WINDOWS COMMON TERMINOLOGIES
This blog series is aimed at giving security practitioners (both defense & offense ) a thorough understanding of Windows access […]
This blog series is aimed at giving security practitioners (both defense & offense ) a thorough understanding of Windows access […]
The Windows operating system implements a default set of authentication protocols, including Kerberos, NTLM, Transport Layer Security/Secure Sockets Layer (TLS/SSL), […]
The NT Architecture of Windows, a line of operating systems produced and sold by Microsoft, is a layered design that […]
In the current world of increased data requirements, cloud storage is like a blessing. That’s the reason Onedrive, Mega, Google […]
In the previous post, we covered the process of installing Pfsense. In this post, we’ll be doing pfsense configuration to […]
This is the first blog for defensive lab environments set up for corporate and home users. In this blog, we […]
Security information and event management (SIEM) is a subsection within the field of computer security, where software products and services […]
WhatsApp us for trainings & demos