security audit - risk assessment - network analysis

Microsoft Windows update arrows on laptop and mobile phone

Windows security updates that require new registry keys

Don't assume automated Windows security updates are complete. You might need to add registry keys manually. Here are a few to check now.

9 screen locking device lock down authentication

How to hack a smartcard to gain privileged access

Using smartcards in a Microsoft Active Directory environment makes them vulnerable to this privilege escalation attack.

login password - user permissions - administrative control

How to protect against poor Windows password practices

Employees will reuse passwords for work systems for their personal online accounts. Here's how to set up multifactor authentication in a Windows environment to reduce the risk of password compromise.

thumb 2

How to write your own R package

When you hear “R package,” you may think something to share with other people. But an R package can also be a good way to organize your own work

11 event logging

How to install PowerShell 5 on Windows 7

Have older Windows systems on your network? You can give them PowerShell 5's event logging capabilities even if they run Windows 7.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

meltdown spectre

How to update Windows 10 for side channel vulnerability fixes

Since Spectre and Meltdown were discovered in 2018, other side channel vulnerabilities have emerged. These are the mitigations to consider for each of them.

05 malware

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them.

ifcr 021 thumb3

Run Python in R code

While R is a useful language, Python is also great for data science and general-purpose computing. See how to run Python code within an R script and pass data between Python and R

cssg 014 thumbnail

Updating Spectre, Meltdown and Foreshadow mitigations

Use these Windows registry key changes and fixes to protect your systems from known side channel vulnerabilities.

8 ingredients dr

8 ingredients of an effective disaster recovery plan

How to keep your business running in the event of an emergency or disaster.

managed security service providers

How to prevent and recover from an APT attack through a managed service provider

Threat actors are compromising their targeted victims through managed service providers (MSPs). These are the steps to take to minimize your exposure and to recover from these attacks if necessary.

nwht 018 thumb

Linux tip: How to use the hostnamectl command

In this Linux tip, we look at the hostnamectl command. It’s a command that provides information on a particular system – including but not limited to its hostname – and even allows you to make some changes.

Windows security and protection [Windows logo/locks]

How to harden Windows 10 workstations and servers: Disable SMB v1

Early versions of Server Message Block are still present on many Windows networks and devices, leaving them open to attack. Here's how to detect and disable them.

cssg 013 thumbnail

How to harden Windows workstations and servers from attack

Use these basic settings to make it harder for attackers to Windows hardware.

nwht 017 thumb2

Linux tip: How to use the pstree command

In this tip, we look at the pstree command. It allows you to get a listing of running processes that clearly indicates the relationship between them.

spear fishing

How to defend Office 365 from spear-phishing attacks

A recent successful zero-day Flash attack began with a spear-phishing email. These Windows 10 and Office 365 settings could have prevented it.


How to defend Office 365 from spear-phishing attacks

Configure Office 365 to detect email-delivered malware.

Load More