<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Question Defense</title>
	<atom:link href="http://www.question-defense.com/feed" rel="self" type="application/rss+xml" />
	<link>https://www.question-defense.com</link>
	<description>Technical answers for technical questions</description>
	<lastBuildDate>Mon, 07 Oct 2019 18:34:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.question-defense.com/wp-content/uploads/2017/03/cropped-QDlogo_512x512-32x32.jpg</url>
	<title>Question Defense</title>
	<link>https://www.question-defense.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What Are The OWASP Top 10 Vulnerabilities?</title>
		<link>https://www.question-defense.com/2019/10/07/what-are-the-owasp-top-10-vulnerabilities</link>
					<comments>https://www.question-defense.com/2019/10/07/what-are-the-owasp-top-10-vulnerabilities#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Mon, 07 Oct 2019 18:34:16 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[attacker]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[broken authentication]]></category>
		<category><![CDATA[countermeasures]]></category>
		<category><![CDATA[Cross-Site Scripting]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[default account]]></category>
		<category><![CDATA[exposure]]></category>
		<category><![CDATA[exppsure to sensitive data]]></category>
		<category><![CDATA[graphql]]></category>
		<category><![CDATA[injection]]></category>
		<category><![CDATA[insufficient logging]]></category>
		<category><![CDATA[insufficient monitoring]]></category>
		<category><![CDATA[insufficient registration]]></category>
		<category><![CDATA[json]]></category>
		<category><![CDATA[key management]]></category>
		<category><![CDATA[logging]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[OWASP]]></category>
		<category><![CDATA[owasp top 10]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[response caching]]></category>
		<category><![CDATA[rest]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security errors]]></category>
		<category><![CDATA[sensitive data]]></category>
		<category><![CDATA[unsafe deserialization]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[web application]]></category>
		<category><![CDATA[XML External Entities]]></category>
		<category><![CDATA[xml parser]]></category>
		<category><![CDATA[XSL]]></category>
		<category><![CDATA[XSS]]></category>
		<category><![CDATA[XXE]]></category>
		<guid isPermaLink="false">https://www.question-defense.com/?p=12361</guid>

					<description><![CDATA[<p>Securing computer applications and software is simply one of the most important stages of planning for development. After all, the level of usage is what determines success, and it reflects the number of active users in the app. There is no way you would refer about safety without referencing OWASP. The acronym OWASP is short&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2019/10/07/what-are-the-owasp-top-10-vulnerabilities">What Are The OWASP Top 10 Vulnerabilities?</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2019/10/07/what-are-the-owasp-top-10-vulnerabilities/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Improving WordPress: Security Tips</title>
		<link>https://www.question-defense.com/2019/10/02/improving-wordpress-security-tips</link>
					<comments>https://www.question-defense.com/2019/10/02/improving-wordpress-security-tips#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Wed, 02 Oct 2019 10:02:19 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[.htaccess]]></category>
		<category><![CDATA[hosting]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware scans]]></category>
		<category><![CDATA[nulled themes]]></category>
		<category><![CDATA[security plugin]]></category>
		<category><![CDATA[security tips]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL Certificate]]></category>
		<category><![CDATA[themes]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[WordPress]]></category>
		<category><![CDATA[WordPress plugin]]></category>
		<category><![CDATA[wordpress security]]></category>
		<category><![CDATA[wordpress security tips]]></category>
		<category><![CDATA[wordpress themes]]></category>
		<category><![CDATA[wp-config.php]]></category>
		<guid isPermaLink="false">https://www.question-defense.com/?p=12349</guid>

