Blog LegaSystems Blog LegaSystems
  • Home
  • About Us
  • Managed Services
    • Remote Monitoring
    • Remote Backup
  • Design Bureau
    • Advertising Videos
    • Content Development
    • Local Internet Presence
    • On/Off Page SEO
    • Online Reputation Management
    • Social Network Development
  • Contact Us

Arşivler

  • July 2023
  • May 2023
  • April 2023

Kategoriler

  • General
  • Technology
Blog LegaSystems Blog LegaSystems
  • Home
  • About Us
  • Managed Services
    • Remote Monitoring
    • Remote Backup
  • Design Bureau
    • Advertising Videos
    • Content Development
    • Local Internet Presence
    • On/Off Page SEO
    • Online Reputation Management
    • Social Network Development
  • Contact Us
Blog LegaSystems Blog LegaSystems
The Latest
Enforcing AES 256 bit encryption for Domain Authentication
330 views
NetBIOS attack simulation and prevention
265 views
AD PSO – more complex AD passwords for privileged accounts
256 views
Requesting, signing and pairing internal certificates without Web Enrollment portal
257 views
  • Technology
07/23/2023

Enforcing AES 256 bit encryption for Domain Authentication

Upgrading Windows Domain Authentication Encryption keys from 128 to 256 BIT… yes it’s a thing. The what. A…
byVal Komarovskiy, MBA
330 views
  • Technology
07/23/2023

NetBIOS attack simulation and prevention

NetBIOS (Network Basic Input/Output System) is a protocol used for file sharing, printer sharing, and other network services…
byVal Komarovskiy, MBA
265 views
  • Technology
07/23/2023

AD PSO – more complex AD passwords for privileged accounts

Privileged Active Directory accounts such as Domain Admin and Exchange Admin should have more complex passwords compared to regular…
byVal Komarovskiy, MBA
256 views
  • Technology
07/23/2023

Requesting, signing and pairing internal certificates without Web Enrollment portal

Requesting, signing and pairing internal certificates without Web Enrollment portal CA (Certificate Authority) Web Enrollment, what’s the risk…
byVal Komarovskiy, MBA
257 views
  • Technology
07/23/2023

WispRider USB drive virus

The WispRider virus is actively spreading across computers around the world, according to CheckPoint Security and Microsoft Security…
byVal Komarovskiy, MBA
247 views
  • Technology
07/23/2023

Free Cheese is usually in the mouse trap – Beware of malware infected Linux Tools

Microsoft’s cybersecurity researchers recently discovered an attack that specifically targets Linux-based systems and Internet of Things (IoT) devices.…
byVal Komarovskiy, MBA
219 views
  • Technology
07/23/2023

“ProxyJacking” and SSH “HoneyPots” cyber exploit patterns

“ProxyJacking” – how does it work, characteristics and prevention Proxyjacking is a term that combines “proxy” and “hijacking.”…
byVal Komarovskiy, MBA
260 views
  • Technology
07/23/2023

How to read or split a large log file too big for Notepad

The maximum log file size that Windows Notepad can effectively read depends on the version of Windows and…
byVal Komarovskiy, MBA
259 views
  • Technology
07/23/2023

AD joined, Azure AD joined, Hybrid Joined and Azure AD registered devices- what’s the difference?

4 modes of Microsoft domain to device relationships: the differences and the capabilities of AD joined, Azure AD…
byVal Komarovskiy, MBA
348 views
  • Technology
05/05/2023

Home Folders of Departed Users – Find, Identify and Archive in Custody or Delete!

Home Folders of departed users – find, identify and archive in custody or delete! Home folders of departed…
byVal Komarovskiy, MBA
246 views

Latests

  • Enforcing AES 256 bit encryption for Domain Authentication
  • NetBIOS attack simulation and prevention
  • AD PSO – more complex AD passwords for privileged accounts
  • Requesting, signing and pairing internal certificates without Web Enrollment portal
  • WispRider USB drive virus
Featured
  • 1
    “ProxyJacking” and SSH “HoneyPots” cyber exploit patterns
  • 2
    Home Folders of Departed Users – Find, Identify and Archive in Custody or Delete!
  • 3
    Assessments
  • 4
    Hybrid Identity Is The Core Of Modern Workforce
  • 5
    Requiring Lock Pin For Office 365 Mobile, Where To Configure?
Recent
  • Security Configuration Change Management, Monitoring and Control
  • Security and Compliance
  • Bitcoin Whitepaper Is Already On Every MacOS!
Blog LegaSystems Blog LegaSystems
www.legasystems.com sales@legasystems.com 855-534-2797
Designed & Developed by Lega Systems
Latest Posts
  • Technology

Enforcing AES 256 bit encryption for Domain Authentication

  • Technology

NetBIOS attack simulation and prevention