Joining a computer to a domain only requires certain permissions to certain places in Active Directory. Since limiting access as much as possible is crucial to Active Directy security, you should o...
Connecting to Old SSH Servers
Unable to negotiate with 192.0.2.1 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 Have you c...
Publishing Remote Desktop Certificates
While extremely convenient, the Remote Desktop Protocol can be extremely dangerous if not secured correctly. Typical things you should consider are ACLs, firewall rules, smart cards, RDP Gateways,...
Creating an Enterprise Subordinate CA from an Offline Root CA
Every organization that has an Active Directory structure, or any other service that uses SSL/TLS services (ie. HTTPS, RDP, etc.), should have a certificate authority. This certificate authority is...
Offline Root Certificate Authority - Windows Server
Every organization that has an Active Directory structure, or any other service that uses SSL/TLS services (ie. HTTPS, RDP, etc.), should have a certificate authority. This certificate authority is...
Offline Root Certificate Authority - Linux
Every organization that has an Active Directory structure, or any other service that uses SSL/TLS services (ie. HTTPS, RDP, etc.), should have a certificate authority. This certificate authority is...
Linux-based SFTP Server
This guide demonstrates the precedure for creating a Linux-based SFTP server using OpenSSH. The end result is an SFTP server only available to the “sftpusers” group via sftp only. SSH shell access ...
GnuPG - Encrypting Files with a Public Key
Encrypting files or data with a public key is called asymmetric encryption. The benefit to this method is the extra security of encrypting data for a specific recipient. This is done by using the p...
GnuPG - Intro & Installation
You can skip right to the installation for Windows or macOS. GnuPG is included in all major Linux distributions. Introduction GnuPG or “GNU Privacy Guard” is a free and open source implementation ...
GnuPG - Encrypting Files with a Password
Encrypting files or data with a password is called symmetric encryption. The benefit to this method is the speed of the encryption and decryption process, so it is more suited to large files and da...