How-Tos

CSO > Microsoft Azure backups / cloud computing / binary code / data transfer

nwht 024 thumb
video

How to use the bc command: 2-Minute Linux Tip

In this Linux tip, learn how to use the bc command – it’s a command line calculator. You can use this command to easily solve equations.

ifcr 026 thumb
video

How to boost R Markdown interactivity with runtime Shiny

In this episode of Do More With R, Sharon demonstrates how to turbocharge R Markdown interactions with runtime shiny

Windows security and protection [Windows logo/locks]

How to outwit attackers using two Windows registry settings

These Microsoft Windows registry settings will prevent attackers from scheduling tasks that will hide their activities or gain unauthorized access.

nwht 023 thumb
video

How to use the lsblk command: 2-Minute Linux Tip

In this episode of 2-Minute Linux Tips, learn the lsblk command. It provides information on block devices -- such as hard disks where you read and write one block of data at a time.

security firewall breach hacker privacy battle id work getty

How to enable the Windows Potentially Unwanted Application (PUA) feature

Turning on the PUA setting helps avoid users falling prey to malicious drive-by downloads.

nwht 022 thumb
video

How to use the chown command: 2-Minute Linux Tip

Learn how to use the chown command. It changes a file’s owner or both owner and group.

patch on top of Windows logo

How to prep legacy Windows systems for the switch to SHA-2

Install these patches on Windows 7 and other legacy platforms now so you can continue to receive security updates.

nwht 021 thumb
video

How to use the chmod command: 2-Minute Linux Tips

Learn how to use the chmod command – the command for changing permissions on files. The only tricky part is understanding that there are two ways to represent file permissions.

Windows security and protection [Windows logo/locks]

How to protect yourself from PC hardware and hardware driver vulnerabilities

Attackers have hijacked PC motherboard update software and hardware drivers to install malware. Here's how to identify vulnerable systems and prevent driver-delivered malware.

ifcr 025 thumb
video

How to customize ggplot with bbplot

Overwhelmed by all the ways you can customize a ggplot2 data visualization? With add-on packages like the BBC’s bbplot, you can use themes created by design professionals – or tweak them to make them your own.

deadline clock time speed analog clock by ryan mcguire gratisography

How and when to set Windows logging to UTC time

As networks become more distributed and cloud-based, you should consider changing servers to UTC time to ensure proper syncing. This will help with forensics investigations.

ifcr 024 thumb3
video

How to reshape data with tidyr’s new pivot functions

See examples of tidyr’s new pivot_longer and pivot_wider functions.

Microsoft Windows update arrows / progress bars

How to prepare for the Microsoft Windows 10 1903 security feature update

Microsoft is changing the way it does Windows 10 feature updates, and that will affect how you schedule update deferrals. Here's what you need to know.

nwht 019 thumb
video

How to run command loops: Linux Tip

Being able to run command loops is one of the features of Linux that makes it easy to automate repetitive tasks. In this 2-minute Linux tip, learn about looping -- in scripts and on the command line.

clock on the processor of a circuilt board

How to time-sync Windows systems

Incorrect time on a Windows device or server can prevent security updates or user authentication, and it can interfere with a forensics investigation.

thumb
video

How to use tidy eval in R

Do you want to use ggplot2, dplyr, or other tidyverse functions in your own functions? This easy example shows how

nwht 020 thumb
video

How to use the nmcli command: Linux Tip

Nmcli is a command-line tool for controlling NetworkManager and getting the status of network interfaces. Learn about using the command on this episode of 2-Minute Linux Tips.

security audit - risk assessment - network analysis

How to audit Windows Task Scheduler for cyber-attack activity

Two recently discovered Windows zero-day attacks underscore the importance of monitoring for unauthorized tasks.

Load More