					<description><![CDATA[<p>Once you start your WordPress website, you have to pay attention to all security measurements in order to make your website safe for visitors. The below WordPress security tips will assist with the beginning steps to make WordPress more secure. Websites have constant attacks from hackers that try to take some personal data, take over&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2019/10/02/improving-wordpress-security-tips">Improving WordPress: Security Tips</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2019/10/02/improving-wordpress-security-tips/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MacOS Configure Default Mail Client</title>
		<link>https://www.question-defense.com/2019/09/30/macos-configure-default-mail-client</link>
					<comments>https://www.question-defense.com/2019/09/30/macos-configure-default-mail-client#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Mon, 30 Sep 2019 17:22:55 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[apple mail]]></category>
		<category><![CDATA[default mail client]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[email application]]></category>
		<category><![CDATA[email client]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[macos]]></category>
		<category><![CDATA[mail]]></category>
		<category><![CDATA[mail application]]></category>
		<category><![CDATA[mail.app]]></category>
		<category><![CDATA[mailto]]></category>
		<category><![CDATA[mojave]]></category>
		<category><![CDATA[OSX]]></category>
		<category><![CDATA[Outlook]]></category>
		<category><![CDATA[preferences]]></category>
		<category><![CDATA[spark]]></category>
		<guid isPermaLink="false">https://www.question-defense.com/?p=12340</guid>

					<description><![CDATA[<p>On a Mac when you click a link that is a mailto link it will open the default email application, which is the MacOS Apple Mail app or just Mail.app. Many times you might have another email client such as Outlook or Spark, so you will need to change the default mail client to the&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2019/09/30/macos-configure-default-mail-client">MacOS Configure Default Mail Client</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2019/09/30/macos-configure-default-mail-client/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>iTerm2 On OSX &#8211; Copy Text In vim On Debian Stretch</title>
		<link>https://www.question-defense.com/2019/09/27/iterm2-on-osx-copy-text-in-vim-on-debian-stretch</link>
					<comments>https://www.question-defense.com/2019/09/27/iterm2-on-osx-copy-text-in-vim-on-debian-stretch#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Fri, 27 Sep 2019 15:48:49 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[.vimrc]]></category>
		<category><![CDATA[clipboard]]></category>
		<category><![CDATA[debian]]></category>
		<category><![CDATA[debian stretch]]></category>
		<category><![CDATA[finder]]></category>
		<category><![CDATA[google cloud]]></category>
		<category><![CDATA[iterm]]></category>
		<category><![CDATA[iterm.app]]></category>
		<category><![CDATA[iterm2]]></category>
		<category><![CDATA[macos]]></category>
		<category><![CDATA[OSX]]></category>
		<category><![CDATA[runtime configuration]]></category>
		<category><![CDATA[SSH]]></category>
		<category><![CDATA[unnamed]]></category>
		<category><![CDATA[vi]]></category>
		<category><![CDATA[vim]]></category>
		<guid isPermaLink="false">https://www.question-defense.com/?p=12329</guid>

					<description><![CDATA[<p>I use iTerm2 in place of the default Terminal on MacOS or OSX. I was working on a project that has some Debian Stretch VM&#8217;s in Google Cloud, so I was logged into those VM&#8217;s via SSH using iTerm2. On previous operating systems I would SSH into using iTerm2 I had been able to simply&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2019/09/27/iterm2-on-osx-copy-text-in-vim-on-debian-stretch">iTerm2 On OSX &#8211; Copy Text In vim On Debian Stretch</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2019/09/27/iterm2-on-osx-copy-text-in-vim-on-debian-stretch/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Block phpMyAdmin Access Via IP Address</title>
		<link>https://www.question-defense.com/2019/09/26/block-phpmyadmin-access-via-ip-address</link>
					<comments>https://www.question-defense.com/2019/09/26/block-phpmyadmin-access-via-ip-address#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Thu, 26 Sep 2019 11:40:19 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[apache web server]]></category>
		<category><![CDATA[click to deploy]]></category>
		<category><![CDATA[google click to deploy]]></category>
		<category><![CDATA[google cloud]]></category>
		<category><![CDATA[ip address]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[phpMyAdmin]]></category>
		<category><![CDATA[phpmyadmin.conf]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">https://www.question-defense.com/?p=12325</guid>

