Leituras, traduções e links

Monday, April 29, 2019

RAID 1 and RAID 5



at April 29, 2019 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: RAID

Processor - Slots and HD




at April 29, 2019 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Group Policy Update - force from Domain Controller



at April 29, 2019 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: GPO Update

GPO policy results


at April 29, 2019 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: GPO results

Group Policy Course







at April 29, 2019 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: GPU, Group_Policy
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

CISO live

 

  • boardsi - summary - review
     Summarization of hundreds of comments on Reddit. Ineffective Service: The users explicitly states, "Confirmed that it doesn't w...
  • Privacy Policy, Flipp
    Based on a review of the provided Privacy Policy , here are some potential legal implications and issues that should be addressed: Scope a...

Blogues que sigo

  • Schneier on Security
    Friday Squid Blogging: New Squid Species Discovered - A new species of squid. pretends to be a plant: Scientists have filmed a never-before-seen species of deep-sea squid burying itself upside down in the se...
    1 day ago
  • Dan Kaminsky's Blog
    Philadelphia Files Lawsuit Against Trump Administration Over Removal of Slavery Exhibit - The City of Philadelphia has initiated a federal lawsuit against the Trump administration following the removal of a long-standing slavery exhibit from Ind...
    1 week ago
  • Windows Incident Response
    Views on AI & the Anthropic Report - There's been a lot of chatter over the use of AI in various fields, and because it's my professional focus, I'm most interested in how it's used in cyber...
    1 week ago
  • Stories by Helen Patton on Medium
    Living the Cybersecurity Serenity Prayer - Setting Boundaries for Leadership Peace of Mind Continue reading on Medium »
    3 weeks ago
  • JerryGamblin.com
    2025 CVE Data Review - 2025 set a new baseline with 48,185 published CVEs. While the sheer volume is climbing, the median CVSS score remained surprisingly stable. We are seeing a...
    4 weeks ago
  • Cyber Security Canada
    Cyber Security Canada Announces Pursuit of CMMC Third-Party Assessor Organization (C3PAO) Authorization to Serve Global Defense Industrial Base - Petawawa, Ontario – December 9, 2025 – Cyber Security Canada, a leading provider of cybersecurity compliance and assessment services with a deep speciali...
    1 month ago
  • Mobile & Technology Exploration
    6G CSA/RFPS Challenges - Articles I have written relate to Cell Site Analysis (CSA)/Radio Frequency Propagation Survey (RFPS) capability in the wake of the proposed 6G. The advance...
    9 months ago
  • Penetration Testing Lab
    Web Browser Stored Credentials - Microsoft introduced Data Protection Application Programming Interface (DPAPI) in Windows environments as a method to encrypt and decrypt sensitive data su...
    1 year ago
  • martin.uy
    Monomorphic to megamorphic callsite in C1 - In our previous article Callsite resolution in the JVM we discussed how a monomorphic callsite looks like after inline caching: [crayon-649157c161539245162...
    2 years ago
  • Threatpost | The first stop for security news
    Student Loan Breach Exposes 2.5M Records - 2.5 million people were affected, in a breach that could spell more trouble down the line.
    3 years ago
  • Coruja de TI
    A fábrica de cretinos digitais – leitura mais do que obrigatória - A molecada está ficada burra e este livro prova isso.
    3 years ago
  • Notes from MWhite
    I need to take a break - My ALS and Dimentia are really tough to deal with so need a break. BTW, Merry Christmas and Happy New Year! Michael
    4 years ago
  • Small Business Susan
    Essentials Servers – fix up to get remotewebaccess renewed - Users/Consultants stated that when they went to run the RWA wizard that the domain service couldn’t be reached and that dynamic dns can’t be updated and th...
    4 years ago
  • GitHackTools | Hacking Toolkit for Hackers
    TorghostNG 2.0 Release: Non-root functions, support a new language and more - *After a few months of delay, TorghostNG 2.0 finally has been released *😃* Let's see what's news in TorghostNG 2.0:* *Non-root functions* Now you can quic...
    5 years ago
  • Stories by Kyle Hanslovan on Medium
    Validating the SolarWinds N-central “Dumpster Diver” Vulnerability - *Update 1/26/2020*: MITRE assigned CVE-2020–7984 for this vulnerability. *Update 12:55pm 1/24/2020*: SolarWinds has released two hotfixes for the vulnera...
    6 years ago
  • Café com Security
    Mudança de Endereço - Pessoal, estou retornando os assuntos voltados desse blog para o blog original Café com redes, segue o link de acesso: https://www.cafecomredes.com.br/ Ab...
    6 years ago
  • Blog - Flipside
    Conscientização em segurança: como fazer uma campanha eficaz - *Preparar os colaboradores contra todos os tipos de ameaças ainda é um bicho de sete cabeças para os gestores. Aqui você verá algumas dicas simples que p...
    6 years ago
  • Kevin Beaver's Security Blog
    New location for my blog - Hi! I've moved... You can check out my new content and link to all of my old posts at www.principlelogic.com/blog Thanks for staying in touch!
    7 years ago
  • Security
    A look at currency in 2018 - Could Currency Be Destabilized? In 1933 the United States began to move away from the gold standard, the process was completed in 1971. To destabilize the...
    7 years ago
  • benkow_
    Another normal day in cybercrime: from a random Loki sample to 550 C&C - Hi, These weeks, I wanted to spend time on Maltego for testing this amazing tool but for that, I needed something to study. As usual, when I'm in this case...
    8 years ago
  • Alexander Korznikov. A bit of security.
    SSHPry v2 - Spy & Control SSH Connected client's TTY - *- What if we'll have a tool that can show us a terminal of active SSH connection? and... maybe... control it? Record it? Investigate?* I always curious...
    8 years ago
  • Jared Heinrichs
    How to silently install Adobe Reader the correct way - Silent installation using the .exe is usually problematic in one fashion or another. However, unzip the .exe file for Reader with 7-Zip or a similar tool t...
    8 years ago
  • Steven Campbell – Security Analyst, OSCP, OSWP
    Interested or Committed - The one thing that changed my life was when I read about interest vs commitment. Too often I hear people wish that things were different, or they want thin...
    8 years ago
  • Pentester Blogs
    Beginner’s guide: OSSIM (Open Source Security Information Management) part 1 - As we always do, we’ll start from the scratch, the very basics. OSSIM is most widely used open source SIM tool. The appliance is developed by the Alienva...
    8 years ago
  • Pentester Blogs
    Beginner’s guide: How to setup a SOC (Security Operations Center) - Lot of people asks me to put something about setting up a SOC. So from today onwards, I’ll be posting articles about, how to set up a SOC. Unlike my othe...
    8 years ago
  • georgekurtz
    FBI's Top Cyber Lawyer Steven Chabinsky Joins CrowdStrike as SVP of Legal Affairs and Chief Risk Officer - I am delighted to announce that Steven Chabinsky is joining the CrowdStrike team on September 10th, 2012. Steve most recently served in the highest-rank...
    13 years ago
  • Kaotic Creations
    NCRACK: The FTP/SSH/Telnet/HTTP(S)/POP3(S)/SMB/RDP & VNC Protocol Cracker - Ncrack is a network cracking tool that can perform bruteforce/dictionary attacks across the network. It has a wide array of modules available to use which ...
    13 years ago
  • voice of Black Hat
    An Sqli hack. From string based to error based to double query injection. - An Sqli hack. From string based to error based to double query injection. Shout out to my good friend zerofreak who helped me with syntax issues and help ...
    14 years ago
  • Blog
    -
  • Penetration Testing • Security Training Share
    -
  • Comae Technologies - Medium
    -
  • secjuice™ - Medium
    -
  • Matt Suiche – Comae Technologies
    -
  • Legal/ethical hacking. Information security.
    -

