Whenever I've had the task of personally assisting someone with remediating a compromised web server, I can't help switching into researcher mode. I want to know how the attack has happened, and of course to stop it from happening again, but I'm always intrigued by what the attacker is trying to achieve - and it isn't always … Continue reading How to replace malicious PHP pages with sneaky POST data capture
How-Tos
How to do Windows Backups with Robocopy – Tips & Tricks
I've been using a handy little Microsoft tool for many years now called ROBOCOPY which is a great command line tool for copying large sets of folders and files from one place to another, especially over a network. It has a nifty network-restartabl...
Stealth collection of evidence using WGET
From time to time, I find myself needing to collect evidence against some of the bad guys on the Internet, including numerous scammers and other shady characters who sell fake or malicious software to innocent victims. It is an unbelievably tediou...
LogMeIn via iPhone
The following comes from Wiz, a fellow tech guru friend of mine, in his words:LogMeIn Ignition is a LogMeIn client for the iPhone. There’s a video demo here: https://secure.logmein.com/welcome/iphone/ This app remote controls any PC or MAC that ha...