Author Archives: David

May 01
2014

MS14-021 Bulletin Patch released today for the Microsoft Vulnerabilty In IE

Microsoft went back on their word today, but in a good way and upon release of the new update that will patch a huge vulnerability in IE decided that they will cover XP users as well. Good stuff because previously … Continue reading

Posted in Windows | Leave a comment
Apr 29
2014

Microsoft Internet Explorer Vulnerability

  This weekend Microsoft confirmed the presence of an Internet Explorer vulnerability, as well as active attacks against this vulnerability, in every version of Internet Explorer. This vulnerability could be used to silently install malicious software without knowledge or assistance … Continue reading

Posted in Information Assurance, Windows 7, Windows 8 | Leave a comment
Mar 01
2014

How to encrypt your files and raise the bar to protect your data? – Part I

OK, with all the Big Brother government stuff that has been going on for years and been hitting the fan with the media (especially with the Snowden disclosures), – a lot of people are wondering how they can protect their … Continue reading

Posted in Information Assurance, Security Tutorials, Windows 8 | Tagged , , , , , , , , , , , , , , , , , , | Leave a comment
Feb 28
2014

How to remove NetBIOS from Windows 8 & 8.1 like a bad tooth…

OK, in my last article I talked about the steps to perform to remove NetBIOS from Windows 7, so this time I’ll talk about removing it from Windows 8. Yes, Microsoft has even left this silly service enabled on it’s … Continue reading

Posted in Security Tutorials, Windows 8 | Tagged , , , , , , , , , , , , , , , | Leave a comment
Feb 26
2014

How to execute NetBIOS with extreme prejudice…

Fact, there is a legacy protocol that comes enabled out of the box in every version of Windows I know of in use, and it’s called NetBIOS.  To me it is dangerous protocol because it divulges too much information to … Continue reading

Posted in Security Tutorials, Windows, Windows 7 | Tagged , , , , , , , , , , | Leave a comment
Feb 23
2014

Exporting and Importing Hyper-V guests…

“I’ve seen things you people wouldn’t believe…” [laughs] attack systems firing on our Hyper-V guests beyond the shoulder of our firewalls, I watched photons underline the Heisenberg uncertainty principle. All those moments will be lost in time, like photons that … Continue reading

Posted in Windows Server | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment
Feb 22
2014

Autochk cannot run due to an error caused by a recently installed software package.

If you wish to skip this story and find the solution… just go to the “Here’s what I did to fix it:” section – otherwise carry on.  Also you can perform this fix on different versions of Windows as long … Continue reading

Posted in Windows Server | Tagged , , , , , , , , , , , , , , , , , , , | Leave a comment
Sep 07
2013

Mac and Linux users beware… our OS(s) are becoming more popular (that’s not nessarily good)!

It has been been about a year or so since the latest java cross platform (operating system) attack hit the main news and yet I still know of people that refuse to run malware protection not only on Macs but … Continue reading

Posted in Information Assurance | Leave a comment
May 10
2012

Cyber attackers can come in many forms, even resorting to contacting victims in person

  I just heard from my wife today that my neighbor received a call from a possible computer attacker on the phone last night. The scam is that the potential attacker cold called my neighbor (the potential victim) in order … Continue reading

Posted in Information Assurance | Leave a comment
Apr 20
2012

Computer Gremlins

It doesn’t matter if you’re a computer security professional or a person who just purchased a computer for the first time – sooner or later we all have run into the hideous computer gremlins. These gremlins can take the form of computer … Continue reading

Posted in Information Assurance | Leave a comment