Tag list

Windows 10 Hardening Guides

This post summarizes hardening guides, security baselines, guidelines or standards for Windows 10. List of Windows 10 Hardening Guides This section summarizes some guides, guidelines, recommendations or baselines to harden Windows 10 endpoints: Microsoft Security Baselines Microsoft Baselines are included in…

Tools to capture Computer Specs on Windows

This post summarizes some tools to capture computer specs on Windows. List of Tools to capture Computer Specs on Windows List of tools to capture computer specifications: I remind that they are only available for Windows. WinAudit Freeware WinAudit Freeware…

Tools for Credential Harvesting

This post lists some pentesting tools for Credential Harvesting. List of Tools for Credential Harvesting Tools for Credential Harvesting featured on this post. Mimikatz Mimikatz is software that performs leverage the Mimikatz exploit to extract passwords stored in memory on…

Resources for Cybersecurity Leaders

This post lists some useful resources for IT security or cybersecurity List of Bulletins for Cybersecurity Leaders Articles, insights, blogs or bulletins aims to cybersecurity leaders. Gartner for Cybersecurity Leaders McKinsey Cybersecurity Forrester Cybersecurity Deloitte Cybersecurity

Web Back End Frameworks

This post lists web back end frameworks. Web back end framework ease the tasks for the developer when working on back end scripting with languages like PHP, Node.js or Python. List of Web Back End Frameworks Web Back End Frameworks…

Scheduling Web Apps for Peers

This post lists some apps that aids to agree a date between a group of people or peers. It discards more complex apps that also manage calendars or book appointments for businesses. In the case of business, the scheduling is…