Skip to content

The Cyber Security, Compliance & Cloud

Cyber Security | Digital Transformation | Cloud Computing

  • Home
  • About Me
  • Contact Me:
The Cyber Security, Compliance & Cloud

Letters are overlapping in a word or outlook document

March 12, 2013 Baz outlook, tips, windows, word Leave a comment

WordYou may see in word document that text are overlapping and it may persist when we print the document. To

Continue reading

Creating bulk user accounts in Active Directory

March 11, 2013 Baz AD, scripts Leave a comment

This is very common requirement when creating new users. Its much easier to create bulk user using csv file or

Continue reading

Cisco Router Configuration to Run Cisco CP

March 4, 2013 Baz Cisco, tech, tips, VPN Leave a comment

Basic Router Configuration in order to allow the router to be configured by Cisco CP. Perform these configuration steps in

Continue reading

How to setup VPN connection on Apple iPhone

March 4, 2013 Baz tech, tips, VPN Leave a comment

Configure VPN Choose Settings > General > VPN and then choose Add VPN Configuration. You are require VPN server IP address,

Continue reading

How to setup VPN connection on Blackberry

March 4, 2013 Baz tech, tips, VPN Leave a comment

STEP 1 First you need to install SSL certificates to connect and use VPN. for this you need to install

Continue reading

HTTP Error 503. The service is unavailable “Sharepoint”

February 28, 2013 Baz scripts, sharepoint, tech, tips, windows Leave a comment

The service is unavailable error normally occurs whenever the password for application pool  identity account is changed or application pools

Continue reading

Active Directory Migration using ADMT

February 16, 2013 Baz migration, tech, windows Leave a comment

You’re probably already aware of what ADMT is and what it can be used for, and I’d suggest (as always)

Continue reading

Applications virtualization

January 31, 2013 Baz VMWare Leave a comment

With applications virtualization, you separate the application from the OS. By doing this, the applications become portable files that can

Continue reading

Slow Printing : solution

January 1, 2013 Baz printer, tips Leave a comment

Controlling print job spooling can increase print speeds. To do so, select Settings | Printers from the Start menu. When

Continue reading

Windows System Restore or System Recovery

January 1, 2013 Baz tech, tips, windows Leave a comment

If your system has failed to the point where you cannot access the Windows GUI either through booting normally or

Continue reading

Posts pagination

«Previous Posts 1 … 13 14 15 16 17 18 Next Posts»

Categories

ADADFSAmazonAppleAppsArticlesAWSAzureAzure PolicyAzure PurviewbackupCertificatesCiscoCloudComplianceCyberSecuritydamwaredataData GovernanceDigital ForensicexcelExchangeflashflexGPOHadoopHPInformation ProtectionIntelligent securityJSON

Recent Posts

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types

Top Cyber Security Posts

Datbricks vs SQL Server

April 14, 2023

Designing SQL Database in Azure

February 21, 2023

Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault

December 13, 2022

FIDO – FIDO2: an open authentication standard

June 20, 2022

Build next-generation security operations with Azure Sentinel

December 16, 2020

How to Apply Microsoft Information Protection’s (MIP) sensitivity labels to Azure assets in Azure Purview

December 4, 2020

Unknown Feed

WordPress Theme: Tortuga by ThemeZee.