|
You are here |
aadinternals.com | ||
| | | | |
powershellisfun.com
|
|
| | | | | The new Microsoft Entra PowerShell modules are available, replacing the deprecated AzureAD modules. This blog post will highlight the installation, changes, and features. | |
| | | | |
adsecurity.org
|
|
| | | | | Each year, Microsoft invites security researchers (aka hackers) to speak to Microsoft employees about security issues. One of the most interesting talks listed at "BlueHat" 2014 was the one by the "Pass-the-Hash" experts, Chris Campbell, Bejamin Delpy, and Skip Duckwall. This talk will focus on the how Windows authentication works in the real world and ... | |
| | | | |
o365blog.com
|
|
| | | | | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers | |
| | | | |
blog.jak-linux.org
|
|
| | | This is an edited copy of an email I sent to provide guidance to users of apt-key as to how to handle things in a post apt-key world. The manual page already provides all you need to know for replacing apt-key add usage: Note: Instead of using this command a keyring should be placed directly in the /etc/apt/trusted.gpg.d/ directory with a descriptive name and either "gpg" or "asc" as file extension | ||