Cannot import a server 2008 R2 Virtual Machine on a server 2012 R2 Hyper-V host

If you have created an export of a virtual machine on a windows 2008 R2 server and try to import the export on a windows server 2012 R2 Hyper-V host, you get the following error:   “Hyper-V did not find virtual machines

Read More

RDS Collection error: Unable to configure the RD Sessionhost server Invalid operation

When trying to create a new Remote Desktop Session Collection you receive an error: Unable to configure the RD Sessionhost server servername.domain.local. Invalid operation. The collection it self is created but not completly, some parts are missing, like there is no Desktop

Read More

Reset Administrator Password in Windows Server 2012 R2

Reset Administrator Password in Windows Server 2012 R2 1 – On your Windows Server 2012 R2, boot the server from Windows Server 2012 R2 Boot DVD @ Media… ** Picture here show you if you wrongly key in your password, it will

Read More

wifite – Mass Wifi WEP/WPA Key Cracking Tool

wifite is created to to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision. Features sorts targets by power (in

Read More

Introducing vSphere 6.5

Easy Money 17 Minutes Of Work… Make Money With This TODAY!  Click here  Today, VMware announces vSphere 6.5, the latest version of its industry-leading virtualization platform.  This new release of vSphere features a dramatically simplified experience, comprehensive built-in security, and a universal

Read More

Snort – Free Network Intrusion Detection & Prevention System

Snort is an open-source, lightweight, free network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats. It’s capable of of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching, and

Read More

Gophish – Open-Source Phishing Framework

Gophish is a phishing framework that makes the simulation of real-world phishing attacks very straight forwards. The idea behind gophish is simple – make industry-grade phishing training available to everyone. Features One-click Installation Standalone, portable binary with static assets Point-and-click Phishing Beautiful

Read More

Shortcut Keys for Windows server 2012 and 2012 R2

If you new to Windows server 2012 and 2012 R2 you might find difficulty to run some of the essential tasks like, Run, CMD, and even to shut down and logoff the server, how do we do a basic  server administration work

Read More

SSL Handshake Simple Definition

Simple definition of how the SSL handshake works: The SSL uses asymmetric encryption to privately share the common password to be used later in the communication for symmetric encryption. SSL Handshake: The client initiates the connection and says he wants to connect

Read More

Cyborg Hawk Linux – Penetration Testing Linux Distro

Cyborg Hawk Linux is a Ubuntu (Linux) based Penetration Testing Linux Distro developed and designed for ethical hackers and penetration testers. Cyborg Hawk Distro can be used for network security and assessment and also for digital forensics. It also has various tools

Read More