Monday, March 28, 2016

Understanding and Deploying EMET

Hey everyone - Last week, we talked about a few defense measures you can employ on your computer or in your organization.  One of those tools was EMET: Microsoft's Enhanced Mitigation Experience Toolkit.  Today, we will talk about EMET, why you might want to use it, and how to deploy it.  Let's do this!

Monday, March 14, 2016

A Change Of Pace

Hey everyone - This week's entry is going to be very short.  In order to spend more time preparing content for you and to better accommodate my changing schedule, I am changing the schedule up a bit.  Instead of a new entry every week, I will put out a new entry once every other week.  The next entry will be on March 28, then after that, April 11.

Thanks for reading as always.

Monday, March 7, 2016

An Interlude: Setting Up A Small Windows Domain

Hey everyone - I wanted to take some time to set up an environment for us to play in.  Instead of assuming that everyone reading this was familiar with how to do it, I thought it would be good to show how to set up a simple Windows domain.  You might be asking what this has to do with information security since this seems more like systems administration.

That is a good question.  I believe that in order to adequately protect (or break into) a system, you need to understand how it works.  If you go through the steps to set up a domain, I think you will get a better appreciation for how the components fit together.  If you already know how to set up a domain or have one set up, feel free to skip this post.

We will use this little domain for examples going forward, so if you want to follow along, it would be a good idea to have a setup similar to this.

For those of you that are interested, we will talk about what we are going to set up then we will walk through it after the jump.