Advanced Search
Search Results
651 total results found
Clamav
An external, supplementary antivirus software program for Linux systems. Not generally needed since Linux systems by themselves are hard to infect with malware. Installation & Usage sudo apt install clamav (CLI-only) sudo freshclam (Updates virus definitions) ...
Certificate of Destruction
aliases: COD A document that states a storage disk was properly destroyed by an outsourced, licensed organization. This should be kept in internal records of the organization that owned the storage disk. Information serial number destruction method signat...
Dumpster Diving
In this case, dumpster diving is when an attacker attempts to find sensitive data by going through the trash. <p style="color:#1e1e3f ">because they're poor lmao #XIV
Windows Task Manager
A system utility on Windows-based systems that allows the user to monitor running programs and view information about them. Access Ctrl+Alt+Delete then select Task Manager Ctrl+Shift+Esc Right-click an empty area of the task bar and select Task Manager Window...
Windows System Information
A system utility on Windows-based systems that allows the user to view information about the hardware and software setup in great detail. Access Win+R then msinfo32.exe then OK Win then System Information then Enter #VII
Time Drift
A Windows condition where the system time is out of sync with the time server. There are several indicators of time drift: inaccurate logon restrictions certificate errors virus scans being ran at wrong times inaccurate authentication expiration Time drift c...
Windows Control Panel
A system utility on Windows-based systems that allows the user to customize features of devices and to configure how a computer looks and behaves. Applets System & Security Security & Maintenance Windows Defender Firewall System File History Backup & Restore ...
DRM License Types
An enumeration of the different types of licenses people use to protect their digital property. Activation Type Description One-Time Activation License is activated once after the product is installed, and remains valid. Persistent Activation License ...
Windows Domains
A Windows 10 feature that enables groups of workstations to be connected and managed from a specialized domain controller. Windows offers creation of a domain account, which is a specialized administrator account that manages workstations that are part of a la...
Domain Controller
A specialized server used to handle authentication requests and enforce security policies on workstations connected to a domain. Features: allows authenticated hosts to access resources stored on any of the workstations connected to the domain stores user acc...
User Access Control
A Windows 10 feature that requests credentials for tasks that require privilege elevation from the current user. UAC prompts the user for 150 seconds. If there is no response, the request is automatically denied. Key Concepts When a user logs in, there are two...
Secure Shell
aliases: SSH A network protocol that enables the secure transfer of data between two clients hosted on an unsecured network. SSH can be used to perform remote logins, file transfers and program execution over the command line interface. SSH is the principa...
Windows Remote Desktop
A Windows 10 Pro feature that allows the user to take control of another workstation remotely over a network connection. Windows Remote Desktop is a program that allows a user to remotely access a user account over a local-area network. It allows the user to v...
Windows Remote Assistance
A Windows 10 Pro feature that allows users to gain limited remote access to another system with the intent of helping them with technical issues. Windows Remote Assistance requires specific permissions to be enabled on both the assistant and the target to allo...
macOS Screen Share
A feature on Apple-macOS versions X and later that allows for screen sharing between two Mac devices. Screensharing is disabled by default on macOS. To enable it, navigate to System Preferences > Sharing > Check Screen Sharing. Screen Sharing allows for the sp...
321 Backup Rule
A rule when performing system backups that states that an organization should keep three copies of a full backup, store them on two different media types, and have at least one copy stored offsite. #VIII
Software
Software refers to the electronic instructions and data that will be used by the hardware. Software is usually stored on a storage drive or special chip. Some types of software include: Operating Systems (e.g. Microsoft-Windows, Arch Linux) Program Applicati...
Basic Input Output System
aliases: BIOS A legacy firmware program stored in the Read-Only Memory of a computer system. Responsible for the PC's startup process, loading the OS into memory. Has been mostly replaced by UEFI, but the two terms are used interchangeably. BIOS Boot Seque...