Windows Tutorials

How To Ping With Date and Time To TXT File Using CMD

There are occasions where you will need to know How To Ping With Date and Time To TXT File Using CMD and a few Windows Ping commands can help. This will use a provide a date and a timestamp the result of each ping, with a bit of effort you can get it to do that. It’s quite useful if you specifically need to use the Windows Ping command. 

ping -t patrickdomingues.com|cmd /q /v /c "(pause&pause)>nul & for /l %a in () do (set /p "data=" && echo(!date! !time! !data!)&ping -n 2 patrickdomingues.com>nul" >C:\ping\pingtest.txt

Ping With Data and Time Using CMD

The above will continuously ping the address with a time and date to a output log file which in this case is called pingtest.txt , press Ctrl+C to end the session. If you do not need an output file remove the redirection to an output file string if you want to show the results in the … Read the rest

Zeus Sphinx Banking Trojan Ramps Up During COVID19

The Zeus and Sphinx Banking Trojan is showing off its ugly face more often now during COVID19, lurking and targeting desperate users looking for information about COVID19.

According to researchers Amir Gandler and Limor Kessem at IBM X-Force, the researchers observed a significant increase in volume in March 2020, of the Zeus and Sphinx’s malware. It was clear that the operators looked to take advantages around government relief payments to COVID19 affected people and companies.

Zeus and Sphinx Banking Trojan

In March 2020 these phishing and malspam campaigns emails tell targets that they need to fill out an attached form to receive coronavirus relief from the government. These new Zeus and Sphinx Banking Trojan variant is spreading via coronavirus-themed email sent to victims in the U.S., Canada and Australia, housed in malicious attachments named “COVID 19 relief,” according to an X-Force blog posting on Monday.

Stay vigilant and review these Email Security Tips you can … Read the rest

TOP Horrible Passwords To Use For 2020

How many Horrible Passwords are there? Let me tell you there are about 500 of them and we will show you the TOP Horrible Passwords To Use For 2020. Any password documented publicly or available in the darkweb can be used in a dictionary attack. This is a form of brute force attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.
 

NOTop 1-100Top 101–200Top 201–300Top 301–400Top 401–500
1123456porschefirebirdprincerosebud
2passwordguitarbutterbeachjaguar
312345678chelseaunitedamateurgreat
41234blackturtle7777777cool
5pussydiamondsteelersmuffincooper
612345nascartiffanyredsox1313
7dragonjacksonzxcvbnstarscorpio
8qwertycamerontomcattestingmountain
9696969654321golfshannonmadison
Read the rest

CoronaVirus Business Continuity Plan Checklist

No one can predict the future; however, you can be ready with a sound CoronaVirus Business Continuity Plan. This CoronaVirus business continuity checklist is the first step in the BCP process.  The checklist is not an exhaustive list, it is a simple tool that can be used to ensure that the basic CoronaVirus Business Continuity Plan process has been initiated and the division management has considered what needs to be done to keep essential functions operating if an adverse event occurs.  The CoronaVirus Business Continuity Plan Checklist is somewhat “information centric” as organisation’s reliance on information is increasing and its successful management provides a competitive advantage.

Read the rest

Help your users spot Covid-19 phishing emails

As the Covid-19 pandemic rises scammers are now using the fear of the public to capitalize by using a method of email phishing to steal money and data.

World Health Organisation Advice

 There has been a growing confusion around the next steps to take, scammers can slip through the cracks. Health advice emails, advising people to sign up to doctor and fake links to “safety tips”.

Some emails are even claiming to have found a cure for the virus! As of yet, (13th March 2020) there is no vaccine so these emails should be deleted immediately.

To verify that an email is legitimate contact the World Health Organisation directly, and flag the phishing email as fraud if it is so to help others avoid making the mistake of giving these scammers their details.

The World Health Organisation has recommended to check the original email address to make sure it … Read the rest

Unpatched Systems Are Still A Major Attack Vector

Unpatched systems are still a major attack vector for hackers. These unpatched systems can invite major troubles for an organization. The issue can turn worse when the organization falls victim to a data breach and compromises confidential data.

Time and time again it was found that the same vulnerabilities kept being the top vector for exploitation via phishing attacks which the payload targeted specific flaws in the Microsoft product line. 

Top flaws

Some flaws that have been actively used to launch attacks are:

Bottom line

It is no surprise that

Read the rest

Apps In Google Play Store Found With Haken Malware

The Haken malware obtains sensitive data from victims and secretly signs them up for expensive premium subscription services.

The eight apps that were found have since been removed. Users have collectively been downloaded 50,000 times. These apps were utilities and children’s games, including “Kids Coloring,” “Compass,” “qrcode,” “Fruits coloring book,” “soccer coloring book,” “fruit jump tower,” “ball number shooter” and “Inongdan.” The apps legitimately function as advertised, but in the background covertly perform an array of malicious functions.

“Haken has shown clicking capabilities while staying under the radar of Google Play,” said researchers from Check Point Research. “Even with a relatively low download count of 50,000+, this campaign has shown the ability that malicious actors have to generate revenue from fraudulent advertising campaigns.”

Google Play store has been battered with new variants of malware try and stay clear of random free apps that are unknown.

Read the rest

Kaseya Script To Run Patch My PC

Kaseya does an okay job to deploy software patches but we we decided it was best to create a Kaseya Script To Run Patch My PC.

This simple script grabs the latest Patch My PC from the developers website and places it into the kworking folder on the users workstation or server. The software has a string parameter to run as the System User to scan the entire system for installed apps and afterwards it will install the latest software Patch silently.
To automatically deploy this script on a scheduled basis, within Kaseya we used Policy Management and configured a new Scheduled policy to run this Patch my PC script every week.

Below you can see the Kaseya Script to run the Patch My PC. I also provided the download link for it.

<?xml version="1.0" encoding="utf-8"?>
<ScriptExport xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns="http://www.kaseya.com/vsa/2008/12/Scripting">
  <Procedure name="Patch My PC" treePres="3" id="136611930" folderId="980255113206922" treeFullPath="myProcedures - [email protected] 
Read the rest

Google Chrome Patch Gap down to 15 Days from 33 Days

Google has done a great job bringing the patch gap down to 15 days from 33 days. They also want to bring this number down further to once a week. Their goal is to quickly roll out patches for vulnerabilities. 

In 2019, security researchers from Exodus Intelligence have noted that on two occasions Google Chrome’s large patch gap can be exploited by attackers.

First in April, and then in September, Exodus researchers developed a proof-of-concept exploit code for security bugs fixed in the V8 JavaScript engine that had yet to make their way downstream into the Chrome code base.

GOOGLE Chrome is doing something about it.

Google Chrome users have some good news and the Exodus team’s research on the topic and subsequent warnings did not go noticed by Google Chrome Security team.

In Google Chrome’s recently published quarterly security summary for Q4 2019, the Google engineers said … Read the rest

How to install VMware tools on CentOS 7

VMware Tools is one of important components for virtual machine (VM) in order get excellent performance. It is a group of utilities that help to enhances the overall performance of the virtual machine’s guest operating system (OS) and improves management of the VM. Below steps shows how to install the VMware Tools on CentOS 7

How to Install VMware Tools ?

open-vm-tools is an open source implementation of VMware Tools from third parties and contains utilities that enhances virtualization management, administration and functions of the virtual machine in VMware environments.

root# yum install open-vm-tools

Without the VMware Tools, guest OS performance will lacks some of the important functionality.

Read the rest

Stay Informed

Receive instant notifications when new content is released.