Popular Searches

Five Ways a Non-Privileged User Account Can Own Your Network

A hacker can escalate privileges in a domain in many ways, and learning how they work is half the battle in reducing your attack surface. In this post, we’ll go through five ways that a non-privileged user (from now on only called “user”) can utilize to own your network and how you can protect yourself.

How to Manage Open File Handles with PowerShell

One of the more frustrating errors that an end-user or IT administrator can deal with is that of locked files within Windows. When you delete a folder, move a file, or edit a configuration and you encounter a locked file error message, it’s better to deal with that quickly and efficiently.
More Articles