WPScan – A Black Box WordPress Vulnerability Scanner

WordPress is all over the web; it’s the most popular and most used content management system (CMS) out there. Is your website or blog is powered by WordPress? Did you know that malicious hackers are always attacking WordPress sites every minute? If you didn’t, now you know. The first step towards securing your website or blog is to perform a vulnerability assessment. […]

Read more

Deploying the Local Administrator Password Solution Part 1

In this series of three posts, I demonstrate the installation and configuration of Microsoft’s Local Administrator Password Solution (LAPS). This is the first post that covers installation of the software on management computers and clients. For links to parts 2 and 3, see the bottom of this post. What is LAPS? LAPS is a solution to change the local administrator (SID -500) […]

Read more

Deploying the Local Administrator Password Solution Part 2

In this series of three posts, I demonstrate the installation and configuration of Microsoft’s Local Administrator Password Solution (LAPS). This is the second post that covers configuration of Active Directory to support LAPS. Configuring Active Directory for LAPS Extend the AD Schema In the last post, we configured the client installation. While there is no server-side software to run as far […]

Read more

Deploying the Local Administrator Password Solution Part 3

In this series of three posts, I demonstrate the installation and configuration of Microsoft’s Local Administrator Password Solution (LAPS). This is the third and final post that covers the group policy configuration of LAPS, as well as a brief demonstration. Configuring Group Policy We’ve got the software installed, and AD configured, all that’s left is to turn the thing on! Fortunately there’s […]

Read more

How to install Root Certificate Authority on Windows Server 2012

This guide will have two parts. The first one will be Installation and Configuration of Root Certificate Authority and the second one will be the post configuration settings. Installation of Root certificate Authority Open Server Manger, click on Add Roles and Features from the dashboard. Next select the Role based or feature based installation and click Next. On the next […]

Read more

Net Commands – Network Security Management

The NET Command is used to manage network security resources as follows: View user account password and logon requirements (also displays the machine type – Server or workstation) NET ACCOUNTS View password and logon requirements for the network domain. NET ACCOUNTS /DOMAIN Set the number of minutes a user has before being forced to log off when the account expires […]

Read more

How the NSA is infiltrating private networks

The NSA, working with its British counterpart, the Government Communications Headquarters (GCHQ), secretly taps into the internal networks of Yahoo and Google, the two biggest Internet companies by overall data traffic. The operation intercepts information flowing between the enormous data centers that those companies maintain around the world. In general, Google and Yahoo use privately owned or leased lines to […]

Read more
1 2 3