All
.NET
AD CS
AD DS
AD FS
Amazon Web Services (AWS)
Atlassian
Azure Arc
BGP
Blazor Server
brief
C#
Cheat Sheets
Check Point
Dell PowerEdge
DevOps
E-Mail
Exchange
Failover Clustering
Fax Server
FreeBSD
General
Google Cloud
Hype-Jargon
Hyper-V
IBM X3650
IEEE 802.11 WLAN
Infrastructure as Code (IaC)
IPv4 | IPv6
Kubernetes
Let's Encrypt
Linux
Logical Volume Manager (LVM)
Microsoft 365 (Office 365)
Microsoft Azure
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Teams
Monitoring
Network File System (NFS)
Networks
OAuth2.0
OpenID Connect
Oracle Linux
pfSense
PKI
Postfix
PostgreSQL
PowerShell
Python
Red Hat
SAML 2.0
SAP
Security
Session Border Controller (SBC)
SLES
SQL Server
Storage
Sysinternals
System Center
TLS/SSL
Ubuntu
VEEAM
Virtual Machine Manager (VMM)
Visual Studio
VMware vSphere
VPN
Web server
Windows
X.509 PKI
The Utilman.exe Hack combined with Windows Safe Mode to bypass XDR Solutions like CrowdStrike’s Falcon Sensor or Microsoft Defender for Servers
In this post I will show step by step the Utilman.exe hack on Windows Servers they protected by either CrowdStrike‘s...
Linux handles SSH and SFTP Port Specification different
When working with SSH and SFTP, you may have noticed a curious difference in how ports are specified: SSH uses...
Perform a clean Deinstallation of VMware Tools manually in Windows Guest OS
Upgrading/Installing the VMware tools or uninstallation of VMware Tools sometimes fails with the following errors This is an issue with...
What is PowerShell Dot Sourcing?
Dot sourcing in PowerShell is a method used to execute a script or a function in the current scope rather...
How to monitor Windows Clients in Checkmk
In my last post we saw how we can monitor VMware vSphere environments in Checkmk. In this post we will...
How to repair an Azure VM offline
In my previous post below we saw how we can run Azure VMs in safe mode by using the Azure...