http://www.enterprisedaddy.com/2016/11/vsphere-6-5-vcenter-high-availability-vcha/
The first variant discovered by Jakub is called PayDOS and is a batch file converted into a executable. When run, the executable will extract the batch file into the %Temp% folder and run it from there. Once executed, batch file will scan certain folders for certain file extensions and rename the file so that one letter […]
https://blogs.office.com/2016/11/02/introducing-microsoft-teams-the-chat-based-workspace-in-office-365/
Recently I had a chance to get my hands on this excellent Firewall by Checkpoint. And as you know not everything goes perfectly, and this is where you get a chance to learn how it works, while you fix. I encountered an issue where one of the Threat Prevention Blades was stuck in updating mode […]
The following is a quick video of the setup of a Checkpoint 600 Security Appliance Notes right from the admin guide: http://downloads.checkpoint.com/dc/download.htm?ID=24000 Check Point 600 Appliance Overview Check Point 600 Appliance delivers integrated unified threat management to protect your organization from today’s emerging threats. Based on proven Check Point security technologies such as Stateful Inspection, […]
Capture PuTTY Session Logs
In the past week I have had my good share of working on remote systems where I needed to utilize the tool PuTTY to issue commands; not all of them documented. To assist me in documenting my steps I often use the session logs. However this normal has been a manual process in the heat of […]