How-Tos

ifcr 037 thumb
video

How to use the dtplyr package

The dtplyr 1.0 package lets you write dplyr R code and access speedy data.table performance. Find out how

nwht 044 thumb
video

How to use the uniq command: 2-Minute Linux Tips

In this Linux tip, learn how to use the uniq command. It’s a command that’s very useful when you want to reduce or summarize information.

cssg 032 thumb
video

How to harden web browsers against cyberattacks

Use these techniques to limit attackers’ ability to compromise systems and websites.

nwht 042 thumb
video

How to use the screen command: 2-Minute Linux Tips

In this Linux tip, learn how to use the screen command. It's a command that allows you to detach an SSH session and then reconnect to it.

ifcr 036 thumb
video

R data.table in 5 minutes

Get a quick look at the R data.table package in this 5-minute tutorial that gives a sample of the package’s speed and power.

cssg 031 thumb
video

How to and why you should disable LLMNR with Windows Server

Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.

nwht 041 thumb
video

How to use the tee command: 2-Minute Linux Tips

In this Linux tip, learn how to use the tee command. It’s a very simple command that allows you to run some other command and send its output both to the screen and to a file at the same time.

cssg 030 thumb
video

How to double-check permissions post migration from Windows 7

It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.

nwht 040 thumb
video

How to use the who command: 2-Minute Linux Tips

In this Linux tip, learn how to use the who command. It will show you details regarding who is logged in and about the system.

cwht 012 thumb
video

The best office apps for Android

Your Android phone can help you stay productive on the go — if you have the right apps to get the job done.

cssg 029 thumb
video

Microsoft’s Windows, Office 365 advice for secure elections

Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.

mockup
video

Useful Google apps you aren't using

Gmail, Google Calendar, Google Drive — we all know the main titles. But if you're only using the obvious ones, you're missing out. Google's got some great stuff out there that's under the radar and all too easy to miss.

cssg 028 thumb
video

Top enterprise VPN vulnerabilities

Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.

cssg 027 thumb
video

How to safely erase data under Windows

Bitlocker and self-encrypting hard drives can make it easier to erase data so that it cannot be recovered. This is how the “crypto-erase” method works.

ifcr 034 thumb
video

How to export to Excel with R

See how to save a data frame from R to Excel – with styling or multiple tabs.

nwht 039 thumb
video

How to use the expr command: 2-Minute Linux Tips

Learn the expr command. It allows you to do mathematical calculations on the command line.

Email migration to Microsoft Outlook app on mobile email for smartphone user.

How to migrate smartphone users to the Outlook app with Intune

With the pending retirement of Microsoft Basic Authentication, the best way to protect mobile device users connecting through Exchange is to move them to Outlook.

cssg 026 thumb
video

How to move users to the Outlook app with Intune

Microsoft is turning off basic authentication, so it’s wise to move mobile users to the Outlook app to better protect them from attackers.

nwht 038 thumb
video

How to use the ac command: 2-Minute Linux Tips

Learn how to use the ac command. It reports on user login times, so if you’re interested in knowing how much time various users are spending on a Linux server, this command is a good choice.

Credential theft  > A thief steals a password.

How to detect and halt credential theft via Windows WDigest

Attackers can steal user credentials by enabling credential caching in the Windows authentication protocol WDigest. Here's how to stop them.

Load More