Total Pageviews

Blog Archive

  • ►  2026 (30)
    • ►  January (30)
  • ►  2025 (370)
    • ►  December (27)
    • ►  November (28)
    • ►  October (19)
    • ►  September (33)
    • ►  August (13)
    • ►  July (15)
    • ►  June (22)
    • ►  May (37)
    • ►  April (42)
    • ►  March (69)
    • ►  February (42)
    • ►  January (23)
  • ►  2024 (12)
    • ►  April (3)
    • ►  March (9)
  • ►  2023 (2)
    • ►  February (2)
  • ►  2022 (6)
    • ►  October (1)
    • ►  September (1)
    • ►  February (4)
  • ►  2020 (50)
    • ►  September (2)
    • ►  August (5)
    • ►  March (20)
    • ►  February (11)
    • ►  January (12)
  • ▼  2019 (159)
    • ►  December (6)
    • ►  November (15)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (15)
    • ►  June (51)
    • ►  May (55)
    • ▼  April (5)
      • RAID 1 and RAID 5
      • Processor - Slots and HD
      • Group Policy Update - force from Domain Controller
      • GPO policy results
      • Group Policy Course
    • ►  March (3)
    • ►  February (3)
  • ►  2018 (181)
    • ►  November (15)
    • ►  October (68)
    • ►  September (16)
    • ►  July (1)
    • ►  June (10)
    • ►  May (22)
    • ►  April (4)
    • ►  March (8)
    • ►  February (7)
    • ►  January (30)
  • ►  2017 (541)
    • ►  December (33)
    • ►  November (34)
    • ►  October (19)
    • ►  September (48)
    • ►  August (39)
    • ►  July (58)
    • ►  June (48)
    • ►  May (29)
    • ►  April (158)
    • ►  March (63)
    • ►  February (11)
    • ►  January (1)
  • ►  2016 (51)
    • ►  December (4)
    • ►  November (24)
    • ►  October (22)
    • ►  March (1)

