Blog LegaSystems Blog LegaSystems
  • Home
  • About Us
  • Managed Services
    • Remote Monitoring
    • Remote Backup
  • Design Bureau
    • Advertising Videos
    • Content Development
    • Local Internet Presence
    • On/Off Page SEO
    • Online Reputation Management
    • Social Network Development
  • Contact Us

Arşivler

  • July 2023
  • May 2023
  • April 2023

Kategoriler

  • General
  • Technology
Blog LegaSystems Blog LegaSystems
  • Home
  • About Us
  • Managed Services
    • Remote Monitoring
    • Remote Backup
  • Design Bureau
    • Advertising Videos
    • Content Development
    • Local Internet Presence
    • On/Off Page SEO
    • Online Reputation Management
    • Social Network Development
  • Contact Us
Blog LegaSystems Blog LegaSystems
The Latest
Enforcing AES 256 bit encryption for Domain Authentication
474 views
NetBIOS attack simulation and prevention
408 views
AD PSO – more complex AD passwords for privileged accounts
362 views
Requesting, signing and pairing internal certificates without Web Enrollment portal
374 views
  • Technology
07/23/2023

Enforcing AES 256 bit encryption for Domain Authentication

Upgrading Windows Domain Authentication Encryption keys from 128 to 256 BIT… yes it’s a thing. The what. A…
byVal Komarovskiy, MBA
474 views
  • Technology
07/23/2023

NetBIOS attack simulation and prevention

NetBIOS (Network Basic Input/Output System) is a protocol used for file sharing, printer sharing, and other network services…
byVal Komarovskiy, MBA
408 views
  • Technology
07/23/2023

AD PSO – more complex AD passwords for privileged accounts

Privileged Active Directory accounts such as Domain Admin and Exchange Admin should have more complex passwords compared to regular…
byVal Komarovskiy, MBA
362 views
  • Technology
07/23/2023

Requesting, signing and pairing internal certificates without Web Enrollment portal

Requesting, signing and pairing internal certificates without Web Enrollment portal CA (Certificate Authority) Web Enrollment, what’s the risk…
byVal Komarovskiy, MBA
374 views
  • Technology
07/23/2023

WispRider USB drive virus

The WispRider virus is actively spreading across computers around the world, according to CheckPoint Security and Microsoft Security…
byVal Komarovskiy, MBA
345 views
  • Technology
07/23/2023

Free Cheese is usually in the mouse trap – Beware of malware infected Linux Tools

Microsoft’s cybersecurity researchers recently discovered an attack that specifically targets Linux-based systems and Internet of Things (IoT) devices.…
byVal Komarovskiy, MBA
307 views
  • Technology
07/23/2023

“ProxyJacking” and SSH “HoneyPots” cyber exploit patterns

“ProxyJacking” – how does it work, characteristics and prevention Proxyjacking is a term that combines “proxy” and “hijacking.”…
byVal Komarovskiy, MBA
380 views
  • Technology
07/23/2023

How to read or split a large log file too big for Notepad

The maximum log file size that Windows Notepad can effectively read depends on the version of Windows and…
byVal Komarovskiy, MBA
353 views
  • Technology
07/23/2023

AD joined, Azure AD joined, Hybrid Joined and Azure AD registered devices- what’s the difference?

4 modes of Microsoft domain to device relationships: the differences and the capabilities of AD joined, Azure AD…
byVal Komarovskiy, MBA
509 views
  • Technology
05/05/2023

Home Folders of Departed Users – Find, Identify and Archive in Custody or Delete!

Home Folders of departed users – find, identify and archive in custody or delete! Home folders of departed…
byVal Komarovskiy, MBA
340 views

Latests

  • Enforcing AES 256 bit encryption for Domain Authentication
  • NetBIOS attack simulation and prevention
  • AD PSO – more complex AD passwords for privileged accounts
  • Requesting, signing and pairing internal certificates without Web Enrollment portal
  • WispRider USB drive virus
Featured
  • 1
    Hybrid Identity Is The Core Of Modern Workforce
  • 2
    Requesting, signing and pairing internal certificates without Web Enrollment portal
  • 3
    Mobility
  • 4
    Requiring Lock Pin For Office 365 Mobile, Where To Configure?
  • 5
    Microsoft 365 Security Configuration Impact On Feature Functionality In SharePoint Online, Microsoft Teams and OneDrive for Business
Recent
  • Windows 7 Extended Support Will End On January 14, 2020, Will You Be Ready?
  • ADANOMICS – Cardano ADA Supply, Reserves And Rewards
  • Security and Compliance
Blog LegaSystems Blog LegaSystems
www.legasystems.com sales@legasystems.com 855-534-2797
Designed & Developed by Lega Systems
Latest Posts
  • Technology

Enforcing AES 256 bit encryption for Domain Authentication

  • Technology

NetBIOS attack simulation and prevention