Using Wireshark to Sniff an SMB transmission

by File in: How-To

Have you ever wondered what is happening under the hood when connecting to a Windows share?  There is one easy way to find out. Use a packet sniffer such as Wireshark. What is Wireshark? Wireshark is a simple to install and easy to use packet capturing tool that is supported on both Windows and Linux. […]

How to Configure IPSec on Windows

by File in: How-To

There are many applications which will implement authentication and encryption of network traffic through a separate third party program. However, the Microsoft operating system can also implement this natively through the configuration of IPSEC. In this article we will look at what IPSEC is and a simple example of implementation.   What is IPSEC? Internet Protocol […]

Best Practices for Signing a Windows PowerShell Script

by File in: Script

There are a lot of benefits of using Windows PowerShell over the more popular Command Prompt. But using PowerShell without digitally signing scripts can leave you vulnerable to attacks. This post will explain the importance of PowerShell script signatures and mention some best practices so your scripts remain secure. What is Windows PowerShell? Windows PowerShell […]

How to Use the Microsoft Anti-Malware Script Interface

by File in: Script

Hackers are increasing the malware attacks executed in memory. One of the main execution methodologies for in memory attacks is to execute a script directly without ever writing to disk.  Traditional anti-virus works by comparing signatures to files on disk. But what do we do when the executing code never touches the disk? Or worse, […]

How to Create a Local FTP Server from Scratch

by File in: How-To

Windows 10 users can create a personal cloud server that lets them transfer files without limits. In this guide, we’ll show you how to create a local FTP server that gives you more control over how you share files. Enable FTP on Windows 10 File transfer protocol or FTP is an old way of transferring […]

An Introduction To The Security Linux Distro “Tails”

by File in: Linux

I recently showed you why you should begin using the Tor browser for any sensitive web browsing. But what if I told you there was an entire operating system based on the Tor network? It’s called Tails and can be run from a USB stick, DVD disk, or virtual machine. You might think that using […]

How to Split a Windows Image File (WIM to SVM)

by File in: Windows

Are you looking to split a Windows image file (WIM) to multiple image (SWM) files, but don’t know where to start? In this tutorial, we’ll walk you through the process and tell you all you need to know about the splitting process. What are WIM files? First off, what is a Windows image file? What […]

Change IP Address in Linux Using Terminal

by File in: Linux

Hello everybody and welcome to another fun article that takes us back to basics in the world of Linux. I know this article might seem too basic, but a lot of people ask me “How do I change my IP address on my Linux box?” all the time. For that, I’ve created this simple to […]

VMware Troubleshooting: Network Drop Issue

by File in: VMWare

Hello fellow VMware admins. Time and time again, we have dealt with strange issues which are really hard to pinpoint. One issue I’ve recently dealt with was very frustrating and had me going deep into troubleshooting, deep into the kernel and what I have found is listed below. However, before we go further in the […]

How to Upgrade Microsoft SQL Server the Right Way

by File in: How-To

Hello and welcome to another detailed article on MSSQL. Today I will be touching the subject matter of doing an in-line upgrade of a MSSQL Server from one version to another. For today’s article, we will be upgrading from Microsoft SQL Server 2014 to SQL Server 2017 . As with any upgrade, we should first […]