Search This Blog

Favorites

  • Schneier on Security
  • security affairs Pierluigi Paganini
  • Brian Krebs
  • Security from IBM
  • thehackernews
  • gohacking
  • offensive-security
  • blog.torproject
  • vulnerability data
  • #antisec hack back
  • darknet.org.uk/
  • latesthackingnews
  • hotforsecurity
  • hackforums
  • myhackerhouse
  • Common Vulnerabilities and Exposures
  • Microsoft Security Bulletins
  • National Vulnerability Database
  • Graham Cluley
  • Advanced persistent cybersecurity
  • leaksource
  • Security Onion
  • Home
  • Google Project Zero
  • /forums.hak5
  • Gary Mcgraw
  • fuping
  • secrary
  • Seclist
  • Kernel Farm
  • hashkiller - md5
  • pentest monkey

Labels

powershell (30) CISSP (29) python (20) AI (15) JavaScript (15) Joke (15) Trump (14) cartoon (13) wireshark (13) Kali_Linux (12) security + (11) Dale Meredith (9) essential_kali_programs (9) Bruce Schneier (8) linux (8) nano server (8) recruitinghell (8) DNS (7) OWASP (7) brasil (7) nmap (7) podcast (7) wireshark brasil (7) CTF (6) Data Breach (6) GWCU (6) JavaScript-simulators (6) Professor_Messer (6) SCCM (6) SNMP (6) Session_Hijacking (6) Social_Engineering (6) XSS (6) vlan (6) Bash (5) DHCP (5) Google_Dorks (5) Google_Hacking (5) NIST (5) Salarios TI (5) Siren (5) broadcast_storm (5) encryption (5) firewall (5) nerd (5) netsh (5) penetration_testing (5) ping (5) policy (5) udemy (5) virtualbox (5) API (4) Burpsuite (4) CIA (4) Cloud (4) Kali_Linux_2017 (4) MFA (4) NAT (4) Privacy Notice (4) Return to Office (4) SSH (4) VPN (4) Windows_Server (4) Workday (4) books (4) curso (4) docker (4) exploit (4) kalilinux2016 (4) router (4) tariffs (4) tor (4) A+ (3) Brazil (3) CISO (3) CVSS (3) Change Management (3) Coup (3) DHCP Relay Agent (3) DevOps (3) Dilbert (3) Europe (3) Framework (3) Gartner (3) Graham Cluley (3) Group Chat (3) Huntress (3) IPv6 (3) Impeach (3) Impostos (3) Jokes (3) LGPD (3) Luigi Mangione (3) MTU (3) Music (3) OSI (3) PKI (3) PRIVACY POLICIES (3) Palo Alto Networks Content Update (3) Pierluigi Paganini (3) Pluralsight (3) Privacy Policy (3) RAID (3) SQL (3) SQL Injection (3) SYN (3) The Simpsons (3) Virginia (3) Weird traffic (3) Windows_Server 2016 (3) automation (3) boot (3) code (3) command line linux (3) command prompt (3) compliance (3) cyber security (3) cybercrime (3) ethical hacker (3) fiber_connectors (3) hacker (3) hiring (3) jobs (3) mykids (3) netstat (3) password (3) patching (3) phishing (3) ransonware (3) reddit_compromised (3) registry (3) reverse shell (3) script (3) webSockets (3) wi-fi (3) wordlist (3) 802.1X (2) AI Agent (2) AI Bias (2) AI Framework (2) AI ROI (2) AI Transformation (2) ARS (2) Apps (2) Azure (2) Banksy (2) Bible (2) Bolsonaro (2) Brian Johnson (2) CMS (2) CVE (2) Challenge (2) Cisco (2) CompTIA (2) CrowdStrike (2) CySA+ (2) Cyber Attacks (2) DFS (2) DOGE (2) Debian (2) Delinea (2) Desktop Experience (2) Domain 4 (2) E-Commerce (2) EUA (2) Economy (2) FAIR (2) FTP (2) Fasting (2) Fortigate (2) Fortinet (2) GenAI (2) Google (2) Governance (2) HTML (2) IBM (2) IIS (2) ITIL (2) Immigrant Life (2) Impersonation (2) Incident_Response (2) Interview (2) IoT (2) JEFFREY EPSTEIN (2) Jesus (2) Journey (2) Kafka (2) Kevin_Cardwell (2) Leadership (2) Malware (2) Mantra (2) Meditation (2) Mentoring (2) Movement (2) NIC teaming (2) NIST CSF (2) Nessus (2) Nietzsche (2) Oauth (2) Obama (2) PCI DSS (2) PHP (2) PSSession (2) Peter