How To Remove Sophos Tamper Protection
In this tutorial you will be shown How To Remove Sophos Tamper Protection from the Sophos Central Endpoint Software on your windows system. This comes handy when you no longer have access to Sophos Central available and you have a device with Sophos Endpoint software installed. Follow the magical steps below to obtain freedom from…
Facebook Exposed 267M Users Phone Numbers
Researchers have found a database which exposes the names, phone numbers and Facebook user IDs of 267M of the Facebook users. This database was left unsecured on the web for nearly two weeks before it was removed. The Data Exposed In total 267,140,436 records were exposed. Most of the affected users were from the United…
How To Fix Your Trusted Platform Module Has Malfunctioned
How To Fix Your Trusted Platform Module Has Malfunctioned for Microsoft Outlook 2016 and 2019 and 365. This error effects your outlook login by prompting you for a password or not even displaying the window. How you would go about to fix this Trusted Platform Module Has Malfunctioned error is be doing the following…
Set A New Public Time Server
Here are a few commands to set a new public time server. Run CMD in Admin mode and run the following commands. net stop w32time w32tm /config /syncfromflags:manual /manualpeerlist:”0.it.pool.ntp.org 1.it.pool.ntp.org 2.it.pool.ntp.org 3.it.pool.ntp.org“ net start w32time tzutil /s “Eastern Standard Time” w32tm /config /update w32tm /resync /rediscover
A Simple But Strong Cyber Security Strategy
It’s quite a task having to protect a small business from online dangers. The threats that can come across your network are vast and in order to avoid them you should consider having a Simple But Strong Cyber Security Strategy. You don’t have to know much about this topic to know that you absolutely need…
Tech Tools For Beginners
Package Contents: 2 x Plastic Opening Tools 3 x ESD Tweezers 1 x Utility Knife 1 x Anti-Static Wrist Strap 1 x SIM Card Ejector Pin and LCD Suction Cup 4 x Triangle Plectrums 2 x Plastic Spudgers 3 x Metal Spudgers 1 x Tin Scraper 1 x Large Plastic Double Headed Opening Tool 1…
Signs your Android phone may have a Virus or other Malware
Here are some signs your Android phone may have a virus or malware. Remember while the external damage is usually visible, internal damage is usually hidden from view. Android Malware like virus is known to perform repeated tasks that can take up resources on your devices. Signs of Android malware may show up in these…
How To Transfer Active Directory FSMO Roles
How to transfer the 5 FSMO (Flexible Single Master Operations) roles and GUI tools that can be used to move these roles between Active Directory Domain Controllers. Schema Master – controls all updates and modifications to the Active Directory schema.This role can transferred using Active Directory Schema snap-in.If Active Directory Schema snap-in is not available you need to register required DLL…
Hackers Use Fake Windows Update Emails to Inject Cyborg Ransomware
Hackers are using a Fake Windows Update email to inject cyborg ransomware. The email campaign has been found during the latest Windows 10 November 2019 update that was release. Users are getting fake emails regarding this update Windows update and it states that you should download the update attached. This attachment is not a Windows…
Many Critical Vulnerabilities In VNC
Many critical vulnerabilities found in Virtual Network Computing (VNC). The VNC software was found to have 37 different memory corruption vulnerabilities and many of these could result in remote code execution. The researchers at Kaspersky said around 600,000 web-accessible servers use the code. Kaspersky researchers wrote in an analysis of the bugs for ICS CERT, released…