Sponsored by Keepnet Labs

How to ...?

Windows 10 H2 Update – get it now

Update  as 19 November , thank you for reaching out and notifying me the images are missing... I will upload them ASAP. Erdal Windows 10 October 2020 Update Or in other words the 20H2 update ( 19042.572 ) is focusing more on bug fixes and performance updates, but as like in every update it brings some new features. How to get [...]


Posted By Category: General, How to ...?, WindowsTags: , Comments: 0

Mark Simos Resource List

Mark Simos , a Chief Security Advisor at Microsoft and a great frined of mine recently shared a very useful resource list which I want to re share with you . Enjoy! Recent Updates Added CDOC blog link for "Zen and the Art of Threat Hunting" Fixed some broken links Incident Response and Recovery IR Reference Guide - Lessons learned and recommendations from [...]


Disabling the Mail app embedded in Windows 10?

I keep getting questions like : "I am using Microsoft Outlook or Office 365 as my default app. Bu still when I get a pop-up notice of newly arrived mail, if I click it, Windows 10 opens the pre-installed Mail app instead of Outlook. How can I disable it " (more…)


Creating a Vulnerability Management Strategy

Often, an exploitation of a vulnerability might lead to a disaster recovery scenario. Therefore, it is imperative to have a system in place that can prevent the vulnerabilities from being exploited in the first place. But how can you prevent a vulnerability from being exploited if you don’t know whether your system is vulnerable? The answer is to have [...]


Misleading VMWare Errors and the solutions

Did you recently install WMware Workstation and started to get wired error messages? Then hopefully this short blog post can help you Error 1 " VMware Workstation and Device/Credential Guard are not compatible. VMware Workstation can be run after disabling Device/Credential Guard" You have just installed VMWare and ready to kick it off, but hey, VMWare Workstation / Pro [...]


Information Gathering Methods

Information gathering is not as challenging as it used to be a few years ago when one would only get details about a target either directly from the target or from asking around. The internet, more specifically the use of social media, has simplified this stage with newer and faster techniques of data collection. In the process of data [...]


Social Engineering 101

What is Social Engineering Social Engineering is, involving clever manipulation of the natural human tendencies of trust to obtain information to help facilitate fraud, network intrusion, industrial espionage, and identity theft or network/system disruption. I do like also the definition from Bruce Schneier: “Amateurs Hack Systems, Professional hack People” To gain the trust of the people Social Engineers trick [...]


Apple and Privacy

Does really Apple cares about your privacy, as they advertise heavily or is this what they want us to believe? Compared to Google and Facebook they are by far better in terms of privacy as of today! But are they really angels? Or do they still collect lots of information by default and if they do, what can you [...]


How Hackers Get your Password?

It’s not a secret anymore, Hackers know our passwords.  551,509,767 real-world passwords previously exposed in data breaches. Are you one of those victims? Has your email been compromised or found in a data breach so far? How do hackers get your passwords? In this article, I am going to write the common methods which hackers use to steal your [...]