Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

The Complete Guide to NTFS vs Share Permissions

The foundation of Windows security is simple — if you want access to a network resource such as a file or folder, you need the appropriate permissions. But implementation is more complex because the Windows operating system has two types of permissions: NTFS permissions, which operate at the file system level, and share permissions, which govern network access to shared resources.

PowerShell Environment Variables

Environment variables are predefined variables in an operating system, they are available in the form of key-value pairs which store important system-level or user-specific information, such as paths, user configurations, and system settings. These variables are accessible in PowerShell scripts and sessions, playing a significant role in tasks like configuring software, adjusting system paths, and managing user-specific settings.

How to Run a PowerShell Script

PowerShell is a scripting language and command-line shell designed for task automation and configuration management, primarily used by system administrators and advanced users. Built on the.NET framework (.Net Core for PowerShell 7), it supports Windows, Linux and macOS. It enables automation of administrative tasks such as managing user accounts, configuring networks and performing backups, thereby reducing human error.

What is Credential Stuffing?

Credential stuffing is a type of cyberattack where attackers use stolen username and password combinations, often obtained from previous data breaches, to gain unauthorized access to multiple online accounts. The attacker automates the process of trying these combinations across various websites, hoping that users have reused the same login details.