Server 2016: Backing Up Active Directory with PowerShell

By Mark D. Albin, M.S. | January 1, 2019

Backing up Active Directory with Windows Server 2016 can be achieved by following the below instructions. We use this for small businesses that don’t want to use the more expensive third-party backup options. Setting Up Server Backup Environment First you need to have a separate volume partition to save the backup too. I am will

Creating a Group Managed Service Account

By Mark D. Albin, M.S. | January 1, 2019

The group Managed Service Account (gMSA) provides the same functionality within the domain but also extends that functionality over multiple servers. When connecting to a service hosted on a server farm, such as Network Load Balanced solution, the authentication protocols supporting mutual authentication require that all instances of the services use the same principal. When

DHCP not pushing DNS address to client computers

By Mark D. Albin, M.S. | December 30, 2018

Problem: Clients connect to the DHCP and are assigned an address and correct gateway. They are not able to connect to the internet because the IP v4 DNS address is not being pushed or loopback IP address is being pushed to all clients. Solution: That 006 DNS Servers Standard configuration was what your DHCP

Six common cybersecurity mistakes you can fix now

By Mark D. Albin, M.S. | December 18, 2018

Introduction Cybercriminals are clever and on the lookout for vulnerable businesses. They exploit common mistakes and flaws to breach systems, then steal, disrupt, or hold businesses for ransom. But here’s the good news: you don’t have to be an easy mark. You can make changes right now to reduce the likelihood of a successful attack.

Protecting Against Phishing Attempts

By Mark D. Albin, M.S. | December 17, 2018

Phishing is the cause of most cyber breaches. Most successful attacks against companies start with a phishing email. Adhering to the statements in this policy will help your company be more resilient to phishing attacks. Phishing Definition: Phishing is an email-borne attack that attempts to get you and your email software to do something malicious. Many

Editing DNS Host Files

By Mark D. Albin, M.S. | December 9, 2018

This article provides instructions for locating and editing the hosts file on the following operating systems: Microsoft® Windows® 10, Windows 8, Windows 7, and Windows Vista™ Microsoft Windows NT™, Windows 2000, and Windows XP Linux® When you add a permanent entry to the local DNS cache on your PC, it will always override the information

How to Install Samba4 on CentOS 7 for File Sharing on Windows 10

By Mark D. Albin, M.S. | November 22, 2018

This guide will help you to quickly install and configure Samba4 on CentOS 7 for basic file sharing between other Linux systems and Windows machines. This is handy at times, therefore, we have shared this. Install Samba4 in CentOS 7 First install Samba4 and required packages from the default CentOS repositories using the yum package manager tool as shown

Kali Linux Not Updating

By Mark D. Albin, M.S. | November 2, 2018

I have run into this issue a few times, so I will share my solution on fixing Kali Linux not updating. Open a terminal and run the below commands to quickly fix the issue: Type sudo -i Type in your password. Type touch /etc/apt/sources.list Type chmod 644 /etc/apt/sources.list Type echo “deb kali-rolling main contrib non-free”

Protecting Against Social Engineering and Phishing Attacks

By Mark D. Albin, M.S. | October 16, 2018

What is a social engineering attack? In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that

Microsoft Privilege Escalation Vulnerability

By Mark D. Albin, M.S. | September 5, 2018

Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the Advanced Local Procedure Call (ALPC) interface, which can allow a local user to obtain SYSTEM privileges. As many of you have seen there is a zero-day, privilege escalation, exploit for nearly all current versions of windows. We haven’t seen any reasonable mitigating