Skip to main content

1 Chronicles 3:6

and Ibhar, and Elishama, and Eliphelet,
1 Chronicles 3:6 from World English Bible.


Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​  - Wordpress (Open Source and Free)  - (Open Source and Free) Commercial Social Networks software  ($299 Stand Alone, $29/mo Cloud)  (run with Joomla, need to know CMS)  (very expensive, $399 for Standard)  (from free to Commercial, I left my networks and they are selling it  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company)  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Using Office365 for your Printer Scan to Email functionality

I've searched the Internet if someone successfully use the Office365 Microsoft Exchange Online without the use of TLS and SMTP Authentication . I found nothing, so I've decided to write this article so other administrators will benefit and save time. Hopefully give me credit of saving their precious time :) Office365 (Microsoft Exchange Online) a cloud based email powered by Microsoft Exchange Server with running latest version. SMTP Authentication and TLS protocol are required for your printer to scan and email the result to your corporate intended recipients. I've tested the SMTP Authentication and TLS settings using Toshiba eStudio printers , and works like a charm. It took a while to configure but it works. See the captured configuration. I enabled SMTP Client with all certificate without CA, the SSL/TLS as STARTTLS (this is the key to make scan to email using Office365 to work). My SMTP Server Address is . Microsoft recommend that you

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. [email protected]:~# nmap -v -p 80  --script http-vuln-cve2010-2861 Starting Nmap 6.47 ( ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning [1 port] Comp