Once upon a time, I needed to get a quick and dirty file integrity checking process in place for Windows systems so that we could meet a customer compliance requirement that was growing more and more popular. FIM – File Integrity Monitoring At the time, we were...
There’s a saying in project management that been attributed to Jack Bergman, “there’s never enough time to do it right the first time, but there’s time to dot it over.” Sadly, many leaders and organizations appear to operate by this maxim. According to a report by...
Of all the console utilities that I have written to support my systems automation endeavors, my first, favorite, and most extensively used utility is: DATEINFO.EXE. Over the years (decades), I have developed many Windows Shell scripts which needed to be able track...
Are your security tools able to uncover attackers who have made it into your network and are now hiding in the shadows? This is a very interesting read… Hiding in the Shadows at ‘’ManagedBy’’...
Intel continues to have security issues — this one affects MacBooks as well… Almost all Macs since 2011 affected by new ‘ZombieLoad’ Intel chip vulnerability, patch included in macOS 10.14.5 Also…...
It is not every day that one gets an opportunity to put together a wish list of technology solutions that could be used to drive a modern, highly productive workplace. So, let’s begin our If Money Were No Object quest… Every office has desktops and notebooks, and...