It’s best suited for small- to medium-sized businesses with deployments that range from tens to a few hundred computers. A provisioning package (. ppkg) is a container for a collection of configuration settings. Use the Windows Configuration Designer tool to create provisioning packages to easily configure devices running Windows client. Windows Configuration Designer is primarily Read More …
Category: Computers
New Weird Time Lapse Video
Here is a weird little video I made using the free shotcut video editor. This is from driving Lake Shore Drive home from school, and then just doing weird things with Shotcut and the video. A couple of moments I like, but mostly, just goofing around.
PXE Server for the win
Recently I got a new ‘hot rod’ of a laptop from work, which came with many of the latest bells and whistles. One of these newest bells, was a very much updated BIOS, that no longer allowed for Legacy Boot Options. Important for those of us who might want to use something other than Windows Read More …
A Fun Little Chart
Here was a fun little chart I discovered in my news feed a little bit ago. This is graphic representation of selected data breaches from across the globe. You can hover over the bubbles and get a bit more information about each breach. Scary to think that some small bubbles are still 15+ millions of Read More …
SMS Phishing or Spam
I just received an awesome SMS phishing message scam, and I wanted to share with others, to show how to spot the scam. To the right is a photo of it: First, I do read the whole message, and in the second reading that we can really pick it apart. So the message claims to Read More …
Some Computer Blogs
This post is just another compilation from my earlier blogger site. This post will focus on various newsletters, blogs, or similar that I followed at some point or another. Matteo Malvica Penetration Testing Lab Specific Articles New Forensic Investigation Procedures for First Responder Guides This is the story about when a nation state hacks into Read More …
Infrastructure Attacks Are Growing
A couple of news articles caught my eye this past week that are quite interesting IMO. Ukraine’s largest mobile operator Kyivstar downed by ‘powerful’ cyberattack & Attacks on Critical Infrastructure Attributed to Insidious Taurus You have to love the names that the security companies come up with for the other nation state actors. I am Read More …
Install Go Lang on Ubuntu
I decided as my computer hobby to start playing with some of the tools in the Project Discovery set. A good portion of these tools seem to be written in the Go language, so let’s also pursue that a little bit. These are my steps to install on my home server. OK, First let’s install Read More …
What is SEO Poisoning?
SEO Poisoning (or Search Engine Optimization Poisoning) is a type of social engineering attack that targets an unsuspecting user, or maybe someone who is in a hurry and not paying close attention. These are typically used by bad guys to fool unsuspecting users into clicking their links and going to the wrong website, or worse Read More …
Camp IT DR/BCP Conference Thoughts
Recently I attended a Camp IT Conference hosted at the Stephens Convention center in Rosemont Illinois. This particular conference was Disaster Recovery / Business Continuity – Resilient Infrastructure. While the Convention center in Rosemont is cavernous, our group was off to the side in the Executive areas. Next time I will remember to take photos! Read More …