I'm not sure which Windows Update causes this issue but it changes the associations for a number of extensions causing quite the problem.  A system restore failed and I was left to hunt for a solution.  Searching around, I found a number of options but nothing solved the problem until I came across the following Powershell one-liner:

Get-AppXPackage | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register "$($_.InstallLocation)\AppXManifest.xml"}

Read more: TwinUI Default App Association

You receive the following error in Joomla:

"Warning

The TinyMCE Editor Plugin has been updated. Currently it uses your existing configuration. By editing the plugin, you can now assign and customise various layouts to specific user groups.

Warning: when editing the plugin, you will lose all your previous settings!"

Read more: Warning: The TinyMCE Editor Plugin has been updated

"Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method."

Read more: CVE-2016-2098 Python POC

While hunting through 15,000 lines of CSS, I wanted to find and replace some text.  I thought it was going to be a simple task but there were numerous references and using 'find next' was getting tedious.  I dropped to a command line and used sed to complete the task.  Sed is a stream editor and the syntax is simple:

Read more: Sed Find and Replace

You have a website, you want to protect it from attacks, and you hide it behind a web application firewall (WAF).  If your site was already public and you move it behind a WAF, bad actors can find your site.  Depending upon which WAF you're using, your site's actual location could also be discovered regardless of whether it was previously public on another server.  And if you're not locking down access to the site exclusively to the WAF, bad actors can attack your site without the protection of the WAF.

Read more: Website Behind the WAF

Nikto is a great tool for scanning web servers for vulnerabilities but if you look at the logs, you can see its footprint:

"Mozilla/5.00 (Nikto/2.1.6) (Evasions:None) (Test:Port Check)"

...which makes it simple to block. To change Nikto's user agent, we open the configuration file found in /etc/nikto.conf

Read more: Nikto User Agent Change