For several years now I have been using multiple e-mail addresses to both organize and compartmentalize my e-mail. I have found several tricks worth sharing ...
During this post, you will learn about custom policies, one of two sign-in options provided by an Azure AD B2C tenant (the other is user flows). Custom Policies allow us to create unique authentication methods based on our requirements.
This article series will show you how to utilise the Next Generation Cryptography (CNG) API from Microsoft for modern hashing and encrypting/decrypting in VBA.
In this part: Encryption.
This article series will show you how to utilise the Next Generation Cryptography (CNG) API from Microsoft for modern hashing and encrypting/decrypting in VBA.
In this part: Hashing.
This article series will show you how to utilise the Next Generation Cryptography (CNG) API from Microsoft for modern hashing and encrypting/decrypting in VBA.
In this part: Storing hashed or encrypted data.
This article series will show you how to utilise the Next Generation Cryptography (CNG) API from Microsoft for modern hashing and encrypting/decrypting in VBA.
In this part: Handling passwords.
This article series will show you how to utilise the Next Generation Cryptography (CNG) API from Microsoft for modern hashing and encrypting/decrypting in VBA.
In this part: Compatible with other environments.
Microsoft Internet Explorer prior to version 11 does not support modern encryption. A client connecting to a properly-configured modern web server, claiming to be Internet Explorer with a version prior to 11, is actually a robot spoofing its browser identification and should be blocked.
This is another small article in my Bitlocker article series.
It is about encrypting virtual machines.
The scenario that I am securing the VM against, is that an attacker has physical access to the host and is trying to read out the virtual hard drive of the guest systems.
In this article, I will take a look at Microsoft Bitlocker Administration and Monitoring (“MBAM”) and conclude, why I prefer my own scripts for deployment and management.
In this article, will demonstrate how to deploy standalone RD gateway server on 2012 R2 server without deploying RDS infrastructure. RD Gateway is a built-in windows server role and allows RDP to internal servers from the internet through the Https tunnel.
This is yet another bitlocker article. I will cover only a very small aspect: the pre-provisioning process.
Without getting technical, this process means “turning on bitlocker before anything else”.
If someone asked you: "what is the single dumbest thing Microsoft has ever done?", what would you answer?
Since I am mainly an IT security guy, here is my answer from a security perspective.
Those who administer bitlocked networks with pre-boot authentication know how unpleasant it can get if you would like to start a device in the absence of the user. I will remind you of a well-known way that lets you boot up and/or recover these machines at ease and help you to use it safely.
Leaving sensitive information (like passwords) in clear text scripts is never a good practice, though it's sometimes unavoidable. This set of VBScript functions can be used to obscure critical information making it at least a little more difficult for curious eyes (or worse) to see.
This article covers an all-important comparison between Tokenization vs Encryption. Also, read about What Tokenization & Encryption is in detail. Both technologies are used for Cloud data security to prevent cyber crimes.
In this interview with the head of client strategy for blockchain developer Very, we take a look inside the growing popularity of blockchain development and how this technology can make an impact beyond Bitcoin.