October 29, 2024Published by Petros Antakis on October 29, 2024Honeypot Ports techniqueAs many of us know, a common initial step for an external attacker to perform target reconnaissance (where target here is our network from the external […]
October 8, 2020Published by Petros Antakis on October 8, 2020How the selection of the tool to be used in a specific problem can lead to glorious success or catastrophic failure
February 5, 2016Published by Chrysostomos Psaroudakis Petros Antakis on February 5, 2016DEFENCO ACRITAS
January 16, 2013Published by Chrysostomos Psaroudakis Petros Antakis on January 16, 2013HOW TO: WD Sharespace RAID 5 Data Recovery and some handy notes on this device.I came up on a Failed Raid5 in a WD SHARESPACE, some time ago. Apparently one the drives had failed (No. 3 in chain, according to […]
February 20, 2011Published by Chrysostomos Psaroudakis Petros Antakis on February 20, 2011Marvel Yukon Ethernet Card connected to 3Com or HP switchIt’s been a long time since we had issues in group policy pushing to clients, running XP, Vista orWindows 7.Those issues were NOT found on all […]
February 20, 2011Published by Chrysostomos Psaroudakis Petros Antakis on February 20, 2011CBL blacklists my Datacenter IPs every day for almost 3 months.There are many times in this job, that I managed not to cry….There are several others that I said….I quit, I can’t stand it no more….but […]