PowerShell is used by many server administrators. Naturally, one of the most used tasks is the ability to build scripts and functions to inventory your servers and understand what your environment has.
Windows contains a robust, yet easy to use, advanced firewall, and using PowerShell 7 we can easily configure the firewall from the command line. This article covers common commands used in the Windows Firewall and where they may be used.
A hacker can escalate privileges in a domain in many ways, and learning how they work is half the battle in reducing your attack surface. In this post, we’ll go through five ways that a non-privileged user (from now on only called “user”) can utilize to own your network and how you can protect yourself.
One of the more frustrating errors that an end-user or IT administrator can deal with is that of locked files within Windows. When you delete a folder, move a file, or edit a configuration and you encounter a locked file error message, it’s better to deal with that quickly and efficiently.