					<description><![CDATA[<p>I recently launched a WordPress website using Google Cloud&#8217;s Click to Deploy for a client and during that process phpMyAdmin is installed. Since this will allow full control of all of your MySQL database data, one thing that should be done immediately is to lock down phpMyAdmin so access is restricted and attackers cannot even&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2019/09/26/block-phpmyadmin-access-via-ip-address">Block phpMyAdmin Access Via IP Address</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2019/09/26/block-phpmyadmin-access-via-ip-address/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Browse Privately Online &#8211; Tor vs Brave</title>
		<link>https://www.question-defense.com/2019/09/25/browse-privately-online-tor-vs-brave</link>
					<comments>https://www.question-defense.com/2019/09/25/browse-privately-online-tor-vs-brave#respond</comments>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 25 Sep 2019 11:56:45 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[ad-tracking]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[brave]]></category>
		<category><![CDATA[brave browser]]></category>
		<category><![CDATA[encrypt]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[HTTPS]]></category>
		<category><![CDATA[incognito]]></category>
		<category><![CDATA[incognito mode]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[macos]]></category>
		<category><![CDATA[NoScript]]></category>
		<category><![CDATA[onion routing]]></category>
		<category><![CDATA[private]]></category>
		<category><![CDATA[private mode]]></category>
		<category><![CDATA[tor]]></category>
		<category><![CDATA[tor browser]]></category>
		<category><![CDATA[whitelist]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">https://www.question-defense.com/?p=12305</guid>

					<description><![CDATA[<p>Ever considered getting better privacy with a browser that’s been designed to shield online browsing sessions from prying eyes? Tor has been around for a long time and is widely considered one of the most popular private browsers out there. But the competing newcomer, Brave, has provided privacy-oriented people with a strong alternative. Both are&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2019/09/25/browse-privately-online-tor-vs-brave">Browse Privately Online &#8211; Tor vs Brave</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2019/09/25/browse-privately-online-tor-vs-brave/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DTD Attacks or Document Type Declaration Attacks</title>
		<link>https://www.question-defense.com/2019/09/24/dtd-attacks-or-document-type-declaration-attacks</link>
					<comments>https://www.question-defense.com/2019/09/24/dtd-attacks-or-document-type-declaration-attacks#comments</comments>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 25 Sep 2019 00:50:30 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[api]]></category>
		<category><![CDATA[asp.net]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[Billions Laugh]]></category>
		<category><![CDATA[Classic XXE]]></category>
		<category><![CDATA[doctype]]></category>
		<category><![CDATA[Document Type Declaration]]></category>
		<category><![CDATA[dos]]></category>
		<category><![CDATA[DTD]]></category>
		<category><![CDATA[External General Entity]]></category>
		<category><![CDATA[External Parameter Entity]]></category>
		<category><![CDATA[host-based authentication]]></category>
		<category><![CDATA[IP Whitelisting]]></category>
		<category><![CDATA[JRE objects]]></category>
		<category><![CDATA[Jython]]></category>
		<category><![CDATA[noNamespaceSchemaLocation]]></category>
		<category><![CDATA[OWASP]]></category>
		<category><![CDATA[Schema Entity]]></category>
		<category><![CDATA[schemaLocation]]></category>
		<category><![CDATA[Server Side Request Forgery]]></category>
		<category><![CDATA[SSRF]]></category>
		<category><![CDATA[Turing Complete Language]]></category>
		<category><![CDATA[UTF-16]]></category>
		<category><![CDATA[UTF-7]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[whitelisting]]></category>
		<category><![CDATA[XInclude]]></category>
		<category><![CDATA[xml]]></category>
		<category><![CDATA[XSLT]]></category>
		<category><![CDATA[XXE]]></category>
		<category><![CDATA[XXE OOB]]></category>
		<category><![CDATA[XXE OOB Attack]]></category>
		<guid isPermaLink="false">https://www.question-defense.com/?p=12258</guid>

