The Back Room Tech – Serving up the info for back room techs everywhere

How To Set Up a VPN With Cisco

by File in: How-To

The Cisco name is synonymous with networking hardware and telecommunication equipment on a global scale. It is one of the most recognized names behind most enterprise routers and a good […]

How To Encrypt Data In Amazon S3

by File in: How-To

Most data uploaded to the cloud is protected by the standard username and password authentication, and is usually stored in plaintext for easy access and retrieval. However, because some data […]

Creating an SOFS Share on S2D using Virtual Machines

by File in: Virtualization

Hello and welcome to another awesome article. This time we’re going to create a highly-available Windows share by just using virtual machines, without the need for dedicated hardware, SAN or […]

Enable Encryption for Microsoft SQL Server Connections

by File in: How-To

It’s late in the afternoon and I have just received a most interesting task. A client of mine wants to connect to his Microsoft SQL Server over the public network, […]

Using Wireshark to Sniff an SMB transmission

by File in: How-To

Have you ever wondered what is happening under the hood when connecting to a Windows share?  There is one easy way to find out. Use a packet sniffer such as […]

How to Configure IPSec on Windows

by File in: How-To

There are many applications which will implement authentication and encryption of network traffic through a separate third party program. However, the Microsoft operating system can also implement this natively through […]

Best Practices for Signing a Windows PowerShell Script

by File in: Script

There are a lot of benefits of using Windows PowerShell over the more popular Command Prompt. But using PowerShell without digitally signing scripts can leave you vulnerable to attacks. This […]

How to Use the Microsoft Anti-Malware Script Interface

by File in: Script

Hackers are increasing the malware attacks executed in memory. One of the main execution methodologies for in memory attacks is to execute a script directly without ever writing to disk.  […]

How to Create a Local FTP Server from Scratch

by File in: How-To

Windows 10 users can create a personal cloud server that lets them transfer files without limits. In this guide, we’ll show you how to create a local FTP server that […]

An Introduction To The Security Linux Distro “Tails”

by File in: Linux

I recently showed you why you should begin using the Tor browser for any sensitive web browsing. But what if I told you there was an entire operating system based […]