In this post we will see how easy is to access Windows protected files even bypass Windows login and modify the file system to create…
1 CommentSOC Level 1 Posts
In this post we will see how using several simple tricks it is possible to create a malicious macro undetectable by most conventional antivirus. At…
Leave a CommentNowadays, most companies control the Internet access of employees through the use of a proxy. BlueCoat, recently acquired by Symantec, is a leader company in…
4 CommentsIn this post we will see how to configure an IPSEC VPN tunnel between two remote locations through Fortigate firewalls. The scenario that we will…
2 Comments