How To Set Up a VPN With Cisco

by File in: How-To

The Cisco name is synonymous with networking hardware and telecommunication equipment on a global scale. It is one of the most recognized names behind most enterprise routers and a good portion of the internet backbone routers used today. The company also provides the Cisco AnyConnect app, which is used in many colleges and universities as […]

How To Encrypt Data In Amazon S3

by File in: How-To

Most data uploaded to the cloud is protected by the standard username and password authentication, and is usually stored in plaintext for easy access and retrieval. However, because some data can be sensitive and confidential, this level of protection will not be enough against certain threats or to meet certain requirements such as : External […]

Creating an SOFS Share on S2D using Virtual Machines

by File in: Virtualization

Hello and welcome to another awesome article. This time we’re going to create a highly-available Windows share by just using virtual machines, without the need for dedicated hardware, SAN or NAS storage or any special networking requirements. Before we get started on the article let’s see what the use case might be for this type […]

Enable Encryption for Microsoft SQL Server Connections

by File in: How-To

It’s late in the afternoon and I have just received a most interesting task. A client of mine wants to connect to his Microsoft SQL Server over the public network, with no VPN, and he’s asking me how can we best secure this connection. First thing that popped up in my mind is encryption! So […]

Using Wireshark to Sniff an SMB transmission

by File in: How-To

Have you ever wondered what is happening under the hood when connecting to a Windows share?  There is one easy way to find out. Use a packet sniffer such as Wireshark. What is Wireshark? Wireshark is a simple to install and easy to use packet capturing tool that is supported on both Windows and Linux. […]

How to Configure IPSec on Windows

by File in: How-To

There are many applications which will implement authentication and encryption of network traffic through a separate third party program. However, the Microsoft operating system can also implement this natively through the configuration of IPSEC. In this article we will look at what IPSEC is and a simple example of implementation.   What is IPSEC? Internet Protocol […]

Best Practices for Signing a Windows PowerShell Script

by File in: Script

There are a lot of benefits of using Windows PowerShell over the more popular Command Prompt. But using PowerShell without digitally signing scripts can leave you vulnerable to attacks. This post will explain the importance of PowerShell script signatures and mention some best practices so your scripts remain secure. What is Windows PowerShell? Windows PowerShell […]

How to Use the Microsoft Anti-Malware Script Interface

by File in: Script

Hackers are increasing the malware attacks executed in memory. One of the main execution methodologies for in memory attacks is to execute a script directly without ever writing to disk.  Traditional anti-virus works by comparing signatures to files on disk. But what do we do when the executing code never touches the disk? Or worse, […]

How to Create a Local FTP Server from Scratch

by File in: How-To

Windows 10 users can create a personal cloud server that lets them transfer files without limits. In this guide, we’ll show you how to create a local FTP server that gives you more control over how you share files. Enable FTP on Windows 10 File transfer protocol or FTP is an old way of transferring […]

An Introduction To The Security Linux Distro “Tails”

by File in: Linux

I recently showed you why you should begin using the Tor browser for any sensitive web browsing. But what if I told you there was an entire operating system based on the Tor network? It’s called Tails and can be run from a USB stick, DVD disk, or virtual machine. You might think that using […]