Entreprises piratées
Stay updated on the latest cyberattacks against businesses in 2024. Learn about compromised data and actionable tips for enhancing cybersecurity
Stay updated on the latest cyberattacks against businesses in 2024. Learn about compromised data and actionable tips for enhancing cybersecurity
Select a date from the calendar to see the website as it appeared on that day.
Generate a report and list the technologies, frameworks, scripts, and other resources used by the site.
OWASP Top 10 list of the most common and critical web application vulnerabilities
Discover the LOLBAS and GTFOBins projects, tools that penetration testers use to exploit native binaries for privilege escalation, command execution, and data exfiltration.
Create a free account on WPScan to run security scans on WordPress sites. Learn to install Kali Linux and perform tests using WPScan with API tokens.
Securely track security alerts and RSS feeds with FreshRSS on Docker for Synology. Learn to set up a CNAME, configure a reverse proxy, and stay updated on cybersecurity news.
Create a detailed WSUS HTML dashboard with PowerShell, including configuration, task scheduling, and IIS virtual directory setup.
Learn how to automate WSUS patch assignment to different target groups using PowerShell scripts and scheduled tasks.
A detailed guide to installing and automating WSUS (Windows Server Update Services) for Windows, covering setup, patch deployment automation, and monitoring via dashboards. Perfect for streamlining patch management.
This guide provides detailed steps for downloading, installing, and configuring pfSense on a virtual machine. It includes setting up two network cards—one for internet access and the other for a local network—and initial configurations like disabling DHCP and setting the DNS.
A step-by-step guide to downloading and setting up Oracle Linux 9.4.0 in a virtual machine, including configuring settings such as RAM, network, and disabling secure boot. Ideal for users looking to create a virtual environment for testing and development.
Step-by-step guide on how to download and install Parrot Security OS on Hyper-V. Includes detailed instructions for setting up a new virtual machine, configuring network settings, selecting installation options, and completing the installation process to have Parrot OS ready for use.
This tutorial guides you through setting up Kali Linux on a Hyper-V virtual machine. Step-by-step instructions and images help ensure a smooth installation, from selecting the installer to configuring the GRUB loader, making it ideal for users setting up a secure testing environment.
This blog post guides IT administrators on how to retrieve and verify the Key Management Service (KMS) host name using PowerShell. It covers how to perform a ping test and check port connectivity to ensure the KMS host is properly communicating within the network.
Learn how to use a PowerShell script to display computers with the highest error history from WSUS. This guide provides step-by-step instructions and the full script for generating and analyzing error logs.
Learn how to generate and merge Windows Update log files using PowerShell. This guide provides step-by-step instructions to create a detailed log file for troubleshooting Windows Update issues.
This article provides a script that searches and uninstalls Windows Update packages based on a given KB number
command-line instructions to add specific exclusions to Windows Defender.
Learn how to efficiently cleanup your WSUS server using a Powershell script. Automate WSUS maintenance tasks, ensuring optimal performance and freeing up server resources.
TLS 1.3, Client Verification, Web Browser, Windows Commands, Cipher Suites, Windows 11, Security, TLS_AES, TLS Cipher Suites
Discover how to connect to the integrated database (BDD) of WSUS using specific server paths. The article provides detailed instructions, including the necessary Powershell script.
In WSUS, there may be instances where the incorrect client version is displayed. This article clarifies the version shown.
Explore the process of managing Windows updates using the PSWindowsUpdate PowerShell module. The article provides detailed instructions on installing the module, both manually and using standard methods, and offers insights into its utilization for checking update settings, installing patches, and viewing update history.
A comprehensive guide on how to activate TPM (Trusted Platform Module) chips across various platforms including Dell, HP, Hyper-V, and VMWare Workstation. The article provides detailed PowerShell scripts, methods, and insights for enabling TPM security in different environments.
Explore two efficient methods to move the integrated WSUS database: using SSMS and sqlcmd. The article provides step-by-step instructions, including stopping services, detaching and attaching the database, and ensuring proper permissions. It also offers links to essential tools for the process.
Dive into a detailed guide on setting up and configuring Windows Server Update Services (WSUS). Learn about automated patch approvals based on groups, and ensure your enterprise systems stay updated and secure.
A comprehensive guide on deploying BitLocker in a business setting, covering Active Directory configuration, TPM chip management, and automated BitLocker activation using scripts.
To set up LAPS on a domain controller, start by installing it with management tools and extend the AD schema using PowerShell commands. Set up a central store for ADMX files and create a GPO to manage local admin passwords. Give appropriate permissions for reading and resetting passwords in AD, and install LAPS on client computers using a GPO for automatic password backup in AD.