|
You are here |
jannikreinhard.com | ||
| | | | |
oliverkieselbach.com
|
|
| | | | | During some recent automations I got the question about triggering Intune Management Extension (IME) somehow. The typical action I take in my lab environment is to restart the IME service: Of course this will re-initialize everything and also start a new Sync, but I thought there must also be a way to accomplish the Sync... | |
| | | | |
www.systanddeploy.com
|
|
| | | | | In this post I will show you how to use Intune to collect remotely what you want on your devices (folders, files, event logs, reg keys) crea... | |
| | | | |
oofhours.com
|
|
| | | | | It seems like a simple question, but a complete answer isn't necessarily simple. We can start off with the documentation: OK, so about every 8 hours. But it's different right after you enroll, with the theory being that it might take a little more activity to get the device set up initially. The docs describe... | |
| | | | |
malwaretech.com
|
|
| | | Since i got into firmware hacking, I've been working on a little project behind the scenes: A hard disk firmware based rootkit which allows malware to survive an operating system re-install or full disk format. Unfortunately I can't post a proof of concept for many reasons (people have even contacted me just to tell me not to post it), so instead I've written a presentation overviewing and explaining the rootkit, which I've dubbed MT-SBK. The general purpose of MT-SBK is to provide a "framework" for my previous project, TinyXPB, A windows XP bootkit. This framework enables TinyXPB to be stored and loaded from within the hard disk firmware, preventing it from being removed by: antiviruses, operating system re-installs, or even full disk reformats. This rootki... | ||