Zerger (2) Phish Email (2) Poodle attack (2) Protestors (2) RDP (2) REST (2) Recruiting (2) Right-Wing Politicians (2) Russia (2) SCADA (2) SDN (2) SEC (2) SFTP (2) SMB (2) SMTP (2) SOC (2) SOL (2) SSL (2) Salomon (2) Security framework (2) Session Hijacking (2) Solomon (2) Spanning Tree Protocol (STP) (2) Strategy (2) TFTP (2) TI (2) Terms and Conditions (2) The Zen of Python (2) Troy_Hunt (2) UDP (2) UDV (2) VLAN hopping (2) Venezuela (2) WLAN (2) WPA2 (2) Web Application Firewall (2) Wikipedia (2) Windows Server 2016 (2) WordPress (2) aircrack-ng (2) asymmetric_encryption (2) backup (2) banks (2) banner grabbing (2) blockchain (2) buffer (2) buffer overflow (2) clone a website (2) container (2) course (2) criptografia (2) curso ethical hacker (2) curso web desenvolvimento (2) endpoint (2) erro humano (2) eval (2) geo-tagging (2) hacker ético (2) hacking (2) headers (2) hping3 (2) kali_environment (2) kpg99.in (2) looking-glass (2) man-in-the-middle attack (2) mate-desktop-environment (2) minifier (2) movie (2) port scanner (2) proxy (2) proxychains (2) ps (2) quantumworldit.com (2) remote_control (2) repairing windows (2) risk management (2) risk_management (2) safe mode (2) scam (2) security (2) smig (2) spoofing (2) spyware (2) symmetric_encryption (2) syn scan (2) sysinternals (2) taxes (2) telnet (2) watering_hole_attack (2) wireless (2) zero day (2) -it (1) 1 Timothy (1) 1815 (1) 2025 (1) 2600 (1) 27002:2022 (1) 66 block (1) 70-410 (1) 7056143 (1) 802.11 (1) 802.1AE (1) 802.1Q Trunk (1) 8969 (1) === (1) AAA (1) ACK (1) ACL (1) ADP (1) AI Adoption (1) AI Challenges (1) AI Experiment (1) AI Implementation (1) AI Irony (1) AI Prompt for Policy (1) AI ROI KPIs for business (1) AI initiative (1) AJAX (1) AMD (1) AMD-V (1) API call (1) APIPA (1) APT (1) ARP Cache Poisoning (1) AS (1) ASD (1) ASHRAE Standard 90.4-2019 (1) AVS (1) AWS (1) Access-Based Enumeration (1) Accountable (1) Act of 2013 (1) Activism (1) Administrative Distance (1) Ads (1) Advanced_Operators (1) Akashic (1) Alan Watts (1) Alessia Valentini (1) Amigos (1) Anderson (1) Android (1) Anthi Gilligan (1) Anthropic (1) Antibiotic (1) Anton Goncharov (1) Apple (1) Arctic Wolf (1) Argentina (1) Arnold Cipher (1) Arvind Dilawar (1) Assessments (1) Atomic Power (1) Audit (1) Autism (1) BGP (1) BIOS (1) BSoD (1) BYOD (1) Babak_Akhgar (1) Bart (1) Basic_Questions (1) BeEF (1) Bee Bricks (1) Bell-LaPadula (1) BiTM (1) Biden (1) Big Pharma (1) Bitcoin (1) Booz Allen Hamilton (1) Bots (1) Breathing (1) Brennan (1) Brian Krebs (1) Buddism (1) CA (1) CAB (1) CAT (1) CCB (1) CCENT (1) CCNA (1) CEH (1) CFA (1) CIO (1) CLI (1) CMMC (1) CRL (1) CSI Cyber (1) CSRF (1) CVE-2024-26909 (1) Care (1) Carga tributaria (1) Cash4Life (1) Cellebrite (1) Certificate of deposit (1) Chain of custody (1) ChatGPT (1) Chico Xavier (1) China (1) Chipset (1) Christ (1) Christopher Burgess (1) Chwan-Hwa (John) Wu (1) Cities (1) Claims (1) Cobalt Strike Beacon (1) Coinbase (1) Comfort Zone (1) CompTIA Network + (1) Compromised (1) Conditional Access (1) Configuration Manager (1) Consulted (1) Contemplation (1) Cookies (1) Cora (1) Counter (1) Coursera (1) Crypto (1) Cube Call Recorder app (1) Customization Specs (1) CySa (1) Cyber Command (1) CyberVista (1) DAC (1) DAS (1) DES (1) DFS Terminology (1) DLL (1) DOS (1) DROWN (1) DRP (1) DSS (1) DXXD (1) Dad (1) Darcy Ribeiro (1) Daredevil (1) Data Classification (1) Data deduplication (1) Database