FileHash v5.4 has recently been released, and we’ve added some URL parsing to find hashes that can be compared to existing files via the -y and –hl parameters Instead of having to manually obtain the checksums for files you want to compare, before you can use...
FileHash v5.0 has just been released, and it comes with a focus on making it easier to automate the following two things: Obtain the checksums of a set of files in a directory (and subdirectory), and then use that checksum list to compare the same directory structure...
Yes, you need to understand technology and cybersecurity architecture. No, it doesn’t matter what your business is about – you need to understand this if you want your business to succeed. No, it’s not “fair”. No, there’s not enough time in a day. ...
This past month, I put together a new utility, SyslogTally, because I needed to easily and quickly answer a question pertaining to how frequently various scripts were being used in my environment. Original Need This question about script usage frequency first arose...
Once upon a time, I needed to get a quick and dirty file integrity checking process in place for Windows systems so that we could meet a customer compliance requirement that was growing more and more popular. FIM – File Integrity Monitoring At the time, we were...
Lately, we have been hearing a steady refrain concerning cybersecurity: “It is impossible to guarantee security. Breaches are inevitable.” Is it really so because it is asserted with authority and confidence? Is it so because it is oft repeated? Inevitably, we are...