					<description><![CDATA[<p>Some of us, neophytes in security vulnerabilities, underestimate the damage XXE attacks can cause to a system. DoS attacks, sensitive data leaks, or server side forgery requests are only some of the threats that systems with XXE vulnerabilities are exposed to. Before we dive deeper into security aspects and attack types, it is important to&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2019/09/24/dtd-attacks-or-document-type-declaration-attacks">DTD Attacks or Document Type Declaration Attacks</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2019/09/24/dtd-attacks-or-document-type-declaration-attacks/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>WEMO Application Not Detecting LED Bulbs</title>
		<link>https://www.question-defense.com/2016/07/11/wemo-application-not-detecting-led-bulbs</link>
					<comments>https://www.question-defense.com/2016/07/11/wemo-application-not-detecting-led-bulbs#comments</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Mon, 11 Jul 2016 22:51:38 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[2.4GHz]]></category>
		<category><![CDATA[5.0GHz]]></category>
		<category><![CDATA[A19]]></category>
		<category><![CDATA[belkin]]></category>
		<category><![CDATA[belkin wemo]]></category>
		<category><![CDATA[belkin wemo link controller]]></category>
		<category><![CDATA[iphone application]]></category>
		<category><![CDATA[led bulb]]></category>
		<category><![CDATA[LED Bulb A19]]></category>
		<category><![CDATA[light bulb]]></category>
		<category><![CDATA[link controller]]></category>
		<category><![CDATA[Remember Wi-Fi Settings]]></category>
		<category><![CDATA[wemo]]></category>
		<category><![CDATA[wemo iphone application]]></category>
		<category><![CDATA[wemo settings]]></category>
		<category><![CDATA[Wi-Fi Settings]]></category>
		<category><![CDATA[wireless network]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10444</guid>

					<description><![CDATA[<p>When I first purchased the Belkin LED Lighting Starter Kit I didn&#8217;t have any issues getting the two A19 LED bulbs working with the Belkin WEMO Link Controller. I recently moved and had all sorts of problems getting the WEMO iPhone application to not only configure the WEMO Link Controller but once configured I could&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2016/07/11/wemo-application-not-detecting-led-bulbs">WEMO Application Not Detecting LED Bulbs</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2016/07/11/wemo-application-not-detecting-led-bulbs/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>TokuDB Google Cloud Install: Starting MySQL&#8230; ERROR! The server quit without updating PID file</title>
		<link>https://www.question-defense.com/2015/01/19/tokudb-google-cloud-install-starting-mysql-error-server-quit-without-updating-pid-file</link>
					<comments>https://www.question-defense.com/2015/01/19/tokudb-google-cloud-install-starting-mysql-error-server-quit-without-updating-pid-file#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Tue, 20 Jan 2015 04:08:25 +0000</pubDate>
				<category><![CDATA[Errors]]></category>
		<category><![CDATA[.err]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[google cloud]]></category>
		<category><![CDATA[instance]]></category>
		<category><![CDATA[kernel]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[PID]]></category>
		<category><![CDATA[service]]></category>
		<category><![CDATA[tokudb]]></category>
		<category><![CDATA[transparent huge pages]]></category>
		<category><![CDATA[transparent_hugepage]]></category>
		<category><![CDATA[VM]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10372</guid>

					<description><![CDATA[<p>I am fairly new to TokuDB but so far I am impressed with the compression it provides to the data stored within. One of my clients has a ton of data that is constantly growing and thus TokuDB made a lot of sense for the solution that was created. While becoming more familiar with this&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2015/01/19/tokudb-google-cloud-install-starting-mysql-error-server-quit-without-updating-pid-file">TokuDB Google Cloud Install: Starting MySQL&#8230; ERROR! The server quit without updating PID file</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2015/01/19/tokudb-google-cloud-install-starting-mysql-error-server-quit-without-updating-pid-file/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Configure NVFax on FreePBX</title>
		<link>https://www.question-defense.com/2014/05/27/configure-nvfax-freepbx</link>
					<comments>https://www.question-defense.com/2014/05/27/configure-nvfax-freepbx#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Wed, 28 May 2014 00:39:16 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[asterisk]]></category>
		<category><![CDATA[destination]]></category>
		<category><![CDATA[DID]]></category>
		<category><![CDATA[fax]]></category>
		<category><![CDATA[fax detection type]]></category>
		<category><![CDATA[fax email]]></category>
		<category><![CDATA[fax extension]]></category>
		<category><![CDATA[freepbx]]></category>
		<category><![CDATA[incoming route]]></category>
		<category><![CDATA[nvfax]]></category>
		<category><![CDATA[pause after answer]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10355</guid>

