logo
April 5, 2024 | Ethan Israel

How to Use OpenSSH to Move Files in Windows Server

Linux and Unix admins are accustomed to using Open Secure Shell (OpenSSH) to connect to servers because it has been included in those systems for decades. Windows users, on the other hand, have traditionally had to download third-party tools like Putty or WinSCP to utilize SSH...
December 1, 2023 | Dirk Schrader

Assessing 5 of the Leading Free Registry Cleaners

As you use your computer, the registry can collect obsolete, redundant or even damaged entries. By using a reg cleaner tool, you can: Remove registry entries left behind by uninstalled applications Reduce the size of the registry Identify and fix corrupted registry entries However,...
August 29, 2023 | Dirk Schrader

How to Perform Windows Registry Repair: Registry Repair Windows 10

The Windows registry is a database that contains important information about your computer — users, preferences, applications, attached devices and much more. The Windows operating system constantly refers to the registry; for example, to open a program, install new software or change your...
August 14, 2023 | Joe Dibley

Windows Remote WMI Security Primer for the Faint-Hearted

Local WMI querying is straightforward to implement and troubleshoot — but remote WMI querying is another story. Indeed, setting up secure remote WMI querying for a user with no admin rights is a daunting task.  This blog can help. I’ll walk you through the steps I used to enable a...
December 9, 2022 | Joe Dibley

Windows File Access Monitoring

In this post, we will dive into how to configure file access auditing on a Windows file server and explore the challenges with interpreting critical access events.   Background The first step in developing an effective audit strategy is to gain a good understanding of your systems,...
November 18, 2022 | Joe Dibley

Mounting Unix Shares with a Windows NFS Client

Network File System (NFS) is an open standard for distributing a file system across a network for multi-client access. Designed in 1984, NFS has grown to include many authentication methods at both the share (export) and file system levels, including client IP/hostname, auth_sys (Unix auth),...
January 11, 2022 | Kevin Joyce

Understanding LSA Protection

Securing your Windows servers and Windows 10 running is vital, especially given today’s sophisticated threat landscape. These are usually the first machines to be compromised in an attack through exploitation of the weakest link in the chain — the user. Through trickery and social engineering,...
February 3, 2021 | Dirk Schrader

A Brief Overview of Available Server Monitoring Tools Today

Organizations today are deeply dependent on their IT infrastructure, so system downtime translates directly to costly business disruptions. Accordingly, it’s critical to have server monitoring tools that provide the insight into your on-premises and cloud systems you need to prevent and detect...
October 30, 2018 | Jeff Melnick

How to Back Up and Restore the Windows Registry

The Windows registry is a database that contains important, machine-specific settings and information regarding almost everything in your computer — preferences, applications, users, attached devices and so on. The registry contains two basic elements: keys and values. The Windows operating...
October 22, 2018 | Jeff Melnick

Introduction to PowerShell

In this short PowerShell introduction, I’ll explain what PowerShell is and what it was created for, as well as provide a list of useful resources that can help you learning PowerShell scripting and make your working life easier. Windows PowerShell is a Windows command-line shell created to...
Show more articles
...