21 ss Command Examples In Linux

SS Command Examples For Linux

The Socket Statistics (ss) command is similar to netstat, in that it is used to display useful network socket information.

For some time now the netstat manual page has noted “This program is obsolete. Replacement for netstat is ss.”, so this is going to be a useful command to know how to use moving forward.

Fortunately a lot of the options are similar to the ones used by netstat, however there are a few differences as we will see.

Read more »

Implement Policy Changes and Staging with Dynamic Access Control

Implement Policy Changes and Staging

This post will show you how to implement policy changes and staging with regards to auditing using Dynamic Access Control (DAC). This allows us to stage and test a central access policy before actually using it in production. This is a useful feature, as implementing DAC can be complex to work with.

Read more »

How to Restore a Deleted File in Linux

Restore a deleted file in Linux

If you’ve accidentally deleted a file in Linux, don’t worry, you can probably still restore it as long as that area of disk has not yet been overwritten. This post will show you how to easily restore a deleted file in Linux.

Foremost is able to search a disk or raw image file to recover files based on their headers, footers, and internal data structures.

Read more »

Install PowerShell 5 in Windows Server 2008 R2

Download WMF 5.1 to a Windows Server 2008 R2 System

Windows Management Framework (WMF) 5.1 contains PowerShell 5.1. By default Windows Server 2008 R2 SP1 runs the older PowerShell version 2. By downloading and installing WMF 5.1 to a Windows Server 2008 R2 system, we can upgrade it to PowerShell version 5.1.

Read more »

Implement Work Folders in Windows Server 2016

Implement work folders

In this post I’ll show you how to implement Work Folders with a Windows Server 2016 file server and Windows 10 client. Work Folders allow a user to access their files from an internal file server remotely over the Internet.

Read more »

Prevent File/Directory Modification, Deletion and Renaming in Linux

Immutable files in Linux

In order to prevent a file or directory from being accidentally or intentionally modified, renamed or deleted in Linux, we can set the immutable flag which will disable this functionality.

Read more »

Why You Need HSTS (HTTP Strict Transport Security)

Why HSTS is important

The HTTP Strict-Transport-Security (HSTS) header can be used to increase the security of a website. In this post we’ll discuss how it works, why it’s important and why you should consider using the HSTS header.

Read more »

Implement BitLocker Recovery Process using self-recovery and recovery password retrieval solutions

Implement BitLocker Recovery Process using self-recovery and recovery password retrieval solutions

What happens if you forget your BitLocker PIN or lose the key? We can implement BitLocker recovery process using self-recovery and recovery password retrieval solutions in Windows Server 2016.

There are a few different methods of recovering BitLocker which we’ll cover here.

Read more »

Which Version Of Linux Mint Am I Running?

How To Check Linux Mint Version

This post will show you how to check which version of Linux Mint you are running. This can be done both through the graphical user interface or command line, we’ll cover both options here.

Read more »

Configure SMB signing via Group Policy

Configure SMB Signing via Group Policy

The Server Message Block (SMB) protocol is used to provide file and print sharing in a Microsoft based network. To help detect man in the middle (MITM) attacks that may modify SMB traffic in transit, we can configure SMB signing via group policy. By digitally signing SMB packets the client and server can confirm where they originated from as well as their authenticity.

SMB packet signing is available in all supported versions of Windows. Microsoft also note that depending on factors such as the SMB version, file sizes, and specific hardware in use, SMB packet signing can degrade the performance of SMB, which is to be expected as we’re signing every packet that goes across the network, which adds overhead.

Read more »