You run a respectable website that your users can trust. Right? You might want to double check that. If your site is running on Microsoft Internet Information Services (IIS), you might be in for a surprise. When your users try to connect to your server over a secure connection (SSL/TLS) you may not be providing them a safe option.
Digitally signed drivers include an electronic fingerprint that indicates which company the driver was produced by as well as an indication as to whether the driver has been modified since the company released it. This increases security, as a signed driver that has been modified will no longer have an intact signature. Drivers are signed using code signing certificates.
If you are a command line junkie like me, and have been testing out Windows… one of the first things you’ll notice is that there is no way to run a command from the run box in “Administrator” mode. Until now.
Many people familiar with prior versions of Windows are curious what happened to the built-in Administrator account that was always created by default. Does this account still exist, and how can you access it?
There’s nothing more tedious as a system administrator than running security updates on a dozen servers every single day. Luckily Ubuntu will let you automate stable security updates so you’re never at risk.
When you need a data set for testing or demonstration, and that set needs to represent Personally Identifiable Information (PII), you generally don’t want to use real data that represents actual people. Here, we’ll walk you through how you can use PowerShell to generate a list of random names and phone numbers for just such an occasion.
We currently enjoy many wonderful bits of technology such as the internet, mobile phones, radar, and more, but how much of it was ‘predicted’ ahead of its time by science fiction authors? You just might be surprised! PBS Digital Studios looks at the predictions that came to pass, and which author was the most accurate of all.
The rsync protocol can be pretty simple to use for ordinary backup/synchronization jobs, but some of its more advanced features may surprise you. In this article, we’re going to show how even the biggest data hoarders and backup enthusiasts can wield rsync as a single solution for all of their data redundancy needs.
Iptables is an extremely flexible firewall utility built for Linux operating systems. Whether you’re a novice Linux geek or a system administrator, there’s probably some way that iptables can be a great use to you. Read on as we show you how to configure the most versatile Linux firewall.
GitHub is a website/service that we hear geeks rave about all the time, yet a lot of people don’t really understand what it does. Want to know what all the hubbub is about? Read on to find out.
Anybody who wants to test their connection speed can easily do so from a speed test web site — but that isn’t very geeky. Here’s how to do a test from the terminal prompt instead.
Have you ever found yourself manually opening WinSCP to the same server you’ve just SSHed into with mRemoteNG? Or wishing you were able to extract the password from the mRemoteNG connection? HTG will guide you on how to unlock mRemote’s true power.
We’ve previously written about hosting your own FTP server, but data is transferred in cleartext, making it unsuitable for confidential file transfers. In this guide we’ll go over the secure version of FTP – SFTP, and why it makes for an excellent way of transferring files to other people across the internet.
Have you ever had a need to connect to multiple machines of multiple types (RDP,SSH,VNC & more) simultaneously? Have you found that retyping the credentials is a pain? Take the HTG tour of mRemoteNG.
By default, Hyper-V tries to figure out which Virtual Machines were powered on at the time that your PC had its power cut. It uses this list to automatically turn Virtual Machines back on when your PC powers on. Here is how to change what gets switched back on.
If you are a one man development team, you probably don’t really have the need for a full blown version control system, yet creating source code backups for each released version is undoubtedly important.
Domain users are not allowed to sign in with a Pin by default. However, using a little bit of GPO, we can change that.
We have previously covered how to send the contents of a text file to the Windows Clipboard with a simple Send To shortcut, but what if you want to do the opposite? That is: send the contents of the clipboard to a text file with a simple shortcut.
If you frequently access a remote SFTP directory, you know all too well what a hassle it is to work only via stand-alone SFTP client. Read on to see how easy it is to integrate the remote directory into Windows Explorer.
For as long as we can remember, Windows has had a hidden “Open command window here” option on the context menu, but who uses the command prompt these days?
Suppose someone asks you for a list of applications you have installed on your computer. To get this information, what’s the first thing you would think to use? Third-party program? Not us, we have PowerShell.
You have most likely heard of services, such as Dropbox, which are used to keep files in sync across multiple machines. However, what if you want to perform this operation on a single machine? That is, keep files which have the same file name in sync across the machine such that when one of the files changes, they are all updated.
Have you ever needed to know what a remote device thinks the value of a metric is? HTG explains what the Simple Network Management Protocol (SNMP) is and how can you use it to monitor network devices.
Geeks have had their own “money” for some time, but typically it is within the context of online gaming. While this digital currency does possess intrinsic value, the market for it is usually limited to other gamers. However, 2009 gave rise to another form of digital currency, bitcoin, which has demonstrated some global demand as a medium for exchange.
Have you ever had the need to bulk restore your Citrix-Xen VMs for a disaster recovery (DR) solution, or just to test that your backups are working? HTG explains how to use Xen-Phoenix, a free bash script, for VM restoring.