Schema (1) David Brooks (1) David_Shipley (1) Deal (1) Dedo de Deus (1) DeepMind (1) Deepfakes (1) Deepseek (1) Defend the Constitution (1) Defender (1) Delinea Secret Server Cloud (1) Democrats (1) Derek Scheller Jr (1) DevSecOps (1) Dialectica (1) Diary (1) Diebold (1) DirectAccess (1) Directory Traversal (1) Directory traversal attack (1) Distro (1) Dollar (1) Domain 1 (1) Donkey (1) Douglas Adams (1) E-book Sales (1) EAP (1) EH-03-L3 (1) ESP (1) EU-US Data Privacy Framework (1) Eco-Construction (1) Ecohosting (1) Edward Amoroso (1) Email Headers (1) Empregos (1) Encapsulation primer (1) Endpoint Management Tools (1) Enterprise AI Strategy (1) Entrepreneurship (1) Equality (1) Erlend Andreas Gjære (1) Espionage (1) EthicalHacking (1) Event (1) Ex-pat (1) Exam 70-703 (1) Executive Summary (1) Exercises (1) Exilio (1) Exit-PSSession (1) Extensible Authentication Protocol (EAP) (1) FAQ (1) FBI (1) FSSO (1) FTPS (1) Fallacies (1) Fed's Policy Conundrum (1) Federal Policy Changes (1) Fedora (1) Feeling (1) Fiddler (1) Firebug (1) Five eyes (1) Flipp (1) Flow (1) Foca (1) Force-TLS (1) Forensics (1) France (1) Franklin Hall (1) Freedon (1) Friends (1) Full Open Scan (1) GAPS (1) GFW Data Leak (1) GLI (1) GPO Update (1) GPO results (1) GPS (1) GPT (1) GPU (1) GRTC (1) Gandalf (1) Gandhi (1) Gemini (1) GenAI: Content Risk Standards (1) General Navigation (1) Gentle (1) GeoServer breach (1) Get-Module (1) Get-PhysicalDisk (1) Glen_Clarke (1) Goal (1) God Mode (1) Google Summer of Code (1) Google dorks (1) GovAI (1) Govern (1) Grama Joanna (1) Greenland (1) Greg Tomsho (1) Group_Policy (1) Guest integration services (1) GuestAdditions (1) Gulf Winds Credit Union (1) Gupy (1) HBR (1) HIPAA (1) HMS (1) HSI (1) HSM (1) HSRP (1) HTTP Statuses (1) Hacker's handbook (1) Hacking Expose (1) Hague Tower (1) Hashing (1) Helen Patton (1) High Availability (1) Hitler's Strategy (1) Holy Spirit (1) Human error (1) Hybrid Environment (1) Hyper-V (1) I2P (1) IAN LESLIE (1) ICMP (1) IDOT (1) IEEE 802.11 (1) IOC (1) IP (1) IPPD (1) IPT (1) IRA (1) ISA (1) ISC2 (1) IT Security (1) Ideal_Hacker (1) Incident (1) Incident Management (1) Information Security Vulnerability Management (1) Informed (1) Insider (1) Installing Docker (1) Interest Rates (1) Internet das coisas (1) Intune (1) Invisible Internet Project (1) Isaca (1) J. David Irwin (1) JIT (1) JK Lialias (1) JSHint (1) JSLint (1) JSON (1) Java (1) JavaScript-questions (1) Jen Easterly (1) Jeremiah (1) Jetpack.exe (1) Job (1) Jobleads (1) Jogo para programadores (1) Johari Window (1) John R. Larsen (1) Justice (1) KCATA (1) KPI (1) KPI Pyramid (1) Kali2019.3 (1) Kaplan (1) Kaspersky (1) Kenya (1) Kevin Beaumont (1) Key Encrypting Key (1) Key Management (1) Kill Chains (1) Kwok Pui-lan (1) LACP (1) LDAP (1) LDAPS (1) LFI (1) LSASS (1) LUN Masking (1) Laurence Bradford (1) Layer 4 (1) Lego (1) Libraries (1) Linux_permissions (1) Liquid Death (1) Living Abroad (1) Lobbying (1) Local file inclusion exploitation tool (1) London (1) Loss Aversion (1) Love Language (1) Luanna (1) LummaC2 Malware (1) Lumo (1) Lyon (1) MATE (1) MDR (1) MFA Joke (1) MITM (1) MITRE ATT&CK Landscape (1) MPPE (1) Machine_Learning (1) Maduro (1) Magazine (1) Mantraps (1) Margaret Sullivan (1) Martin S. Feldstein (1) Matrix (1) Matt Suiche (1) Meditations (1) Meme (1) Memes (1) Mental Immunity (1) Meta AI (1) Metadata removal (1) Michel Serres (1) Michigan (1) Micromanagement (1) Microsoft Baseline Security Analyzer (1) Mike Chapple (1) Misinformation (1) Mnemonic (1) Mobile phone evidence (1) Motorola MTM5400 (1) MsolUser (1) Mu-Mimo (1) Musk Wall (1) MySQL (1) NAC (1) NAS (1) NAT Palo Alto (1) NCSAM (1) NDP (1) NIST 800-37 (1) NIST 800-53 (1) NSX (1) NTLM (1) NV Domain (1) Natasa_Zivic (1) Nathan Salla (1) NationalParks (1) NationalWildlifeRefuges (1) Native advertising (1) NetBIOS (1) NetFlow (1) Network (1) Network + (1) Network Defense (1) Network Function Virtualization (1) Network Management (1) Network_Segmentation (1) New Ideas (1) Newsom troll collection (1) NullCon (1) OSPF (1) OTDR (1) Oberheide (1) Office 365 (1) OpenHeatMap (1) OpenID (1) OpenWRT (1) Operation Condor (1) Organization Responsability (1) Outcome-Driven Metric (ODM) (1) P2 (1) PAM (1) PGP (1) PIN (1) POP (1) PSD2 (1) PXE (1) Pacific Rim (1) Paper (1) Paragon Solutions (1) Patch Management (1) Paths (1) Pentester (1) Peoplesoft (1) Persistence Techniques (1) Persistent Inflation (1) Pesos (1) Philip K. Dick (1) Plato (1) Playbook AI (1) Policies (1) Politica de Privacidade (1) Politics (1) Port Address Translation (1) Pos-Maduro (1) Pos-Pandemia (1) Positive change (1) PowerCLI (1) Powershell reverse shell (1) Practice Exams (1) Pravda (1) Pravda Network (1) Predictions (1) President (1) Prevention Methods (1) Principles (1) Prisma Saas (1) Private Insurance (1) Private SaaS (1) Privilege Access (1) Procrastination (1) Profe (1) Profiles (1) Profissionais de TI (1) Programming (1) Programs (1) Project 2025 (1) Project Russia (1) Promiscuous mode (1) Protest (1) Proton (1) Proton VPN (1) Python3 (1) RACI (1) RAT (1) REPL (1) REST APIs (1) RFC 1918 (1) RFC1918 (1) RHEL (1) RIPv2 (1) RMM (1) ROBOTS.TXT (1) RPM (1) RS-232 (1) RSA (1) RSTP (1) ReFS (1) Recovery (1) Recruiter (1) Red Flags (1) Reddit (1) Reflection (1) Regulatory Repercussions (1) Remote work (1) Requirements (1) Research (1) Resilient File System (1) Resilient Secrets (1) Responsible (1) Richard Feynman (1) Richard Thieme (1) Risk (1) Risk Maturity Model (1) Robert Hackett (1) Ross McKerchar (1) Route.exe add (1) Routing (1) S. 536 (1) SAML (1) SAML entities (1) SAMM (1) SAN (1) SCP (1) SDLC (1) SEH (1) SES Process (1) SHA (1) SIEM (1) SIP (1) SLAAC (1) SOAP (1) SOC 1 (1) SOC 2 (1) SOC 2 Type II (1) SOP (1) SSF (1) SSL VPN (1) SSLscan (1) SSLv2 (1) SUSE (1) SaaS Security (1) Salarios a combinar (1) Sand (1) Satirical Counseling (1) Savior (1) Scams (1) Scholarship (1) Schuman (1) Scrum (1) Sean Wilkins (1) Security Cheat (1) Security governance (1) Security models (1) Session_key (1) Siga o sol (1) Silicon_Valley (1) Simone Petrella (1) Sleep (1) Smurf Ataque (1) Smurf Attack (1) Sn1per (1) Software-Defined Network (1) Sound Cannon (1) Splice-JavaScript (1) Star Method (1) Steward J. (1) Sublist3r (1) Suburbs (1) Subversion (1) Summit (1) SysAdmin (1) System Administrator (1) System Care (1) TACACS+ (1) TCP/IP (1) TDR (1) TI no Brasil (1) TLS (1) TOGAF (1) TOTP (1) TV_Shows (1) Tabela comparativa (1) Tarot (1) Technology fallacies (1) Terms of use (1) Tesla_shit (1) Test-Connection (1) The Citizen Lab (1) The New York Times (1) Third-Party Application (1) Third-party vendor security risk (1) Threats and Vulnerabilities (1) Three-Way Handshake (1) Tim Howard (1) Tim_Peters (1) Time (1) Tom Tobiassen (1) Tony Bradley (1) Tor Project (1) Transient identifiers (1) Triple-DES (1) US-China (1) US-China