EXE to MSI – How to deploy an exe based installer in a Microsoft world

The auto-execution of .exe files can be problematic, given increasing incidents of Internet crime and cyber-terrorism.  One solution is to pre-package installers and executables so that they may be recognized by system security controls. Within the Microsoft Windows environment, the … Continue Reading

The Value of Adding AngularJS to your Development Stack – with Dan Wahlin

AngularJS is one the hottest JavaScript group frameworks available today. Is it worth adding it to your development stack? That’s what we’re going to address in this video. AngularJS is one the hottest JavaScript group frameworks available today. Is it … Continue Reading

How to configure Compound NTFS Permissions in Windows Server 2012

Video tutorial on how to configure Compound NTFS Permissions in Windows Server 2012 See our class schedule for complete Course Schedule Training. Classes are held in Phoenix, AZ and can be attended online from anywhere in the world with RemoteLive™. Instructor: Rick Trader  Video … Continue Reading

How to configure gateway redundancy with VRRP in IOS

I recently posted a blog (How to configure gateway redundancy with HSRP in IOS) about how to configure HSRP for gateway redundancy. In that blog I mentioned that there is an alternate protocol which performs the same functionality as HSRP, … Continue Reading

How to add the Dial-in Tab in Windows 7

After downloading and installing the Remote Sever Administration Tools (RSAT) in Windows 7 the Dial-in tab is missing in both the Active Directory Administrative Center (ADAC) (See figure 1 ).and Active Directory Users and Computers (ADUC) (See figure 2 ). … Continue Reading

Running PowerShell in Windows 8 (or 8.1) PE Environment

Microsoft promotes the use of PowerShell in Windows 8/8.1. Courseware materials even suggest that MCT’s instruct their students regarding specific PowerShell capability for use in preparing drives, deploying Windows Image Files, and performing trouble shooting operations from the Windows Recovery … Continue Reading

Using SuperScan to Reconnoiter an Internal Network

The importance of reconnaissance in vulnerability discovery and penetration testing is usually overlooked. Network security personnel with little training or experience will often begin their analysis by finding a few target systems and immediately attempt to compromise their security with … Continue Reading

Resetting bulk Active Directory User Attributes (Properties) using PowerShell

Video tutorial on how to Resetting bulk Active Directory User Attributes (Properties) using PowerShell See our class schedule for complete Course Schedule Training. Classes are held in Phoenix, AZ and can be attended online from anywhere in the world with RemoteLive™. Instructor: Rick Trader … Continue Reading

Walk softly and carry a Router-on-a-stick! (ROS)

So you are maintaining a medium-sized network and you want to route traffic between your VLANs.   What are your options?  You can place one router interface in one VLAN and another router interface in each of the additional VLANs, but … Continue Reading

Multiple Joins Work just like Single Joins

Before reading this article, you should have a good understanding of single joins between two tables and be clear on the differences between inner and outer joins. Check out my previous post A Primer on Joins to help you accomplish this. Have you … Continue Reading

A Malware Recovery Scenario – Hacktool

A former student sent me an email requesting assistance with a computer issue. Microsoft Security Essentials continued to post the message “error warning: HACKTOOL:WIN32/Keygen”. Hacktool malware was quarantined. Other symptoms started to appear. Following appropriate guidance, the student looked into … Continue Reading

How to Reset a Windows Client Secure Channel Password – Video

Video tutorial on how to Reset a Windows Client Secure Channel Password by Rick Trader. The Secure Channel Password between the client computer and your Domain Controller has become a mismatch. See our class schedule for complete Course Schedule Training. … Continue Reading

Correcting Direct Access Configuration Errors

One of the labs within the Configuring Windows 8/8.1 course (20687D) enables students to experience Microsoft Direct Access. Admittedly the virtual environment is pre-staged and the experience is more truly designed to help participants understand the steps required to use … Continue Reading

Using the Low Orbit Ion Cannon for Denial of Service Testing

A very common attack technique in use today is the Denial of Service (DoS) attack. DoS attacks are effective in degrading the performance of targeted systems, effectively taking them offline and preventing legitimate system use. A typical DoS attack goes … Continue Reading

Good to Great and Project Management Parallels

Good to Great by Jim Collins (Harper Business, 2001) provides a statistical analysis of the characteristics that enable a good company to shift or change toward sustained greatness.  Several of the characteristics might be directly correlated to some of the … Continue Reading

A Primer on Joins

The golden rule of OLTP database design is that every table should represent one, and only one, entity-type. Without this rule, databases can exhibit three data anomalies (insertion, deletion, and update anomalies) that undermine data integrity. But adherence to the … Continue Reading

Yes, you can get IPv6 in your home!

If you read my recent blog regarding the availability of IPv6 in one’s home, then you will appreciate that I have followed through on my promise to blog about my experience.  After all that waiting, the end result was actually … Continue Reading

How to clone a Windows Server 2012 or 2012 R2 Domain Controller

Video tutorial on how to clone a Windows Server 2012 and 2012 R2 Domain Controller by Rick Trader. One of the coolest new features in Window Server 2012 and Windows Server 2012 R2 is the ability to clone a Domain … Continue Reading

Can I get IPv6 in my home?

32 bits, 64 bits, 128 bits, a dollar, all for IPv6, stand up and holler. Sounds like a snooty football chant, doesn’t it? Yet the cadence is off. Parts of it are way too long. But enough about the down … Continue Reading