					<description><![CDATA[<p>Earlier I received a call from a client wanting to know if their VoIP solution would allow them to receive fax calls that would convert a fax to email. After looking at their system the solution was fairly easy since they are running Asterisk with a FreePBX front-end. There are two options with FreePBX when&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2014/05/27/configure-nvfax-freepbx">How to Configure NVFax on FreePBX</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2014/05/27/configure-nvfax-freepbx/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>TextMate Find &#038; Replace Using Regular Expressions</title>
		<link>https://www.question-defense.com/2014/05/14/textmate-find-and-replace-using-regular-expressions</link>
					<comments>https://www.question-defense.com/2014/05/14/textmate-find-and-replace-using-regular-expressions#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Thu, 15 May 2014 01:59:12 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[alt tag]]></category>
		<category><![CDATA[CSS]]></category>
		<category><![CDATA[find]]></category>
		<category><![CDATA[find & replace]]></category>
		<category><![CDATA[find and replace]]></category>
		<category><![CDATA[HTML]]></category>
		<category><![CDATA[menu]]></category>
		<category><![CDATA[OSX]]></category>
		<category><![CDATA[regular expression]]></category>
		<category><![CDATA[textmate]]></category>
		<category><![CDATA[title tag]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10345</guid>

					<description><![CDATA[<p>While working on a new section of the Question-Defense.com web site that will include articles related to Kali Linux I was creating a menu system that would be similar to the Kali Linux menu system. Once the menu was completed with the necessary content and was visually what I was looking for I needed to&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2014/05/14/textmate-find-and-replace-using-regular-expressions">TextMate Find &#038; Replace Using Regular Expressions</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2014/05/14/textmate-find-and-replace-using-regular-expressions/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CentOS Remove Old Kernels</title>
		<link>https://www.question-defense.com/2014/05/13/centos-remove-old-kernels</link>
					<comments>https://www.question-defense.com/2014/05/13/centos-remove-old-kernels#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Wed, 14 May 2014 03:26:51 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[boot]]></category>
		<category><![CDATA[CentOS]]></category>
		<category><![CDATA[df]]></category>
		<category><![CDATA[disk space]]></category>
		<category><![CDATA[kernel]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[package-cleanup]]></category>
		<category><![CDATA[RPM]]></category>
		<category><![CDATA[yellow dog updater]]></category>
		<category><![CDATA[yum]]></category>
		<category><![CDATA[yum-utils]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10317</guid>

					<description><![CDATA[<p>Tonight when upgrading a CentOS Linux server it was noted by YUM that 15MB more disk space was needed to upgrade grub and the kernel itself. Below are four quick steps to verify what kernels are installed, install yum-utils if it is not installed already, delete previous kernels and set YUM to remove old kernels&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2014/05/13/centos-remove-old-kernels">CentOS Remove Old Kernels</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2014/05/13/centos-remove-old-kernels/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ubuntu apt-get upgrade &#8211; The following packages have been kept back</title>
		<link>https://www.question-defense.com/2013/09/06/ubuntu-apt-get-upgrade-following-packages-kept-back</link>
					<comments>https://www.question-defense.com/2013/09/06/ubuntu-apt-get-upgrade-following-packages-kept-back#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Sat, 07 Sep 2013 03:38:33 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[12.04]]></category>
		<category><![CDATA[apt-get]]></category>
		<category><![CDATA[aptitude]]></category>
		<category><![CDATA[kernel]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[package]]></category>
		<category><![CDATA[safe-upgrade]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[upgrade]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10291</guid>

					<description><![CDATA[<p>When upgrading packages on Ubuntu using the apt-get upgrade command you may notice that some packages are not upgraded. Ubuntu will not upgrade packages that could have a major impact to service on the server such as the kernel, kernel headers, MySQL packages, and various others. The packages are held back by aptitude as a&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2013/09/06/ubuntu-apt-get-upgrade-following-packages-kept-back">Ubuntu apt-get upgrade &#8211; The following packages have been kept back</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2013/09/06/ubuntu-apt-get-upgrade-following-packages-kept-back/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Update WordPress Amazon Product in a Post Plugin 2.X to Amazon Product in a Post Plugin 3.X</title>
		<link>https://www.question-defense.com/2013/09/05/update-wordpress-amazon-product-in-a-post-plugin-2-x-to-amazon-product-in-a-post-plugin-3-x</link>
					<comments>https://www.question-defense.com/2013/09/05/update-wordpress-amazon-product-in-a-post-plugin-2-x-to-amazon-product-in-a-post-plugin-3-x#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Thu, 05 Sep 2013 22:44:24 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[amazon associates]]></category>
		<category><![CDATA[amazon product in a post]]></category>
		<category><![CDATA[amazon product in a post plugin]]></category>
		<category><![CDATA[amazonproduct]]></category>
		<category><![CDATA[amazonproducts]]></category>
		<category><![CDATA[asin]]></category>
		<category><![CDATA[column]]></category>
		<category><![CDATA[database schema]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[plugin]]></category>
		<category><![CDATA[posts]]></category>
		<category><![CDATA[post_content]]></category>
		<category><![CDATA[replace]]></category>
		<category><![CDATA[row]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[shortcode]]></category>
		<category><![CDATA[show tables]]></category>
		<category><![CDATA[sql]]></category>
		<category><![CDATA[syntax]]></category>
		<category><![CDATA[table]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[WordPress]]></category>
		<category><![CDATA[WP]]></category>
		<category><![CDATA[wp_posts]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10284</guid>

