How-Tos

cssg 017 thumb
video

How to set up Microsoft Cloud App Security

This new add-on will let you set up alerts about suspicious sign-on activity for Office 365 and other cloud apps.

nwht 031 thumb
video

How basic file permissions work: 2-Minute Linux Tips

In this Linux Tip, learn how to read and understand basic file permissions. Once you understand file permissions, you can analyze and reassign them.

nwht 029 thumb
video

How to use the awk command: 2-Minute Linux Tips

In this Linux Tip, learn how to use the awk command. You can use it to select one or more pieces of text from lines of input.

ifcr 029 thumb
video

Get month-over-month comparisons in R

See various ways to calculate month-over-month, week-over-week, and year-over-year comparisons in R using dplyr and lubridate.

nwht 028 thumb
video

How to use the stat command: 2-Minute Linux Tips

In this Linux tip, Sandra will show you how to use the stat command. It provides a lot of the same information as ls -l, but in a very different format. It also includes some useful additional information.

ifcr 028 thumb
video

How to send Slack messages with R

In this episode of Do More With R, Sharon shows you how to send Slack messages using R. It may not seem helpful at first, but there's plenty of uses. You can even use it to notify yourself or others when a lengthy R script finishes...

nwht 027 thum
video

How to use /dev/null: 2-Minute Linux Tips

In this Linux tip, learn how to use the /dev/null tool. You can send your outputs to /dev/null and it simply disappears. This is helpful when a command’s output isn’t interesting and you don't need to see it.

icfr 027 thumb
video

How to send email with R and Gmail

See how to automate sending email with the R programming language and Gmail.

nwht 026 thumb
video

How to use the nslookup command: 2-Minute Linux Tip

In this Linux tip, learn how to use the nslookup command. This command provides information on naming services and demonstrates how your system looks up hostnames prior to connecting to them.

windows 7 logo on mirrors man with derby hat on dock

How to isolate a Windows 7 machine from your network

If you have a business reason to keep a Windows 7 system active past its 2020 end-of-life date, here's how to keep it from being a security liability on your network.

An engineer reviews strategy framework data.

How to implement and use the MITRE ATT&CK framework

The MITRE ATT&CK framework is a popular template for building detection and response programs. Here's what you'll find in its knowledgebase and how you can apply it to your environment.

nwht 025 thumb
video

How to use the last command: 2-Minute Linux Tip

In this episode of 2-Minute Linux Tips, Sandra demonstrates the last command. It that shows recent logins – such as the last time you logged in but with the logins in reverse order.

CSO > Microsoft Azure backups / cloud computing / binary code / data transfer

5 tips for better backups with Azure Backup Agent

Both on-premises and cloud networks need backup solutions that allow you to recover from ransomware attacks quickly. One option is to use the Azure Backup Agent.

cssg 016 thumb
video

How to set up a Microsoft Azure backup process

Setting up a backup process in Azure is one way to quickly recover from a ransomware attack.

nwht 024 thumb
video

How to use the bc command: 2-Minute Linux Tip

In this Linux tip, learn how to use the bc command – it’s a command line calculator. You can use this command to easily solve equations.

ifcr 026 thumb
video

How to boost R Markdown interactivity with runtime Shiny

In this episode of Do More With R, Sharon demonstrates how to turbocharge R Markdown interactions with runtime shiny

Windows security and protection [Windows logo/locks]

How to outwit attackers using two Windows registry settings

These Microsoft Windows registry settings will prevent attackers from scheduling tasks that will hide their activities or gain unauthorized access.

nwht 023 thumb
video

How to use the lsblk command: 2-Minute Linux Tip

In this episode of 2-Minute Linux Tips, learn the lsblk command. It provides information on block devices -- such as hard disks where you read and write one block of data at a time.

security firewall breach hacker privacy battle id work getty

How to enable the Windows Potentially Unwanted Application (PUA) feature

Turning on the PUA setting helps avoid users falling prey to malicious drive-by downloads.

nwht 022 thumb
video

How to use the chown command: 2-Minute Linux Tip

Learn how to use the chown command. It changes a file’s owner or both owner and group.

Load More