Mr. Jack Foster has written an excellent article on this topic:
Thoughts for Generating Good Passwords
article #1262, updated 263 days ago
Block Removable Devices by Group Policy
article #1247, updated 347 days ago
It’s very possible, per user or per computer:
It’s done in Policies, Administrative Templates, System, Removable Storage Access. There are quite a few granulations available.
NIST National Vulnerability Database
article #1244, updated 368 days ago
Nicely searchable, including for CVE numbers:
Identify safe and infected web sites
article #1234, updated 404 days ago
From the remarkable Tharin Brown:
article #1174, updated 546 days ago
A number of Internet tools use DNSBLs (DNS blacklists) and retrieve them by HTTP/HTTPS. Here are a number of good resources for this.
article #1139, updated 644 days ago
This tool decommissions quite the list of Windows 7 through 10 telemetry inclusions by which Microsoft informs itself of our behavior, using quite a lot of our RAM, CPU, and bandwidth in so doing.
Brought to this forefront by the Beard, Mike Hunsinger.
Reset password on Linux from GRUB
article #1076, updated 777 days ago
If you have access to the console and the machine runs GRUB or something similar, reset of a password is easy. Just interrupt the boot before kernel load (hit the Tab key if it really is GRUB you have there), edit the kernel load line, and add the following to the very end:
Then boot that kernel load line (F10 in GRUB) and the machine will come up in single-user ‘bash’ shell, and you can run ‘passwd’.
The Davidic User Profile Lesson
article #997, updated 1096 days ago
The amazing David Lewis recently discovered something very close to unbelievable. A user profile on a PC — not a user, not a PC — had full administrative rights to a folder on a server on the domain, where the user was explicitly denied such rights. Deletion and replacement of the user profile, eliminated the problem.
Check yourself to see if your accounts are compromised
article #796, updated 1657 days ago
A well-recommended site:
New form of PC security software
article #458, updated 2635 days ago
Worth a strong look.