					<description><![CDATA[<p>If you use the Amazon Product In A Post Plugin on WordPress you might have either not upgraded yet or decided to not upgrade because the shortcode syntax has changed. You can get around not upgrading by updating the WordPress post content immediately after you upgrade the Amazon Product In A Post Plugin. Below I&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2013/09/05/update-wordpress-amazon-product-in-a-post-plugin-2-x-to-amazon-product-in-a-post-plugin-3-x">Update WordPress Amazon Product in a Post Plugin 2.X to Amazon Product in a Post Plugin 3.X</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2013/09/05/update-wordpress-amazon-product-in-a-post-plugin-2-x-to-amazon-product-in-a-post-plugin-3-x/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>JTR &#8211; John The Ripper Compile Error &#8211; /usr/bin/ld: cannot find -lOpenCL</title>
		<link>https://www.question-defense.com/2013/09/04/jtr-john-the-ripper-compile-error-usrbinld-cannot-find-lopencl</link>
					<comments>https://www.question-defense.com/2013/09/04/jtr-john-the-ripper-compile-error-usrbinld-cannot-find-lopencl#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Wed, 04 Sep 2013 21:36:35 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[1.7.9]]></category>
		<category><![CDATA[12.04]]></category>
		<category><![CDATA[compile]]></category>
		<category><![CDATA[john]]></category>
		<category><![CDATA[john the ripper]]></category>
		<category><![CDATA[jtr]]></category>
		<category><![CDATA[jumbo-7]]></category>
		<category><![CDATA[libOpenCL.so]]></category>
		<category><![CDATA[libOpenCL.so.1]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[opencl]]></category>
		<category><![CDATA[precise pangolin]]></category>
		<category><![CDATA[ubuntu]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10279</guid>

					<description><![CDATA[<p>The article below describes an error received while attempting to compile John The Ripper with GPU support via OpenCL on Ubuntu Linux version 12.04 LTS also known as Precise Pangolin. Many compile errors are related to necessary packages not being installed on Linux though other errors could be related to all sorts of different issues&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2013/09/04/jtr-john-the-ripper-compile-error-usrbinld-cannot-find-lopencl">JTR &#8211; John The Ripper Compile Error &#8211; /usr/bin/ld: cannot find -lOpenCL</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2013/09/04/jtr-john-the-ripper-compile-error-usrbinld-cannot-find-lopencl/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>JTR &#8211; John The Ripper Compile Error &#8211; common-opencl.h:8:19: fatal error: CL/cl.h: No such file or directory</title>
		<link>https://www.question-defense.com/2013/09/03/jtr-john-the-ripper-compile-error-common-opencl-h819-fatal-error-clcl-h-no-such-file-or-directory</link>
					<comments>https://www.question-defense.com/2013/09/03/jtr-john-the-ripper-compile-error-common-opencl-h819-fatal-error-clcl-h-no-such-file-or-directory#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Tue, 03 Sep 2013 21:17:08 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[1.7.9]]></category>
		<category><![CDATA[12.04]]></category>
		<category><![CDATA[apt-file]]></category>
		<category><![CDATA[apt-get]]></category>
		<category><![CDATA[compile]]></category>
		<category><![CDATA[john]]></category>
		<category><![CDATA[john the ripper]]></category>
		<category><![CDATA[jtr]]></category>
		<category><![CDATA[jumbo-7]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[opencl]]></category>
		<category><![CDATA[opencl-headers]]></category>
		<category><![CDATA[precise pangolin]]></category>
		<category><![CDATA[ubuntu]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10275</guid>

