How to ...?

Creating a Vulnerability Management Strategy

Often, an exploitation of a vulnerability might lead to a disaster recovery scenario. Therefore, it is imperative to have a system in place that can prevent the vulnerabilities from being exploited in the first place. But how can you prevent a vulnerability from being exploited if you don’t know whether your system is vulnerable? The answer is to have [...]


Misleading VMWare Errors and the solutions

Did you recently install WMware Workstation and started to get wired error messages? Then hopefully this short blog post can help you Error 1 " VMware Workstation and Device/Credential Guard are not compatible. VMware Workstation can be run after disabling Device/Credential Guard" You have just installed VMWare and ready to kick it off, but hey, VMWare Workstation / Pro [...]


Information Gathering Methods

Information gathering is not as challenging as it used to be a few years ago when one would only get details about a target either directly from the target or from asking around. The internet, more specifically the use of social media, has simplified this stage with newer and faster techniques of data collection. In the process of data [...]


Social Engineering 101

What is Social Engineering Social Engineering is, involving clever manipulation of the natural human tendencies of trust to obtain information to help facilitate fraud, network intrusion, industrial espionage, and identity theft or network/system disruption. I do like also the definition from Bruce Schneier: “Amateurs Hack Systems, Professional hack People” To gain the trust of the people Social Engineers trick [...]


Apple and Privacy

Does really Apple cares about your privacy, as they advertise heavily or is this what they want us to believe? Compared to Google and Facebook they are by far better in terms of privacy as of today! But are they really angels? Or do they still collect lots of information by default and if they do, what can you [...]


How Hackers Get your Password?

It’s not a secret anymore, Hackers know our passwords.  551,509,767 real-world passwords previously exposed in data breaches. Are you one of those victims? Has your email been compromised or found in a data breach so far? How do hackers get your passwords? In this article, I am going to write the common methods which hackers use to steal your [...]


Netstat for Security Professionals

This article was originally posted in 2012, right after my Microsoft TechEd New Zealand session, Updates on screenshots This article is all about NETSTAT command. How it can help you to check the details on your network connections… (Network Statistics). It's used to display very detailed information about how your computer is communicating with other computers or network [...]


Announcing the all new Attack Surface Analyzer 2.0

Few of us know what is really happening on our systems when we install new software from new or untrusted sources. This is important because most installation processes require elevated privileges, which can lead to undesired system configuration changes. Knowing what changes have been made is vital to maintaining the security of your system, data, and networks. Identifying those [...]


Windows 10 “God” Mode

I am not sure if you are aware of Windows 7 GOD MODE, I had an article in my old blog, but today I have just noticed that the original blog post which was written in December 2009 is missing, So below are the steps on how can you enable GOD MODE in Windows 10! What is Windows 10 God [...]


Posted By Category: How to ...?Tags: , , Comments: 0