Microsoft announces changes to Windows Server 2012 MCSA Certification

Are you working towards your Windows Server 2012 Microsoft Certified Solutions Associate (MCSA) credentials?  If so, you now have more options for your exams.  Starting on 15 September 2014 there are now electives for your MCSA certification. There are now … Continue Reading

Getting ready for the PMP Exam: Rent versus Buy

In a recent blog, Getting ready for the PMP Exam: Contract Risk, I addressed relative procurement risk and the selection of contract types. Within that blog I compared the initiation of procurement with the initiation of a project. In our … Continue Reading

How to add the Dial-in Tab in Windows 8 and Windows 8.1 Remote Sever Administration Tools (RSAT)

After downloading and installing the Remote Sever Administration Tools (RSAT) in Windows 8 and 8.1 the Dial-in tab is missing in both the Active Directory Administrative Center (ADAC) (See figure 1 ).and Active Directory Users and Computers (ADUC) (See figure … Continue Reading

An introduction to GLBP in Cisco IOS

I have posted blogs dealing with HSRP and VRRP.  Today’s topic takes this idea a step beyond what is possible with those protocols by introducing the concept of Gateway Load Balancing Protocol (GLBP).  Let’s begin by viewing the network scenario … Continue Reading

Subnetting a TCP/IP Network using the Magic Box Method

Video tutorial Subnetting a TCP/IP Network using the Magic Box Method See our class schedule for complete Course Schedule Training. Classes are held in Phoenix, AZ and can be attended online from anywhere in the world with RemoteLive™. Instructor: Rick Trader  Video Transcription: One … Continue Reading

Using Nmap to Reconnoiter the DMZ and Perimeter Networks

The importance of reconnaissance in vulnerability discovery and penetration testing is usually overlooked. Network security personnel with little training or experience will often begin their analysis by finding a few target systems and immediately attempt to compromise their security with … Continue Reading

Windows Image File Exclusions

When discussing the creation of Windows Image files (.wim), I am often asked if any files or folders are excluded by default. The answer is yes and no, depending on the tool(s) that you use. Read on for a deeper … Continue Reading

Getting ready for the PMP Exam: Contract Risk

My students regularly identify four areas with significant question volume on the PMP® exam: schedule diagrams, earned value management, risk calculation, and procurement. This feedback may reflect the preponderance of mathematics in the first three topics.  Project Procurement Management crosses … Continue Reading

Using WebRipper to Examine Website Content

A skilled attacker usually begins an attack by performing detailed reconnaissance. Recon is critical to a comprehensive attack as it yields information about the target network, hosts, personnel, publicly accessible assets, and a host of other data. One of the … Continue Reading

Using PowerShell to Reset Active Directory Passwords in Bulk

Video tutorial on Resetting bulk Active Directory User Passwords using PowerShell See our class schedule for complete Course Schedule Training. Classes are held in Phoenix, AZ and can be attended online from anywhere in the world with RemoteLive™. Instructor: Rick Trader  Video Transcription: Video … Continue Reading

Lunchtime Webinar: JavaScript for C# Developers With Dan Wahlin. Sept 24, 2014 12:00PDT/MST

Lunchtime Webinar: JavaScript for C# Developers With Dan Wahlin   Cost: FREE Date: Wednesday, Sept 24 Time: 12 Noon PDT/MST/Phoenix Duration: 1 Hour Is JavaScript worth taking the time to learn if I’m a server-side .NET developer? How much of … Continue Reading

Is your Android Device Tracking your Every Move?

If you have not changed the default settings on your Android device then the answer is Yes it is. The feature Google Location History is turned on by default on your device. Using Google Maps you can see everywhere you … Continue Reading

EXE to MSI – How to deploy an exe based installer in a Microsoft world

The auto-execution of .exe files can be problematic, given increasing incidents of Internet crime and cyber-terrorism.  One solution is to pre-package installers and executables so that they may be recognized by system security controls. Within the Microsoft Windows environment, the … Continue Reading

The Value of Adding AngularJS to your Development Stack – with Dan Wahlin

AngularJS is one the hottest JavaScript group frameworks available today. Is it worth adding it to your development stack? That’s what we’re going to address in this video. AngularJS is one the hottest JavaScript group frameworks available today. Is it … Continue Reading

How to configure Compound NTFS Permissions in Windows Server 2012

Video tutorial on how to configure Compound NTFS Permissions in Windows Server 2012 See our class schedule for complete Course Schedule Training. Classes are held in Phoenix, AZ and can be attended online from anywhere in the world with RemoteLive™. Instructor: Rick Trader  Video … Continue Reading

How to configure gateway redundancy with VRRP in IOS

I recently posted a blog (How to configure gateway redundancy with HSRP in IOS) about how to configure HSRP for gateway redundancy. In that blog I mentioned that there is an alternate protocol which performs the same functionality as HSRP, … Continue Reading

How to add the Dial-in Tab in Windows 7

After downloading and installing the Remote Sever Administration Tools (RSAT) in Windows 7 the Dial-in tab is missing in both the Active Directory Administrative Center (ADAC) (See figure 1 ).and Active Directory Users and Computers (ADUC) (See figure 2 ). … Continue Reading

Running PowerShell in Windows 8 (or 8.1) PE Environment

Microsoft promotes the use of PowerShell in Windows 8/8.1. Courseware materials even suggest that MCT’s instruct their students regarding specific PowerShell capability for use in preparing drives, deploying Windows Image Files, and performing trouble shooting operations from the Windows Recovery … Continue Reading

Using SuperScan to Reconnoiter an Internal Network

The importance of reconnaissance in vulnerability discovery and penetration testing is usually overlooked. Network security personnel with little training or experience will often begin their analysis by finding a few target systems and immediately attempt to compromise their security with … Continue Reading