Don't Feed the Technician

Prerequisite not satisfied when trying to install Skype for Business Server 2015 – KB2982006

Posted on

You’re probably reading this post because you recognise this error: “Prerequisite not satisfied: Before you install Skype for Business Server 2015, you must Install an update for Windows Server 2012 R2. For details about the update, see Microsoft Knowledge Base article 2982006, “IIS crashes occasionally when a request is sent to a default document in […]

Don't Feed the Technician

Install and setup Skype for Business Server 2015 – Part 1

Posted on

SQL Server Installation for Skype for Business Server 2015   Extract the SQL iso to a folder using WinZIP or WinRAR. Run SQL Server setup from installation media. Select Installation and click on “New SQL Server stand-alone or add features to an existing installation”   Enter the product key and click on Next. Accept the license […]

Don't Feed the Technician

Migrating Print Server from Windows Server 2008r2 to Windows Server 2016

Posted on

Before you can start the migration process, you must ensure the Print and Document Services role is installed on the destination server. Backup the Source Server  From the new 2016 server you will need to open Print Management console. Open Server Manager, click Tools, and then click Print Management. Right Click Print Management, and select Migrate Printer. Select Export […]

Network Security

TorGhost on Kail

Posted on

TOR is a great service for anonymity. However, if you want to use it in Kali you would have to install the Tor Browser, great for hiding web browsing but not for running exploits or scanning. One tool that shines out for me is TorGhost. With TorGhost running, it will route all the network traffic […]

Network Security

Shut Your Pi-Hole

Posted on

Chances are you will be using a browser like Firefox or Chrome, also more then likely you will have a browser extension for blocking ads. But as more and more use their mobile devices to browse the web at home, don’t you want the same level of protection? or just after a “Gotta Catch Em All” […]

Network Security

Target Specific Word List

Posted on

In this tutorial I will show you the basics on creating a custom wordlist based upon a company’s own website using CeWL. The idea behind using a target specific wordlist as apposed bruit-force or mega long wordlists is TIME. Time is the one thing most people don’t have and the longer you spend attacking a target […]

Network Security

DIY Onion Pi

Posted on

Step-by-step guide to make your own wireless tor router using an old Raspberry Pi. Required materials: Raspberry Pi (I had an old Pi B) SD Card (at least 4 gigabytes) Network cable (<—This long—>) Compatible USB Wifi adapter (I recommend anything with the RT5370 chipset) Micro USB power adapter You won’t be needing a keyboard […]

Network Security

Kali installed, what next?

Posted on

This port will be a part continuation to my Installing Kali on VirtualBox and what things to do once you have just done a basic Kali install.   One of the first thing i would suggest is to install the VirtualBox tools, this will improve your experience 10 fold, not least allowing you to use higher […]