Skip to content

Mark In Cincinnati

Yet Another Food & Tech Blog

  • Home
  • Blog
  • Cook-Book
    • Cooking-Basics
    • Appetizers
    • Main-Dish
    • Side-Dish
    • Soups
    • Breads-Rolls
    • Desserts-Cookies
    • Sauces-Batters-Mixes
  • MyHistory
  • MyInsights
  • Tech
    • Best Practices
    • General
    • Software
    • Linux
    • Windows
  • Links
    • Software
    • Vulnerabilities
    • Investigate
    • Threat Intel & IR
    • Microsoft
    • Free Training
    • Industry
  • News

Category: Tech

  • Home
  • Blog
  • Tech
  • Page 3
Windows

Top Windows Terminal Commands

August 24, 2024May 8, 2025 mark_user

Introduction Although PowerShell has made progress over the last few years as the preferred command

Read More
Software Tech

Ansible Ad-Hoc Commands

August 19, 2024May 12, 2025 mark_user

Introduction Ansible gives you a powerful option to run commands ad-hoc. This negates the need

Read More
Best Practices

Tips to Safeguard Your Digital Secrets

August 1, 2024May 8, 2025 mark_user

Introduction Password manager databases, asynchronous keys, digital signatures, and MFA recovery passcodes are designed to

Read More
Best Practices Tech

Managing Your Passwords

August 1, 2024May 8, 2025 mark_user

Forward Good password habits are essential for any person who works regularly online. Due to

Read More
Software

Run a Basic NMap Scan

April 29, 2024May 7, 2025 mark_user

Introduction NMAP (Network Mapper) is a utility for identifying all hosts on a network and

Read More
Best Practices

Standards & Organizational Controls (SOC)

April 29, 2024May 8, 2025 mark_user

Brief Overview Standards and Organization Controls (SOC) is an information security framework designed to help

Read More
Best Practices

Indicators of Compromise

April 26, 2024May 8, 2025 mark_user

Introduction Users, computers, and even entire networks can be all be compromised. Depending on the

Read More
Best Practices

Job Duties of a Security Analyst

April 26, 2024May 8, 2025 mark_user

Introduction An enterprise security operations center (SOC) analyst’s responsibilities are both wide and varied. Based

Read More
Best Practices

Creating a Report for Senior Managers

April 25, 2024May 8, 2025 mark_user

Introduction Any employee could be called upon to write a report for senior staff. Senior

Read More
Software

Export a KeePass Master Key File

April 23, 2024May 7, 2025 mark_user

To in increase security, you can require a KeePass to use both a key file

Read More

Posts pagination

Previous 1 2 3 4 Next
June 2025
S M T W T F S
1234567
891011121314
15161718192021
22232425262728
2930  
« Apr    

ansible appetizers aws bash breads chicken chili cmd cooking-basics desserts dips keepass linux main-dish nmap powershell putty salsa sauces-mix-batters side-dish soups ssh windows

Recent Posts:

  • Add a Package Archive to Ubuntu
  • Set Up a Putty Session w Cool Options
  • Introduction to Robocopy
  • Backup to a Remote Server using Bash
  • Managing Users & Groups in Ubuntu
All Rights Reserved 2025.
Powered by WordPress | Theme: Fairy Pro by Candid Themes.