Click Image Magnify Plugin in WordPress
The images you add between your blog posts may not be readable. You may want to enlarge the images on the same page. You want …
Knowledge pool for Information Technologies
The images you add between your blog posts may not be readable. You may want to enlarge the images on the same page. You want …
To update McAfee TIE(Threat Intelligence Exchange) Server, we will need to download the new package for TIE Server from McAfee’s site below and install it …
In this article, we will explain how to restart the root user password of the McAfee TIE(Threat Intelligence Exchange) server. In a very busy environment, …
The Web for Pentester application is a laboratory environment that can be used in web penetration testing training. Developed by PentesterLab, this platform contains vulnerabilities …
Thycotic Secret Server is simply a “Password Vault“. Today, privileged accounts and passwords have become invaluable targets for hackers. Thycotic Secret Server is a privileged …
Honeypot; They are decoy servers that are used to gather information about attackers or users who access information systems without authorization. A honeypot can usually …
We woke up to the first morning of 2022 with a big surprise. Exchange noticed that the servers could not receive mail. The reason for …
As a leader in DLP solutions, McAfee provides data protection structures in many institutions with integrated solutions. With McAfee DLP (Data Loss/Leak Prevention), it is …
Sysmon is a tool developed by Microsoft that allows recording the activities on the device it is on. It provides detailed information for activities such …
In this article, we will simply talk about creating a reputation-based detection system. Reputation determines the reputation(?) of a file, domain, and IP address. The …