					<description><![CDATA[<p>Recently while attempting to get John The Ripper 1.7.9 jumbo-7 working on a Ubuntu 12.04 LTS Linux server with multiple AMD GPU cards in it I ran across an error during the compile process. The error complained about the VL/cl.h file not being installed and thus could not finishing compiling. Below I describe the compile&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2013/09/03/jtr-john-the-ripper-compile-error-common-opencl-h819-fatal-error-clcl-h-no-such-file-or-directory">JTR &#8211; John The Ripper Compile Error &#8211; common-opencl.h:8:19: fatal error: CL/cl.h: No such file or directory</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2013/09/03/jtr-john-the-ripper-compile-error-common-opencl-h819-fatal-error-clcl-h-no-such-file-or-directory/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>JTR &#8211; John The Ripper Compile Error &#8211; sha.h:4:25: fatal error: openssl/sha.h: No such file or directory</title>
		<link>https://www.question-defense.com/2013/09/02/jtr-john-the-ripper-compile-error-sha-h425-fatal-error-opensslsha-h-no-such-file-or-directory</link>
					<comments>https://www.question-defense.com/2013/09/02/jtr-john-the-ripper-compile-error-sha-h425-fatal-error-opensslsha-h-no-such-file-or-directory#respond</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Mon, 02 Sep 2013 20:36:04 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[12.04]]></category>
		<category><![CDATA[apt-file]]></category>
		<category><![CDATA[apt-get]]></category>
		<category><![CDATA[compile]]></category>
		<category><![CDATA[compiler]]></category>
		<category><![CDATA[cuda]]></category>
		<category><![CDATA[john]]></category>
		<category><![CDATA[john the ripper]]></category>
		<category><![CDATA[jtr]]></category>
		<category><![CDATA[libssl-dev]]></category>
		<category><![CDATA[openssl]]></category>
		<category><![CDATA[password cracking]]></category>
		<category><![CDATA[precise pangolin]]></category>
		<category><![CDATA[sha.h]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[ubuntu 12.04 lts]]></category>
		<category><![CDATA[X86-64]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10267</guid>

					<description><![CDATA[<p>Earlier while compiling JTR or John The Ripper password cracker on a new Ubuntu 12.04 LTS server I received a compile error. The error compiling JTR, which is noted in more detail below, pointed to the sha.h file not being found which likely means there is a missing package though I have seen other causes&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2013/09/02/jtr-john-the-ripper-compile-error-sha-h425-fatal-error-opensslsha-h-no-such-file-or-directory">JTR &#8211; John The Ripper Compile Error &#8211; sha.h:4:25: fatal error: openssl/sha.h: No such file or directory</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2013/09/02/jtr-john-the-ripper-compile-error-sha-h425-fatal-error-opensslsha-h-no-such-file-or-directory/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ubuntu 12.04 View Package Version</title>
		<link>https://www.question-defense.com/2013/07/26/ubuntu-12-04-view-package-version</link>
					<comments>https://www.question-defense.com/2013/07/26/ubuntu-12-04-view-package-version#comments</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Fri, 26 Jul 2013 14:28:51 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[12.04]]></category>
		<category><![CDATA[12.10]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[apache2]]></category>
		<category><![CDATA[apt-get]]></category>
		<category><![CDATA[apt-show-versions]]></category>
		<category><![CDATA[backport]]></category>
		<category><![CDATA[install]]></category>
		<category><![CDATA[package]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[version]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10262</guid>

