Blog Post

Ring Alarm Home Assistant using MQTT

The process of integrating Ring with Home Assistant is simple using MQTT, but requires more settings and configuration is the ring-mqtt bridge. This uses a MQTT broker to connect your Ring account to Home Assistant. Why Make Use of MQTT? Key advantages of MQTT include: Additionally, you get access to Ring’s raw MQTT data topics, […]

Read Full Article

Vaultwarden Attachments not Downloading

Vaultwarden is a great application for storing accounts, passwords, attachments and other items safely. Ther is a particular feature in Vaultwarden to store any file types as a attachment to an account you are saving within your vault. I recently had a client that was using a hosted docker of Vaultwarden. They mentioned that they […]

Read Full Article

Automate Organizational Charts

Short Description: Automate a dynamic, interactive web-based visualization library, that helps with visualizing hierarchical data within SharePoint or Confluence by utilizing some code and an existing CSV file. Detailed Description: This is a highly customizable d3 org chart. Integrations available for Angular, React, Vue. The chart can be implemented in many online workspaces that allow […]

Read Full Article

Nextcloud Files Not Showing or not Indexing

I have run into this issue many times where I have uploaded data, files, images, etc. into my Nextcloud instance. Other times, I have also recreated my Nextcloud instance due to corruption and then attached my Nextcloud files (all the documents, images, user related data) to the new instance, only to find out that nothing […]

Read Full Article

Linux-Based Access Controls

Access controls used in Linux are no different than those used in Windows.  Linux uses the same permission tier such as Owner, group, and All Other Users to distinguish what user has access to what in a file system.  Use of numerical and alphabetical values help provide specific permissions to group members and other users.  […]

Read Full Article

Injection & Buffer Overflow Attacks

Part 3 – 2: Terms and Definitions for Injection & Buffer Overflow Attacks Term Definition Code Injection Attack Attacker exploits an input validation flaw in software to introduce and execute malicious code SQL Injection Attack Script injection attack against an SQL database to manipulate the backend server data Buffer Overflow Attack Occurs when the volume […]

Read Full Article

Privilege Escalation & Cross-site Scripting

Part 3 – 1: Terms and Definitions for Privilege Escalation & Cross-site Scripting Term Definition Privilege Escalation Attacker gains the rights of a more privileged account Cross-site Scripting Attack Inject client-side scripts into web pages viewed by other users Stored XSS Attack Malicious script is injected directly into a vulnerable web application such as the […]

Read Full Article

“Cybercrime is the greatest threat to every company in the world”

 Ginni Rometty


Cybertek Defense

About

We innovate technology by providing new methods, ideas, and products while also enhancing your IT infrastructure and safeguarding from network attacks.