top of page
Search
Dec 19, 20246 min read
Bitlocker a Closer Look
The concept of a private key in BitLocker differs from that of traditional asymmetric encryption, where two keys (a private key and a public
9 views0 comments
Dec 4, 20244 min read
Understanding Windows 11, TPMs, PCRs, Secure Boot, Bitlocker and Where They Fail
TPM security features excel at defending against physical attacks, but they can’t stop remote exploits, credential theft, or network-based t
39 views0 comments
Nov 25, 20244 min read
When a Microsoft Engineer Meets Open Source: Deploying VS Code on Rocky Linux with Ansible.
Ah, the irony. Here I am, a proud Microsoft engineer, wielding Ansible—a shining beacon of open-source automation—to deploy our beloved VSC.
15 views0 comments
Oct 25, 20242 min read
Securing Weak File, Folder and Registry Hive Permissions.
We'll examine how threat actors—often referred to as hackers—can escalate privileges when weak file, directory, or registry permissions
6 views0 comments
Oct 23, 20242 min read
Windows AutoPilot Device Preparation
Windows Autopilot's Device Preparation is it's new 'user-driven' workflow. Instead of IT staff registering all devices prior to giving...
4 views0 comments
bottom of page