Author's posts

Jan 25

Retina Vulnerability Reporting Issue

If you think you’re doing a bad job at vulnerability management, maybe it isn’t as bad as you think. If you use Retina and Beyond Insight, many vulnerabilities over the past 6+ months may not have been marked as remediated. The scan results may be accurate, but the analytics module continues to show the vulnerability …

Continue reading

Jan 15

2017 Year in Review

I’m a statistic for failed New Year’s Resolutions. Still, I got a lot more done than I would have if I hadn’t set any goals at all. In 2017 I became a CISSP, lost a family member, gained two new family members, saw the eclipse, lost two pets, rode some waves, put out a microwave …

Continue reading

Jun 24

Death to Server Manager Pt 2 – Group Policy Solution

How to Get Rid of the Server Manager Pop-Up For Good! I made a little video just for fun.  This is for anybody who has ever been driven nuts by Server Manager launching automatically.  Here’s part two; a global solution to disable it on all of your servers at once using Group Policy.  

Jun 24

Death to Server Manager

How to Get Rid of the Server Manager Pop-Up I made a little video just for fun.  This is for anybody who has ever been driven nuts by Server Manager launching automatically.  

May 11

Vendors – Select Them Carefully

Vendor Research: Beyond the Fancy Sales Presentations Choosing a vendor for anything is extremely difficult. Sales people only show off the best parts of the product.  Demonstrations are exciting and seem almost magical.  Products appear to solve problems in a way you have never seen before. If you decide to take a product for a …

Continue reading

Feb 01

A Year of Ethical Hacking – Month One

Month One Review One month down, eleven to go. It’s hard to believe that the year is already one-twelfth of the way over! My goal is to spend 416 hours studying Ethical Hacking in one year.  416 isn’t a random number.  416 is 8 hours per week, times 52 weeks.  I finished month number one …

Continue reading

Jan 30

Becoming an Ethical Hacker – Week 4

Week 4 – Privilege Escalation, Antivirus Bypass, and Alternate Data Streams This week, life happened and I didn’t get a whole lot done.  But some progress is better than none. I did manage to escalate a standard user’s privileges to local Administrator and disable Antivirus software.  I also migrated the blog to a new host.  …

Continue reading