Preventing Petya ransomware with Group Policy
This post and this twitter thread describe a mechanism to prevent the latest ransomware cyber attack from running. It involves creating 1 (or 3) files with a s...
This post and this twitter thread describe a mechanism to prevent the latest ransomware cyber attack from running. It involves creating 1 (or 3) files with a s...
For my reference, a video of a session I missed at TechEd. https://www.youtube.com/watch?v=5rFhJGVgAto Also available via Microsoft Channel 9 ( downloads availa...
I need to automate the setting of passwords on some Active Directory accounts. Since resetting passwords is also a task that I’m asked to perform with som...
In order to connect to the Remote Desktop service on centrally managed servers from on or off campus, you need to use the Remote Desktop (RD) Gateway feature of...
Following Greg’s advice, as well as the Tomcat docs here are the steps I’ve performed to update the SSL certificates used by two Tomcat instances: ...
I will probably need to refer to this myself, but maybe someone else will find this useful. Still working through some print queue management tasks, I needed to...
Microsoft KB 187498Â describes the registry values that can be used to disable various security protocols. Disabling SSLv2 is as easy as This does require a reb...
In my discussion and demo at the IT-Discuss Live – Security event in May, I used a short slide deck to describe—in broad terms—how PGP Whole Disk Encrypti...
I’ve received several phishing attempts, recently, this time masquerading as mail from Twitter. I thought I’d share how I recognized this as an attack. Many...
When the recent SMB 2.0 vulnerability was announced, there was some discussion on the Toasters mailing list about whether Data ONTAP was affected. Val Bercovici...