Skip to content

“PowerShell, Active Directory & IT Automation Simplified”

Sign In
  • Home
  • About Me
  • Join the Facebook group

Category: Cybersecurity

  • Home
  • Security
  • Cybersecurity
Cybersecurity

🛑 How to Remove Shortcut Virus from External Hard Drive in Windows 10/11 🖥️

by antoniorennvickMarch 20, 2025

  Are you struggling with a shortcut virus 🦠 on your external hard drive? If your folders 📁 have turned into shortcuts and won’t open on your PC but still work on your TV, your…

Active DirectoryCybersecurity

Asymmetric Pre-Authentication in Ticket Granting Ticket (TGT) requests in Active Directory

by antoniorennvickMarch 6, 2025

Asymmetric Pre-Authentication in Ticket Granting Ticket (TGT) requests in Active Directory refers to a security feature designed to enhance the protection of the Kerberos authentication process. This method helps prevent certain types of attacks, such…

CybersecurityEmail AuthenticationEmail SecurityMicrosoft ExchangePhishing Protection

Understanding SPF, DKIM, and DMARC: A Comprehensive Guide to Email Authentication

by antoniorennvickMarch 6, 2025

 Email authentication is a crucial aspect of cybersecurity that helps protect organizations from phishing, spoofing, and email fraud. Three key protocols—SPF, DKIM, and DMARC—work together to ensure email security and authenticity. This guide will provide…

CybersecurityPerformanceWIndows 7Windows 8Windows 8.1Windows Server 2008 R2

Windows 8.1 is FAR more than simply a new and/or improved UI Windows 8.1 “under the covers”

by antoniorennvickNovember 29, 2013

Picking out the differences between Windows XP and Windows 8.1 or even between Windows 8 and Windows 8.1, improvements have been enormous and have remained unnoticed by a lot of people. So here's a glimpse…

Recent Posts

  • Microsoft Intune Cloud PKI: A Deep Technical Dive into Architecture, Security, and Deployment
  • Phish‑Resistant MFA on Linux with Microsoft Entra Single Sign‑On: A Deep Technical Guide
  • Cross‑Tenant Synchronization in Microsoft Entra ID: Deep‑Dive Configuration, Architecture, and Security Best Practices
  • Microsoft Entra Conditional Access Optimization Agent: A Deep Technical Guide for Security Architects
  • The Evolution of Microsoft Entra ID: From Azure Active Directory to a Modern Identity Control Plane

Recent Comments

  1. How to protect your RDP session with a SSL certificate. – Antonio's Blog on How to purchase a SSL certificate
  2. Eimear Serious on Translate a document or a web site from one language to another language………………
  3. Celena Radick on Counter-Strike: Global Offensive
  4. nataliewhitegame on Counter Strike With Hamachi
  5. Install .NET frameworks in windows 8 manually. « Antonio's Blog on How to install .Net Framework 3.5.1 on Windows 8 Developer Preview

Archives

Categories

Active Directory (11) ADFS (2) Azure (3) Cloud Identity (1) Cloud Security (1) Conditional Access (1) Cybersecurity (4) Email Authentication (1) Email Security (1) Enterprise Security (1) Exchange (2) Game (2) Identity & Access Management (2) Identity Security (1) LAPS (1) Microsoft (11) Microsoft 365 (1) Microsoft Entra (5) Microsoft Exchange (1) Microsoft Intune (1) Mobile (4) NTP Server (1) NVIDEA (1) Open Source (2) Performance (1) Phishing Protection (1) PKI & Certificates (1) PowerShell (2) RADIUS (1) Security (6) Security Copilot (1) Social Network (4) Start screen (1) Technical (3) Tech Tips (3) Thunderbird (1) Troubleshooting (17) Uncategorized (34) Windows (5) WIndows 7 (4) Windows 8 (12) Windows 8.1 (4) Windows 10 (7) Windows 11 (5) Windows 11 Tips (11) Windows Server (7) Windows Server (1) Windows Server 2008 R2 (1) Windows Store (1) Zero Trust (2)

Tags

Azure AD B2B (1) Certificate-Based Authentication (2) Conditional Access (2) Cross-Tenant Sync (1) DirectAccess (1) Enterprise Identity (1) IAM (1) Intune (2) Intune Cloud PKI (1) Linux Security (1) microsoft (2) Microsoft 365 Security (1) Microsoft Entra (3) Microsoft Entra ID (1) microsoft exchange (2) Microsoft Identity Broker (1) Microsoft Intune (1) migration (1) NTP (2) office 365 (1) office 365 for education (1) Phishing-Resistant MFA (1) PKI (1) SCEP (1) Server (1) Smart Card Authentication (1) SSO (1) ubuntu (1) YubiKey (1) Zero Trust (4)

© 2026 Core365 Cloud. All rights reserved.