top of page
Search
2 days ago4 min read
PowerShell Logging and Not Start-Transcript
PowerShell's Start-Transcript command is a common choice for logging script output, it has its shortcomings. It records console output (writ
2 views0 comments
![PowerShell Logging and Not Start-Transcript](https://static.wixstatic.com/media/b83e6b_ca89a6a80a4d43fdb9d48bf263f18295~mv2.png/v1/fill/w_322,h_243,fp_0.50_0.50,q_95,enc_auto/b83e6b_ca89a6a80a4d43fdb9d48bf263f18295~mv2.webp)
Dec 19, 20246 min read
Bitlocker a Closer Look
The concept of a private key in BitLocker differs from that of traditional asymmetric encryption, where two keys (a private key and a public
16 views0 comments
![Bitlocker a Closer Look](https://static.wixstatic.com/media/b83e6b_37efe238efb748eb89714784a885f542~mv2.png/v1/fill/w_322,h_242,fp_0.50_0.50,q_95,enc_auto/b83e6b_37efe238efb748eb89714784a885f542~mv2.webp)
Dec 4, 20244 min read
Understanding Windows 11, TPMs, PCRs, Secure Boot, Bitlocker and Where They Fail
TPM security features excel at defending against physical attacks, but they can’t stop remote exploits, credential theft, or network-based t
112 views0 comments
![Understanding Windows 11, TPMs, PCRs, Secure Boot, Bitlocker and Where They Fail](https://static.wixstatic.com/media/b83e6b_9ba73fe6485a46beb5222ebf6607958e~mv2.png/v1/fill/w_322,h_242,fp_0.50_0.50,q_95,enc_auto/b83e6b_9ba73fe6485a46beb5222ebf6607958e~mv2.webp)
Nov 25, 20244 min read
When a Microsoft Engineer Meets Open Source: Deploying VS Code on Rocky Linux with Ansible.
Learn how to deploy Visual Studio Code on Rocky Linux using Ansible. This guide combines Microsoft expertise with open-source tools.
15 views0 comments
![When a Microsoft Engineer Meets Open Source: Deploying VS Code on Rocky Linux with Ansible.](https://static.wixstatic.com/media/b83e6b_ce955c82e88445d9b9e1bb5d34b59456~mv2.png/v1/fill/w_322,h_242,fp_0.50_0.50,q_95,enc_auto/b83e6b_ce955c82e88445d9b9e1bb5d34b59456~mv2.webp)
Oct 25, 20242 min read
Securing Weak File, Folder and Registry Hive Permissions.
We'll examine how threat actors—often referred to as hackers—can escalate privileges when weak file, directory, or registry permissions
8 views0 comments
![Securing Weak File, Folder and Registry Hive Permissions.](https://static.wixstatic.com/media/b83e6b_e5df9fc1c02e4c198095b88e36539bc5~mv2.png/v1/fill/w_322,h_283,fp_0.50_0.50,q_95,enc_auto/b83e6b_e5df9fc1c02e4c198095b88e36539bc5~mv2.webp)
bottom of page