How-Tos

thumb
video

How to use tidy eval in R

Do you want to use ggplot2, dplyr, or other tidyverse functions in your own functions? This easy example shows how

nwht 020 thumb
video

How to use the nmcli command: Linux Tip

Nmcli is a command-line tool for controlling NetworkManager and getting the status of network interfaces. Learn about using the command on this episode of 2-Minute Linux Tips.

security audit - risk assessment - network analysis

How to audit Windows Task Scheduler for cyber-attack activity

Two recently discovered Windows zero-day attacks underscore the importance of monitoring for unauthorized tasks.

cssg 015 enable auditing
video

How to audit Windows Task Scheduler to detect attacks

Learn how to prevent attackers from using Task Scheduler to hide and set up tasks to access Windows systems.

Microsoft Windows update arrows on laptop and mobile phone

Windows security updates that require new registry keys

Don't assume automated Windows security updates are complete. You might need to add registry keys manually. Here are a few to check now.

9 screen locking device lock down authentication

How to hack a smartcard to gain privileged access

Using smartcards in a Microsoft Active Directory environment makes them vulnerable to this privilege escalation attack.

login password - user permissions - administrative control

How to protect against poor Windows password practices

Employees will reuse passwords for work systems for their personal online accounts. Here's how to set up multifactor authentication in a Windows environment to reduce the risk of password compromise.

thumb 2
video

How to write your own R package

When you hear “R package,” you may think something to share with other people. But an R package can also be a good way to organize your own work

11 event logging

How to install PowerShell 5 on Windows 7

Have older Windows systems on your network? You can give them PowerShell 5's event logging capabilities even if they run Windows 7.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

meltdown spectre

How to update Windows 10 for side channel vulnerability fixes

Since Spectre and Meltdown were discovered in 2018, other side channel vulnerabilities have emerged. These are the mitigations to consider for each of them.

05 malware

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them.

ifcr 021 thumb3
video

Run Python in R code

While R is a useful language, Python is also great for data science and general-purpose computing. See how to run Python code within an R script and pass data between Python and R

cssg 014 thumbnail
video

Updating Spectre, Meltdown and Foreshadow mitigations

Use these Windows registry key changes and fixes to protect your systems from known side channel vulnerabilities.

8 ingredients dr
video

8 ingredients of an effective disaster recovery plan

How to keep your business running in the event of an emergency or disaster.

managed security service providers

How to prevent and recover from an APT attack through a managed service provider

Threat actors are compromising their targeted victims through managed service providers (MSPs). These are the steps to take to minimize your exposure and to recover from these attacks if necessary.

nwht 018 thumb
video

Linux tip: How to use the hostnamectl command

In this Linux tip, we look at the hostnamectl command. It’s a command that provides information on a particular system – including but not limited to its hostname – and even allows you to make some changes.

Windows security and protection [Windows logo/locks]

How to harden Windows 10 workstations and servers: Disable SMB v1

Early versions of Server Message Block are still present on many Windows networks and devices, leaving them open to attack. Here's how to detect and disable them.

cssg 013 thumbnail
video

How to harden Windows workstations and servers from attack

Use these basic settings to make it harder for attackers to Windows hardware.

nwht 017 thumb2
video

Linux tip: How to use the pstree command

In this tip, we look at the pstree command. It allows you to get a listing of running processes that clearly indicates the relationship between them.

Load More