Many years ago I wrote a article when I was working for Global Knowledge, I was looking at it, and it was interesting that what I wrote many years ago still holds true today …
You can read the article HERE
Many years ago I wrote a article when I was working for Global Knowledge, I was looking at it, and it was interesting that what I wrote many years ago still holds true today …
You can read the article HERE
Another free book

Focus on the what, why, and how when it comes to deploying the foundation of a software-defined datacenter based on Windows Server 2012 R2 and System Center 2012 R2. Learn the steps to implement configuration on your own hardware while discovering details on design considerations and best practices.
Download the e-book here.
Security conference that you might want to attend
Come join us at the Tropicana Casino and Resort in Atlantic City, NJ this Spring for the latest techniques and approaches on current topics in security and IT auditing.
Sessions include:
PLUS- A Hands On Track of courses in Mobile Device Security and CyberSecurity Investigations
I will be speaking at this event, doing sessions on
Getting Your Hands Dirty With Active Directory
Wireless Security
The conference runs
Monday, April 20, 2015 – Friday, April 24, 2015
7:30 AM – 5:00 PM
to find out more go here
This version works with Build 10041 .
Remote Server Administration Tools (RSAT) for Windows 10 Technical Preview enables IT administrators to manage roles and features that are installed on computers that are running Windows Server Technical Preview from a remote computer that is running Windows 10 Technical Preview
You can get the install here

This ebook addresses some of the gaps and pain points you might encounter when implementing, administering, and troubleshooting Software Updates using Configuration Manager 2012 R2. The advice is based on the authors’ experiences working as Premier Field Engineers and Microsoft Consultants in customer environments on a daily basis. Enjoy this book and the shared experiences from the field.
You can download the Book Here
and Download Companion Files Here
In the Trustworthy Computing | February 2015 there is a article I wrote about “Simplify secure infrastructure management with System Center” This article can be found here
This is the starting point for some future post that I will be adding to my blog around the use of automation to help secure IT infrastructure. Using tools from different suppliers, to maintain baselines and reduce risk by automating processes
The focus of these articles will be on the SMB to Midsize companies. who need a simple way to reduce work loads while protecting company data and systems.
This article can be found here
Most people think that Windows, which is often referred to as the most vulnerable operating system in the world and also an easy pie for hackers, is not even listed on the top three vulnerable OS. According to an analysis by the network and security solutions provider GFI, the top three most vulnerable operating system are:
· Apple’s Mac OS X
· Apple iOS
· Linux kernel
see the details here
This is a great piece about security of applications that one can install on a phone in this case a IPHONE…
Look at the video
I will be presenting at Boston SECUREWORLD March 4-5, 2015. I will be talking about,
This session will open up the eyes of the participants’ hidden danger in the work place. Security technology spending is up protecting data, but have we looked at our employees processes? We will discuss issues of social engineering and you will leave with ways to reduce this risk.
If you coming to the conference come by and say hi.
I have been a CMD prompt user for years and now Microsoft has add some very cool features
1st Cut and Paste !!!!
2nd The old command prompt window in the properties section has some new bits
lets look at the tabs – under options – the edit mode
look at the color tab
And the check out the experimental Tab