Wednesday, August 24, 2022
An Example of a Useful Notification Email
›
You should have monitors in place to detect problems in your enterprise. These can be individual monitors defined for an agent, or queries/t...
Friday, May 6, 2022
The Cylance Smart Antivirus agent will ruin your day
›
I am currently helping a customer move their ITM 6 infrastructure from AIX to Red Hat 8, and the largest hurdle has been the Cylance agent. ...
Tuesday, January 25, 2022
Configuring certificates for the Netcool email probe when using Office365
›
Background If your company uses Office365 for email, and you need to use the Netcool Email Probe, you will have to configure a KeyStore dat...
Friday, January 7, 2022
10 Things to Avoid Doing in MS Excel and Their Alternatives
›
Microsoft Excel is an amazingly powerful tool that has more capabilities than most people can imagine. Today I ran across this video that c...
Tuesday, December 28, 2021
The best video I've ever seen for learning Regular Expressions
›
I've worked with regular expressions for a long time now, and I'm always working on getting better at them. I ran across this 20-min...
Monday, December 20, 2021
The Zero-click exploit that Google researchers say is 'the most technically sophisticated exploit ever seen'
›
In contrast to the trivially-exploitable Log4j2 exploit, here's a zero-click exploit from NSO group. Here's an article describing i...
Tuesday, December 14, 2021
Interesting article on the new frontier of botnets identifying C2 servers using "memo" data in blockchain transactions between known wallets
›
The title tells you the gist of the story, but here's the full article: https://gizmodo.com/how-cybercriminals-are-using-bitcoins-block...
‹
›
Home
View web version