Monitoring Windows Security Logs with SCOM ACS
In the current information technology environment, server, application and network devices are monitored by many monitoring applications. Although applications can monitor, monitoring and reporting of …
Knowledge pool for Information Technologies
In the current information technology environment, server, application and network devices are monitored by many monitoring applications. Although applications can monitor, monitoring and reporting of …
After using the weaknesses of a machine, exploiting that machine and buying a meterpreter shell, I will talk about the mimetic module and its use …
DEP (Data Execution Prevention) is a security feature that comes with Windows XP SP2. It prevents some unauthorized codes from running on certain memory sections …
Some scenarios in DLP POC processes are as follows. These are the scenarios that come to my mind. You can further expand these scenarios. Protection …
When we look at the definition of DLP it means Data Loss Prevention or Data Leakage Prevention. With DLP software, you can prevent the unwanted …
There are several theories about where the word ping comes from. One of them is that the word ping is an acronym, that is, the …
GNS3 is a Graphical Network Simulation program. You can easily operate devices such as Cisco Switch and Router on GNS3. You can improve yourself and …
One of the most common operating systems that incorporate networks in windows systems. This article examines the installation of the Windows 7 operating system on …
One of the features used for authorization in Windows is User Account Control (UAC) protection. UAC is used to control some operations performed by the …
You can, control Windows with CMD commands and do many things that are not available in the Windows graphical interface and find a lot of …