Scariest Things Hacked Infographic
Below is an interesting Infographic from the guys over at “http://www.webhostingbuzz.com“, makes some interesting reading about 15 of the scariest things that have been hacked […]
Below is an interesting Infographic from the guys over at “http://www.webhostingbuzz.com“, makes some interesting reading about 15 of the scariest things that have been hacked […]
While out and about working, I get exposed to all kinds of different technologies, which people are using. One such application is an Authentication platform […]
In my opinion the use of passwords is becoming much more complicated than many years ago. With the amount of security breaches over this past […]
A short while ago, I finally got access to the new mail platform (in beta) called “ProtonMail“. As their profile currently states: “ProtonMail is an […]
So in Part 1 we looked at just simply installing the base “Windows Azure Pack“, in this post we will setup the core System Center […]
So a while ago Microsoft released the “Windows Azure Pack“. This pack is for on-premises environments, and provisions various components that are used within the […]
Private WiFi has teamed up with the National Cyber Security Alliance to help us as consumers be safe online when using mobile devices while shopping […]
Last year I posted this, and this year I will do the same. The guys over at Cipherpoint (shout out to Mike Fleck)have published their “State […]
I have been working on an issue with a SharePoint environment and looking through ULS logs, Database logs as well as looking at endless Debug […]
As I was reading through my Twitter feed and came across these infographic’s from Microsoft, about their cloud identity and access management. Download using this […]
I like to “play” with wifi networks, set them up, scan them, break them and also boost them so I can blanket my whole house […]
Mark Russinovich recently gave a TechNet Talk on Cloud Security and Ethical Hacking. Short talk, but great answers to questions that I am sure we […]
As you all know I like to read security posts, blogs, tweets, news and articles from all over the place. I love finding infographics that […]
To help combat emerging threats, Microsoft employs an innovative Assume Breach strategy and leverages highly specialized groups of security experts, known as the Red Team, […]
So not sure if you have all faced this issue before but, really it shouldn’t be an issue. When purchasing an SSL certificate the ideal […]
So for the past few months I have been running a Plex Media Server (@plexapp) in various locations. Firstly I built one using my liquid […]
As you probably all know by now the core Office 365 infrastructure is massive, and made up of many servers farms spanning the globe. There […]
So in the last post that was done a while ago, we looked at the first step in a Penetration test, “RECON“. We started to work […]
I recently read this article and wanted to re-post it here for you to read. http://thycotic.com/community/events/blackhat-2014/
Had to share this so you can all know the options to use to protect your privacy.
So as you all should know by now, Data Loss Protection (DLP) was introduced into SharePoint Online earlier this year. This is really just an […]
SharePoint 2013 Hosted Apps – Do they really work? Part 1 SharePoint 2013 Hosted Apps – Do they really work? Part 2 SharePoint 2013 Hosted […]
So in part 1 we looked at some basic concepts of creating a SharePoint 2013 Hosted App. In this post we will continue with our […]
Recently I have spent some time working through building and converting demonstration code across to SharePoint 2013 Apps and have a fun time learning what […]