Things to do after installing Kali Linux
With some of the stuff I focus on, I get to build Virtual Machines, Raspberry PI’s and other devices that run Kali Linux. For those […]
With some of the stuff I focus on, I get to build Virtual Machines, Raspberry PI’s and other devices that run Kali Linux. For those […]
So by now you should have had chance to play with (maybe not) the Web Application Firewall that comes with Server 2012 R2. To install […]
The “CARVER Matrix” was developed by the United States special operations forces during the Vietnam War. “CARVER” is an acronym that stands for Criticality, Accessibility, […]
Below is an interesting Infographic from the guys over at “http://www.webhostingbuzz.com“, makes some interesting reading about 15 of the scariest things that have been hacked […]
While out and about working, I get exposed to all kinds of different technologies, which people are using. One such application is an Authentication platform […]
In my opinion the use of passwords is becoming much more complicated than many years ago. With the amount of security breaches over this past […]
A short while ago, I finally got access to the new mail platform (in beta) called “ProtonMail“. As their profile currently states: “ProtonMail is an […]
So in Part 1 we looked at just simply installing the base “Windows Azure Pack“, in this post we will setup the core System Center […]
So a while ago Microsoft released the “Windows Azure Pack“. This pack is for on-premises environments, and provisions various components that are used within the […]
Private WiFi has teamed up with the National Cyber Security Alliance to help us as consumers be safe online when using mobile devices while shopping […]
Last year I posted this, and this year I will do the same. The guys over at Cipherpoint (shout out to Mike Fleck)have published their “State […]
I have been working on an issue with a SharePoint environment and looking through ULS logs, Database logs as well as looking at endless Debug […]
As I was reading through my Twitter feed and came across these infographic’s from Microsoft, about their cloud identity and access management. Download using this […]
I like to “play” with wifi networks, set them up, scan them, break them and also boost them so I can blanket my whole house […]
Mark Russinovich recently gave a TechNet Talk on Cloud Security and Ethical Hacking. Short talk, but great answers to questions that I am sure we […]
As you all know I like to read security posts, blogs, tweets, news and articles from all over the place. I love finding infographics that […]
To help combat emerging threats, Microsoft employs an innovative Assume Breach strategy and leverages highly specialized groups of security experts, known as the Red Team, […]
So not sure if you have all faced this issue before but, really it shouldn’t be an issue. When purchasing an SSL certificate the ideal […]
So for the past few months I have been running a Plex Media Server (@plexapp) in various locations. Firstly I built one using my liquid […]
As you probably all know by now the core Office 365 infrastructure is massive, and made up of many servers farms spanning the globe. There […]
So in the last post that was done a while ago, we looked at the first step in a Penetration test, “RECON“. We started to work […]
I recently read this article and wanted to re-post it here for you to read. http://thycotic.com/community/events/blackhat-2014/
Had to share this so you can all know the options to use to protect your privacy.