The dangers of vendor shortcuts!

Installers are hard to write. They generate a lot of customer support calls and seem to always need tweaking to support unforeseen or new customer environments. But installers fulfill several, important functions. Obviously, software needs to get installed and configured. In addition, the installation process usually established the security context for many products. However, both […]

FBI director says cybersecurity threat is increasing “almost exponentially”

Are you ready? Are you prepared? https://news.yahoo.com/fbi-director-says-cybersecurity-threat-202522727.html Anne Neuberger, a top cyber security official at the National Security Council, warned, “All organizations must recognize that no company is safe from being targeted by ransomware, regardless of size or location. We urge you to take ransomware crime seriously and ensure your corporate cyber defense match the […]

FBI director says cybersecurity threat is increasing “almost exponentially”

Are you ready? Are you prepared? Following are the recent cyberattacks that are targeted against education industry: https://news.yahoo.com/fbi-director-says-cybersecurity-threat-202522727.html https://abcnews.go.com/Politics/fbi-warns-cyberattacks-distance-learning/story?id=75038470 https://www.govtech.com/policy/2020-marks-a-record-breaking-year-for-cyber-attacks-against-schools.html https://abcnews.go.com/Technology/wireStory/university-california-victim-nationwide-hack-attack-76847800 Active Directory is the “critical” component of any enterprise security. Checkout our solutions!

Viewing Truncated PowerShell Output!

Sometimes PowerShell truncates output, and if you don’t realize what’s going on, you’ll never get it to show. Where you’re expecting potentially lots more text, PowerShell replaces it with a single lousy ellipsis, cruelly taunting you. Column Width: If it’s just a column width problem, the fix is simple enough: just pipe to out-string and […]

Setting Folder Permissions from command prompt!

CACLS: Change Access Control List C:\> cacls foldername /e /p Username:F (Full Permission) C:\> cacls foldername /D Username (to deny) C:\> cacls foldername /e /p username:F (full control) (e:edit) (p:permission) C:\> cacls “Foldername” /grant “Username”:F (full control) C:\> cacls C:\Shared /e /p  Everyone:F (to create a permission on shared folder) where /e is to preserve […]

SSL disappear from the certificate list of Windows Server

Users with Windows servers may occasionally encounter an issue when an imported certificate disappears from the list of server certificates. Most often, this happens right after completing certificate request in Internet Information Services (IIS) Manager . The lists of server certificates in IIS contains only certificates that are assigned to the corresponding private key and […]