Posts

TCP & UDP Explained

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are foundational...

Common Ports - Cheat Sheet

A port is a virtual point where network connections start and end. Ports are software-based...

Incident Response (IR) Explained

Incident response is the process of identifying, containing, and mitigating the...

PowerShell Script - Scan Domain and List Drives

PowerShell script to scan all domain computers and list the drives connected to...

PowerShell Removing Browsers From Workstations

It is really easy to remove any application with PowerShell. With the scripts below...

HTML - Cheat Sheet

HTML “HyperText Markup Language”—is the language used to tell the web browser what...

Backup Explained

Backup refers to the practice of copying and storing important data in different...

PowerShell Script to Create Full/Incremental/Differential...

It is always good to use backup software to backup data. But it is also possible...

Redundant Arrays of Independent Disks (RAID) Explained

RAID is a data storage technology that combines multiple physical disk drives into...

PowerShell Network Scanning

PowerShell is one of the most important tools for a system administrator. Here are...

Risk Management Explained

Risk management is the process of identifying, assessing, and controlling threats...

Virtualization Technology

Virtualization is the process of creating a virtual version of something, such as...

Step by Step - Configuring WSUS

Windows Server Update Services (WSUS) enables information technology administrators...

Step by Step - Installing Windows Server Update Service

Windows Server Update Services (WSUS) enables information technology administrators...

SSH Common Commands - Cheat Sheet

SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that...

Server Hardening

What is server Hardening? What measures needs to be taken?

G-TMR3K8FQQP