Categories
News

New Phishing Scam Using Microsoft Office 365

*** Attention Required *** It seems that the bad guys are at it once again with an attempt to collect information by phishing credentials from those of us using Office 365 for corporate emails.  The characteristics of this particular attack the hackers intention is to deceive Office 365 users into providing their login credentials”. The […]

Categories
News

Darrell’s Flashback Ugly 90s Fashion Show! – #DoubleFML FatDarrellPalooza!

Really cool that I got the honorable mention in this post. Brings back good memories.   https://doublefml.com/2017/07/11/darrells-flashback-ugly-90s-fashion-show/

Categories
How-To

Disabling SMB1.0/CIFS File Sharing Support

There is a lot of buzz these days about new ransomware hijacking systems worldwide. The malware, dubbed NotPetya because it masquerades as the Petya ransomware. One of the many ways to help the spread of malware is to patch your computer, effectively stopping the SMB exploits by disabling SMBv1. Here are steps which can be used to […]

Categories
How-To Technical

Server 2008 R2, ‘Powershell’ is not recognized as an internal or external command …

While working on a task scheduling a powershell script, it was noticed that the powershell command does not execute from the command prompt on a server. When run I would encounter the following error: ‘powersehll’ is not recognized as an internal or external command, operable program or batch file. After searching around Google / Bing I […]

Categories
News

‘WannaCry’ Malware Attack

By now many of you have read reports on various news channels, blog posts, etc… This flaw was patched in Microsoft’s March 2017 update cycle (MS17-10). The ‘WannaCry’ (‘WannaCrypt’, ‘WCRY’) was reported worldwide on May 12th 2017 as a ransomeware worm targeting out-of-date systems.  WannaCry is leveraging vulnerabilities that were previously fixed on systems that have been […]

Categories
News

The Ten Immutable Laws Of Security: Version 2

You can’t patch these, but you can take steps to be more aware of these law’s.   Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. Law #2: If a bad guy can alter the operating system on your computer, it’s not […]