffic but not converting the way you want? Effectively guiding visitors down the conversion funnel is no easy task and …

3 desktop wikis to help organize information

When you think of the word "wiki," examples like MediaWiki or DokuWiki probably come to mind. They're open source, useful, powerful, and flexible. …

Broaden and Deepen Your Network Using This Simple Hack | Inc.com

How often do you see a practice you love and teach taken to a whole other level? Or two or even three?<p>Sometimes practices fit together so well to become so much more than the sum of their parts, you almost can't believe them. But you have to practice and share them.<p>I'll explain and show you how you …

Happiness

How to Retire with Over $4,426,000 By Saving Only $111 Dollars per Paycheck

Here's how you can still get a free Windows 10 upgrade

Microsoft's much-hyped free upgrade offer for Windows 10 ended in 2016, right? Not exactly. The GWX tool may be gone, but all the other upgrade tools …

Software

Secure Anti Forensic Anonymous Operating System: kodachi

Linux Kodachi operating system is based on Debian 8.6 it will provide you with a secure, anti forensic, and anonymous operating system considering …

3 Unexpected Ways Reading Personal Development Books Changed My Life

Open your mind to the opportunities all around you.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>Reading was never something I was interested in while attending school. Nor was it something I thought I would ever do again once I graduated. My choices in life after school seemed to …

Track Wi-Fi Devices In Your Home

How do you audit your home Wi-Fi network? Perhaps you log into your router and have a look at the connected devices. Sometimes you’ll find an …

Wi-Fi

Breaking SSH, VNC, and other passwords with Kali Linux and Hydra

Hydra is a very fast and effective network login cracker. It will help you perform brute force attacks against SSH servers, VNC, and other services. …

Tired Of Waiting For Strong Firefox Sandboxing, Tor Developers Create Their Own

Over the past couple of years, the Tor browser has started to show cracks in its armor as some hackers and law enforcement agencies have learned the …

The Operating Systems Real Hackers Use

Black and gray hat hackers are what most people consider professional despite the morally disputable nature of their operations.<p>Most hackers’ skill …