Securing RDP Connections using TLS certificates

Remote Desktop has been the must as remote administration tool for many IT professionals and sadly many even expose it to the internet leading to brutefoce attacks and Man in the Middle attacks in the past (and even during this period). Using TLS certificates can improve the security and the default access method to critical systems, even if those systems are reached only on internal business LAN environments. Read More …

Linux – scp transfer files (passwordless) between systems

SSH (Secure SHELL) is a network protocol that is used to login into remote servers for execution of commands and programs. It is also used to transfer files from one computer to another computer over the network using secure copy (SCP) Protocol. Let’s see how to automate, passwordless, using Public/Private keys, file transfers between systems. Read More …

Exchange Online – Preventing Domain Spoofing

In many business environments domain spoofing can be a real threat: this is a common form of phishing and usually occurs when an attacker appears to use a company‚Äôs domain to impersonate a company or one of its employees. Read More …

SSH X-Forwarding (a more secure alternative to VNC)

X is a popular window system for Unix/Linux workstations (similar to explorer.exe for Windows systems), and one of its best features is its transparency. A great feature about using X is that you can run remote X applications that open their windows on your local display (and vice versa, running local applications on remote displays). Read More …

Encrypt a Flash Drive to Secure Its Contents (BitLocker)

Encrypting your removable drive is the best way to protect any data it contains. If you lose an unencrypted drive, Read More …