					<description><![CDATA[<p>While working to verify some packages in Ubuntu 12.04 had backport patches installed properly I needed to list installed package versions. To do this you can install a package called apt-show-versions which will allow you to list all installed packages and their versions with ease. This likely works on most Ubuntu versions but was tested&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2013/07/26/ubuntu-12-04-view-package-version">Ubuntu 12.04 View Package Version</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2013/07/26/ubuntu-12-04-view-package-version/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>arping &#8211; Backtrack 5 &#8211; Information Gathering &#8211; Network Analysis &#8211; Identify Live Hosts &#8211; arping</title>
		<link>https://www.question-defense.com/2013/02/05/arping-backtrack-5-information-gathering-network-analysis-identify-live-hosts-arping</link>
					<comments>https://www.question-defense.com/2013/02/05/arping-backtrack-5-information-gathering-network-analysis-identify-live-hosts-arping#comments</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Tue, 05 Feb 2013 09:48:36 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[apple tv]]></category>
		<category><![CDATA[ARP]]></category>
		<category><![CDATA[arp who-has]]></category>
		<category><![CDATA[arping]]></category>
		<category><![CDATA[backtrack]]></category>
		<category><![CDATA[bt5]]></category>
		<category><![CDATA[bt5r3]]></category>
		<category><![CDATA[hostname]]></category>
		<category><![CDATA[ICMP]]></category>
		<category><![CDATA[icmp echo request]]></category>
		<category><![CDATA[icmp echo response]]></category>
		<category><![CDATA[identify live hosts]]></category>
		<category><![CDATA[information gathering]]></category>
		<category><![CDATA[IP]]></category>
		<category><![CDATA[ip address]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[MAC address]]></category>
		<category><![CDATA[microsecond]]></category>
		<category><![CDATA[network analysis]]></category>
		<category><![CDATA[usec]]></category>
		<category><![CDATA[verbose]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10242</guid>

					<description><![CDATA[<p>The arping application is a simple command that will allow you to ping devices by hostname, IP address, or MAC address. The unfortunate part is that most device will not respond to the arp requests, which are directed broadcast ICMP echo requests, though there are some out there that do. I go into more detail&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2013/02/05/arping-backtrack-5-information-gathering-network-analysis-identify-live-hosts-arping">arping &#8211; Backtrack 5 &#8211; Information Gathering &#8211; Network Analysis &#8211; Identify Live Hosts &#8211; arping</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2013/02/05/arping-backtrack-5-information-gathering-network-analysis-identify-live-hosts-arping/feed</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Authenticate Linux To Active Directory On Windows &#8211;  Centrify Express</title>
		<link>https://www.question-defense.com/2013/02/04/authenticate-linux-to-active-directory-on-windows-centrify-express</link>
					<comments>https://www.question-defense.com/2013/02/04/authenticate-linux-to-active-directory-on-windows-centrify-express#comments</comments>
		
		<dc:creator><![CDATA[alex]]></dc:creator>
		<pubDate>Mon, 04 Feb 2013 07:44:20 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[active directory]]></category>
		<category><![CDATA[apt-get]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[centrify]]></category>
		<category><![CDATA[centrify express]]></category>
		<category><![CDATA[centrifydc]]></category>
		<category><![CDATA[chkconfig]]></category>
		<category><![CDATA[computers]]></category>
		<category><![CDATA[dc]]></category>
		<category><![CDATA[domain]]></category>
		<category><![CDATA[domain controller]]></category>
		<category><![CDATA[installer]]></category>
		<category><![CDATA[ldap]]></category>
		<category><![CDATA[likewise-open]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[portmap]]></category>
		<category><![CDATA[SCP]]></category>
		<category><![CDATA[SSH]]></category>
		<category><![CDATA[sshd_config]]></category>
		<category><![CDATA[tar]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[windows domain]]></category>
		<guid isPermaLink="false">http://www.question-defense.com/?p=10237</guid>

					<description><![CDATA[<p>I was working with a coworker today to setup a new Redmine server running on top of Ubunut 12.04 and one of the steps we completed in the process was setting up LDAP authentication in Redmine. Setting up LDAP authentication in Redmine requires the server running Redmine to be joined to the Windows Active Directory&#8230;</p>
<p>The post <a rel="nofollow" href="https://www.question-defense.com/2013/02/04/authenticate-linux-to-active-directory-on-windows-centrify-express">Authenticate Linux To Active Directory On Windows &#8211;  Centrify Express</a> appeared first on <a rel="nofollow" href="https://www.question-defense.com">Question Defense</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.question-defense.com/2013/02/04/authenticate-linux-to-active-directory-on-windows-centrify-express/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