Trade Dynamics (1) USS Dahlgren (1) Ubuntu (1) Unauthorized DHCP (1) United States (1) University of Cambridge (1) Urban Guerrilha (1) Use after free (1) VITA (1) VLSM (1) VMware (1) VTY (1) ValueError (1) Vanessa_Bohns (1) Vasectomy (1) Video_Game (1) Virtualization (1) Visual_Studio (1) VoIP (1) Voluntary Disclosures (1) Voting Machine (1) Vulnerability Management (1) WAF (1) Wanda Mello (1) WannaCry (1) Washington Post (1) Watson (1) Web Application Attacks Prevention (1) Webinar (1) Wi-fi for hacking (1) WinRM (1) WinVote (1) Windows 2012 R2 (1) Windows Defender (1) World-class research universities (1) XACML (1) XAMPP (1) XML (1) XMLHttpRequest (1) Xfce (1) Xmas Scan (1) Y. Anto (1) Yahoo Hackers (1) ZDnet (1) Zedlan Firewall (1) Zelle (1) Zeot (1) Zone_Transfer (1) abor Market Weakening (1) accuracy (1) adaptadores (1) add-computer (1) adversary model (1) airmon-ng (1) alert (1) alerts (1) alscloud (1) apache (1) approaches (1) aquatone (1) armitage (1) arp -a (1) array (1) assets (1) ataques transitivos (1) atbash cipher (1) attestations (1) attrib (1) autenticação (1) autenticação de dois fatores (1) authoritarism (1) autorunscript (1) autoscan (1) backscanner (1) bad request (1) bastion host (1) bebee (1) bettercap (1) bind shell (1) bitcoins (1) bkhive (1) boardsi (1) bomb (1) bonus (1) brouter (1) browser (1) brute force (1) budget (1) cabeçalhos (1) cain&abel (1) call (1) capturar o pacote (1) capture the flag (1) career (1) cellphones (1) certifications (1) change control board (1) chmod (1) cifs (1) cipher (1) ciphers (1) clicked (1) client side (1) cloud computer (1) cmd.exe (1) cmdlets (1) codecracker (1) comandos (1) common agreements (1) compatível (1) connectionless (1) consciência (1) copying cellphones (1) cracking (1) criar domínio (1) cripto (1) cross-over cables (1) crosstalk (1) crypt (1) cryptography (1) css (1) curl (1) cyber crime (1) cybersecurity incident (1) cybersegurança (1) cyberwarfare (1) data mobility (1) data_processing (1) data_validation (1) dd (1) decoy (1) deduplication (1) deepfake (1) democracy (1) deployment (1) diagnostics (1) diagram (1) dig (1) dist-upgrade (1) domain (1) double tagging (1) downadup (1) dumpster_diving (1) education (1) encoding (1) end-to-end encryption (1) engenharia social (1) entrepreneurial culture (1) entrevista (1) enumeration (1) estrutura do IP (1) etapas (1) ethernet standards (1) event.listener (1) fdisk (1) fiber_optic (1) fierce (1) flags (1) follow the sun (1) footprint (1) for loop (1) fork bomb (1) formas de ajuda (1) free_caller (1) fuzz (1) get (1) get / (1) get request (1) get-service (1) get-wmiobject (1) getElementById (1) gmail (1) googleapis (1) grep (1) grok (1) guest_tool (1) hackers (1) hail mary (1) hardening (1) havij (1) hazard (1) head (1) help (1) hklm (1) hoax (1) http-enum (1) httpd (1) httrack (1) identity perimeter (1) ike-scan (1) improper configuration (1) indeed (1) inetmgr (1) infojobs (1) information gathering (1) insightglobal (1) instalação (1) integrity (1) interactive (1) intercept (1) inventory (1) ip forwarding (1) iptables (1) irc (1) jikto (1) jobconvo (1) jobhire.ai (1) jogo (1) johntheripper (1) jsfiddle (1) jumbo frames (1) jump box (1) kerberos (1) lbd (1) leak (1) left-wing power (1) legal Analysis (1) legal loopholes (1) little child (1) lições de segurança (1) lm (1) load-balancing (1) localhost (1) lock-in (1) log (1) loop (1) loopback (1) loss_of_reputation (1) mac address (1) macchanger (1) maintenance automation (1) mana toolkit (1) manipulação de URL (1) manipulação de dados (1) manuals (1) maturity model (1) md5 (1) mentor (1) metadados (1) metagoofil (1) metasploit (1) methodology (1) microservices (1) mining (1) mitigation (1) monitor mode (1) monopoly (1) mount (1) mounted (1) multi-factor authentication (1) multimeter (1) multiple interfaces (1) multiplexing (1) nationalist (1) nc (1) net neutrality (1) net use (1) netdiscover (1) netsparker (1) network security monitoring (1) nfs (1) noSQL (1) nonce (1) norwintechnologies (1) notes (1) ntdsutil (1) numberIsInteger (1) onion routing (1) operator (1) our artificial intelligence (1) outsider (1) outsiders (1) packet shaping (1) pacto global (1) pam_cracklib (1) papercut (1) patch (1) payload (1) pdf (1) pentest tools (1) phases (1) phishing-resistant MFA (1) phrases (1) piada (1) ping_tool (1) planejamento (1) planning (1) poder (1) poetry (1) políticas cibernéticas (1) port mirroring (1) port scanning (1) portas (1) ports (1) português (1) post (1) post request (1) prayer (1) preschoolers (1) prison (1) privacy settings (1) privilege_escalation (1) problemas de rede (1) produtive (1) proxy server (1) pseudocode (1) psk (1) push-JavaScript (1) pwned (1) questões (1) quotes (1) rabbit (1) rainbowtables (1) rastreamento (1) recon for websites (1) recovery toolset (1) recursive (1) regedit (1) regex (1) regular-expressions (1) remainder (1) repositório (1) resume (1) review (1) rhltechnologies (1) robot (1) rootkit (1) route redistribution (1) routerhunter (1) routers (1) safer_code (1) salting (1) sam (1) samdump2 (1) sandbox (1) sanitization (1) scam Bec (1) scan report (1) searchsploit (1) security alerts (1) security controls (1) senhas comuns (1) server migration (1) server side (1) servers (1) session_persistence (1) setx PATH (1) sh (1) shell (1) shodan (1) single-factor authentication (1) skills (1) slumber (1) snapshot (1) sniffer (1) sniffing (1) sniper (1) softpath (1) sophos (1) source code (1) sources.list (1) spack (1) spam filtering (1) spider (1) spike (1) split horizon (1) spraypaint (1) sqllite3 (1) sqlmap (1) sslstrip (1) stack overflow (1) steganography (1) stegosolve (1) subnet_classes (1) substitution cipher (1) sudo (1) switch (1) switchport access vlan (1) synflood (1) syslog (1) system (1) system images (1) tables (1) tail (1) tail -f (1) take no offense (1) tcp-sequence-number-attacks (1) tcp.flags.push == 1 (1) teaming modes (1) terms of service (1) test (1) testing (1) theHarvester (1) third-party anti-virus (1) tired (1) token (1) tool (1) toolkit (1) tradução (1) trailers (1) traps (1) treinamento (1) trity (1) trobleshooting (1) troubleshooting (1) trust (1) twitter (1) uCertify (1) ubiquity (1) undefined (1) unity (1) untrusted code (1) update attack (1) urna (1) utilman.exe (1) vCISO (1) validator (1) varredura (1) vazamento (1) veridiants (1) version (1) vigilância (1) violação de dados (1) voice (1) vulnerabilidades (1) vulnerability-scanner (1) web desenvolvimento (1) web developer (1) webinject (1) whatjobs (1) why not to live in the US (1) windows (1) windows-virus-malware-troubleshooting (1) wireless_interference (1) workgroup automation (1) wpscan (1) wrong names (1) zombie (1) zoning (1)

Report Abuse

Ferramentas

  • arin
  • Hashcheck
  • Scan vírus without sharing to Anti-virus
Simple theme. Powered by Blogger.