Terms of Use For FixedByVonnie

By proceeding to access fixedByVonnie.com, you expressly acknowledge, and agree to, all of the following:

fixedByVonnie.com is a personal website and blog owned by Security Plus Pro LLC, which is being presented for informational purposes only. The views on this website are solely those of the website owner (and not those of any employer or of any professional associations affiliated with the website owner).  Any views expressed in this website and any information presented on this website, or in any of its blog entries, should not be relied on for any purpose whatsoever other than as the personal opinions of the website owner.  The website owner expressly disclaims any and all liability for any information presented on this site.  The owner of this website and its blog posts shall not be held liable, and shall be held harmless, for any errors or omissions in any information or representations contained in this website, or in any of its blog entries.  The website owner also expressly disclaims any liability for the current or future availability of any such information. The website owner makes no representations as to the accuracy or completeness of any information on this website or which may be found by following any link on this website. The website owner shall not be held liable for any losses, injuries, damages, claims, or causes of action, from the display or use of any information on this website or in any of its blog entries. If you use the information on this website, or on any of its blog entries, you do so solely at your own risk.

Security Archives - fixedByVonnie
Blog Archives

This is the most authentic phishing site I’ve ever seen

There’s a new phishing site proof of concept on the block and I guarantee you it would trick you.  Think I’m kidding? Check this out.

Posted in Apple, Google Chrome, Malware, Mozilla Firefox, Security Tagged with: , , ,

Two ways to respond to the recent CIA and Vault7 Wikileaks exposures

In case you’ve been living in a cave without electricity for a few days, on March 7th, 2017, WikiLeaks leaked a collection of almost 9,000 documents allegedly from the CIA related to a project known as Vault7.  The CIA issued an

Posted in Desktops, Laptops, News, Security, Smartphones, Tablets Tagged with: , , ,

How to become a hacker

The Weekend Penetration Testing Lab Creation Bootcamp

Have you ever wondered how to become a hacker? How are the bad guys breaching organizations and not getting caught?  Okay, maybe you’ve seen some videos online but the truth is the only way you’ll learn how to hack is

Posted in Laptops, Security, Windows, Windows 10, Windows 7, Windows 8 Tagged with: , , ,

Valve ran out of steam this Christmas

In case you didn’t catch today’s news, Steam, an online gaming platform developed by Valve Corporation, suffered an egregious security breach today. Okay, well, technically it wasn’t a security breach, it was a cache control problem, but it sure felt like one

Posted in News Tagged with: ,

Start to finish: Cracking a Windows Server 2012 R2 Administrator account (Part 2 of 2)

In the previous guide I showed you how to steal password hashes from a Windows Server 2012 appliance. We saved the hash to a USB drive and are now sitting at our Kali Linux laptop back home in our basement.

Posted in Windows Tagged with: , ,

Last updated by at .