RPM files exist to make the software installation and upgrading process easier. They allow us to simply use an RPM file to install a software package, and when combined with package managers such as Yum or DNF we will also get all required dependencies downloaded and installed easily.
Monthly Archives: May 2017
NT Lan Manager (NTLM) is a proprietary Microsoft security protocol for providing authentication in the Windows operating system. It’s quite old, and we can implement NTLM blocking to disable it, allowing us to increase overall security by instead moving to another protocol such as Kerberos. We’ll see how to do this in Windows Server 2016 using group policy in the examples here.
BitLocker and Secure Boot are important features for a secured Windows operating system to defend against boot and offline attacks. This post will show you how to enable BitLocker to use secure boot for platform and BCD integrity validation.
During the boot process BitLocker will check that the security sensitive boot configuration data (BCD) settings have not been changed since BitLocker was enabled, recovered, or resumed.
This post is part of our Microsoft 70-744 Securing Windows Server 2016 exam study guide series. For more related posts and information check out our full 70-744 study guide.
The New Technology File System (NTFS) is a proprietary file system created by Microsoft and is used extensively in Microsoft’s Windows operating systems.
By default most Linux distributions are not able to mount NTFS, however it is possible to install a driver that allows us to do this so that we can read and write data to an NTFS disk.
Instead of manually configuring the same Windows Firewall rules on many different servers, we can import and export Windows firewall settings to transfer them between different servers.
We can also import the firewall rule policy file into a Group Policy Object (GPO) to apply it automatically throughout a whole domain.
A few days ago, Cloudflare announced Argo, their new solution for a faster, more reliable, more secure Internet. My first thought was of course to perform an Argo benchmark to see how well it works.
I’ve previously taken a look at the Cloudflare Pro plan, and I’ve been paying for it ever since despite it not actually being of that much use to me.
Argo however appears to be exactly what I’m interested in, a new way of squeezing out yet more performance, so let’s find out how Cloudflare’s new Argo service performs with some benchmarks!
This guide will show you how to install Linux Mint step by step. Mint is a distribution of Linux which is based on Debian and Ubuntu and aims to be both powerful and easy to use. As the most popular Linux distribution according to distrowatch, it seems to be achieving these goals.
There are a few options available when picking a version of Linux Mint to download. This post will discuss the various considerations associated with downloading Linux Mint.
We’ll help you choose between 32-bit or 64-bit architectures, and discuss the differences between the four different desktop environments available, Cinnamon, MATE, Xfce, and KDE.
Security baselines are used as templates to control the security settings that apply to the Windows operating system or piece of Microsoft software. We can create, view, and import security baselines with Security Compliance Manager (SCM), allowing us to quickly modify various security specific settings which is what we’ll cover here.