How to ...?

Netstat for Security Professionals

This article was originally posted in 2012, right after my Microsoft TechEd New Zealand session, Updates on screenshots This article is all about NETSTAT command. How it can help you to check the details on your network connections… (Network Statistics). It's used to display very detailed information about how your computer is communicating with other computers or network [...]


Announcing the all new Attack Surface Analyzer 2.0

Few of us know what is really happening on our systems when we install new software from new or untrusted sources. This is important because most installation processes require elevated privileges, which can lead to undesired system configuration changes. Knowing what changes have been made is vital to maintaining the security of your system, data, and networks. Identifying those [...]


Windows 10 “God” Mode

I am not sure if you are aware of Windows 7 GOD MODE, I had an article in my old blog, but today I have just noticed that the original blog post which was written in December 2009 is missing, So below are the steps on how can you enable GOD MODE in Windows 10! What is Windows 10 God [...]


Posted By Category: How to ...?Tags: , , Comments: 0

Forensic investigation of a Social Engineering attack, from real life

In this article I am going to share with you a real Social Engineering attack , where we worked in a case to investigate if there was any forensic evidence to suggest that the laptop computer a) had been compromised by the perpetrator(s), b) if found to be compromised, how, when, and by whom it was compromised, c) [...]


Fix: Outlook keeps asking for a password?

If you care about your Security, then you need to take an extra step and tun on two-step verification in your account. (If you don't know how, please check this link below this article) Multi-Factor Authentication* (MFA) in your Outlook.com /Hotmail / MSN etc accounts. This will ensure that, to have an extra layer of security against hackers. But [...]