Security
-
Intune
Microsoft Intune – Restrict Copying Corporate Data to USB Device
In this post we will see how can we restrict copying corporate data to USB device in Microsoft Intune. With Microsoft Intune we can do endless things and these are…
Read More » -
Security
Quora Hacked – Hackers Stole up to 100 Million Users Data
You might have heard about the “Quora hacked”. That’s right and Quora is a popular question and answer site. Probably by now some of you might have received the email…
Read More » -
Software
Chrome will consume more RAM due to Spectre Security Fixes
Chrome is one of the popular browser used by millions of users. While there are other browsers in competition, Chrome is still favorite for many. This week Google revealed that…
Read More » -
Security
Secure Windows Systems against Meltdown Spectre CPU Flaws
This week of mine has been very busy in understanding about Meltdown and Spectre vulnerabilities. You should know that Meltdown and Spectre unleash critical vulnerabilities in modern processors. In fact…
Read More » -
Security
Creating Secure Hack Proof Strong Email Password
Creating secure hack proof strong email password is something that I will be covering in this post. I will also share some tips on securing your email accounts with a…
Read More » -
Security
Massive Global Friday Wannacry Ransomware Attack
On Friday, across the globe a massive cyberattack was observed. This attack called as Wannacry Ransomware attack on Friday hit hundreds of thousands of computers across the globe. The attack…
Read More » -
Security
How to reset Windows 7 Administrator Password
In this post we will see how to reset Windows 7 administrator password. As an example I have got a computer installed with Windows 7 professional with SP1 operating system.…
Read More » -
Security
The Reconnaissance phase in network penetration
In this post we will discuss about the Reconnaissance phase in network penetration. Reconnaissance means you gain information about computers or networks. This is a initial steps before exploiting the…
Read More » -
SCCM
How to Deploy Microsoft LAPS Using SCCM
In this short post we will see how to deploy Microsoft LAPS using SCCM. Microsoft LAPS can be deployed using various methods, one among them is using the Configuration Manager…
Read More » -
Group Policy
How to Configure Group Policy for LAPS
The post details the steps to configure Group Policy for LAPS. This is the third and final post that covers the group policy configuration of LAPS. In this post we…
Read More »
- 1
- 2