
Audit Disabled Accounts
Imagine waking up to an email full of alerts about unwanted access attempts. It is every administrator's nightmare. The truth is that many security incidents can be traced back to disabled accounts that were not properly reviewed. You might wonder, "What about disabled accounts? "Aren't they harmless?" Well, not quite. There are reasons we need...
Ladder With Docker
The other day I was searching for a piece of code for work. One of the links I clicked was geo locked to the EU only. Which threw me off. I didn't have a VPN on the computer. So what do you do? We use a web proxy. Last week we talked about a reverse proxy. A web proxy...
Reverse Proxy on Docker
Over the past year, I have started rebuliding my home lab. One thing about a home lab is you want very little entries into your network. I split off my home lab from my main network using a pfsense firewall. The home network only has 2 ports open on it. That's 80 and...
Building Parameters for Commands
One of my favorite things with powershell is building out splat parameters for commands through the main parameter set. Today we are going to go over how that is done. We are going to do this through the Get-childitem and get-ACL. These are some mighty commands and...
