Categories
News Software Technical

Bluetooth, NFC, and Wireless Safety

Bluetooth, NFC, and Wireless Safety – Day 6 – 30 Day Security Challenge – TekThing [youtube id=”xL0EMGyCguw” width=”600″ height=”350″] Turn off Bluetooth. Turn off NFC. Turn off auto connect to known wireless access points. Forget networks you don’t normally connect to. Today’s Video and Shownotes: https://snubsie.com/day-6 The Whole Challenge: https://snubsie.com/30-day-security-c…

Categories
How-To Software Technical

Install Microsoft SQL on Linux – Ubuntu Server

I recently had the pleasure of installing Microsoft SQL Server on Linux – Ubuntu Server. This was a very straight-forward installed and just works. The following steps are what were taken to install and configure this server. My Setup: Ubuntu 17.10 Server – VMware Template Network Connectivity SQL Server Management Studio 17 – Testing connectivity […]

Categories
How-To Software Technical

Tech Short: Configure WDS Server

You have installed your WDS Server Role and now its time to configure.  I hope my steps below help you. Requirements Installed WDS Role Administrative Rights Installation Media   WDS Server Configuration: On the Server Manager tool, click Tools and then click Windows Deployment Services. On the Windows Deployment Services console, expand Servers. Right-click your […]

Categories
News

New Phishing Scam Using Microsoft Office 365

*** Attention Required *** It seems that the bad guys are at it once again with an attempt to collect information by phishing credentials from those of us using Office 365 for corporate emails.  The characteristics of this particular attack the hackers intention is to deceive Office 365 users into providing their login credentials”. The […]

Categories
How-To

Disabling SMB1.0/CIFS File Sharing Support

There is a lot of buzz these days about new ransomware hijacking systems worldwide. The malware, dubbed NotPetya because it masquerades as the Petya ransomware. One of the many ways to help the spread of malware is to patch your computer, effectively stopping the SMB exploits by disabling SMBv1. Here are steps which can be used to […]