Take Files/Folders Ownership (Microsoft Windows)

Many organizations with a Microsoft Windows environment rely on NTFS as the main file system for their storage devices that contain sensitive data. It is the easiest way for users to work with files. In order to implement a least-privilege model, which is a best practice for system security, IT security specialists and system administrators configure NTFS access control lists (ACLs) by adding access control entries (ACEs) on NTFS file servers. Read More …

Linux – scp transfer files (passwordless) between systems

SSH (Secure SHELL) is a network protocol that is used to login into remote servers for execution of commands and programs. It is also used to transfer files from one computer to another computer over the network using secure copy (SCP) Protocol. Let’s see how to automate, passwordless, using Public/Private keys, file transfers between systems. Read More …

Linux Security Basics

Read More …