Since Windows 11, Microsoft has made it harder for users to create a local user account during the setup process, pushing for the use of an online Microsoft account. This article will show you how to set up Windows 11…
PING is an essential troubleshooting tool frequently employed by system administrators and helpdesk support to assess connectivity between Windows devices. By default, the PING function, also known as Echo request, is deactivated on both Windows Servers and client computers. This…
In this step-by-step tutorial, I will show how to disable access to USB storage devices using Windows Group Policy (GPO). Why Disable Access To USB Storage Devices? 1/ Prevent Data Lost/Theft Data represents a paramount asset for most organizations, often…
Too many temporary files stored on the computer can consume huge storage space. All operating systems create temporary files that tend to grow in volume over time, impacting the disk space available to the system for executing core processes. There…
In this article, we will dive into the world of Windows forensics and explore how to leverage the power of the Windows Events log to detect and investigate unauthorized access to Windows computers and servers. This article will shed light…
In my previous articles, I discussed installing a program using PSExec and PowerShell remotely. In the present article, I will discuss how to deploy Software using Windows group policy. Group Policies can be a powerful tool for managing users and…
In this article, I will guide you on how to remotely install software using PowerShell, a default tool in Windows. Unlike PSExec, PowerShell is already installed on your computer, making it more accessible to use. This step-by-step guide covers the pre-requisites, how to meet the requirements, and how to write a PowerShell script to remotely install a software package.
In a previous blog post, I discussed a method for allowing standard users to run programs with admin rights. While the solution proposed in that article relied on saved admin credentials, it posed a significant security risk. In this article,…
What Is DHCP and How It Works To communicate on the network, each device needs an IP address. This IP address will allow the device, whether a computer, a server, or a printer, to be visible to other devices in…
When you run a program or use your web browser, this one creates temporary files in the “C:\Users\[Username]\AppData\Local\Temp” location. But not all programs are good at cleaning those temporary files when they are no longer needed or when the program…