-
WSL: Kali Linux within Windows

“IT should not be a religion, it should be about selecting the right tools for the job.” The first time I said those words I was on a Microsoft stage, wearing a Microsoft logoed shirt, speaking to a Microsoft audience. I remember seeing the event sponsor – a Product Manager at Microsoft Canada – turn…
-
Outside My Comfort Zone
While my focus has of late shifted to cybersecurity, I have spent most of my teaching career focusing on Microsoft technologies. It made sense, since as an IT consultant I had always specialized in Microsoft infrastructure technologies. Even with my recent shift to infosec, I am still the go-to instructor for the Microsoft stack for…
-
A Familiar Blackmail Scam
This post is dedicated to a longtime friend and avid reader of this blog. Rick passed away last week, and he will be missed. My life is richer for having been friends with him all these years. Not for nothing… I always knew his passwords, no matter how often I tried to convince him to…
-
Stackable Certifications Revisited
Nearly five years ago I wrote an article about Stackable Certifications. This was when I had just earned my first two stackable certifications from CompTIA because I had passed A+, Network+, and Security+. For passing four CompTIA exams I had earned five certifications (adding CIOS and CSIS to those three). I am not sure if…
-
On Connect Woes & Broken AD Links
I woke up this morning to an email that read: Password Hash Synchronization heartbeat was skipped in last 120 minutes. While this happens for no apparent reason from time to time, I logged in four hours after the email came in and noticed the issue had not been resolved. I went to log into my…
-
It’s Not Too Late… Yet.
One of the things I always tell my students is that it is much easier to build security into your IT infrastructure if you do it from the planning phase, and not as an afterthought. I read a great quote recently: The best time to plant a tree is twenty years ago; the next best…
-
How Could You Let That Happen?
A close friend of mine, an elderly gentleman from the old country (in every way), is going through a terrible time right now. Part of his struggles includes (a known) someone hacking into his email account. When he asked me ‘…why can’t I just hack into the account to take it back?’ I had to…
-
End of Days

In the IT field there are a number of different names for it. CompTIA seems to use two terms: End of Life (EOL) denotes that a product is no longer available for purchase, and End of Service Life (EOSL) means that it is no longer supported by the vendor. Microsoft uses the term End of…
-
You May Be Exposed… Deservedly!

I received this email this week: Let me be clear: these emails are quite important, and you should be paying close attention to them. With that said, this particular exposure was from nearly five years ago. If you have a password that is that old then maybe you deserve to be compromised? With multifactor authentication…
-
Not a Security Person…
I was approached about a job recently by a company I have worked with in the past. While speaking with the recruiter he told me that one aspect of the position was Identity and Access Management (IAM). He then told me that the client had specifically told him that “This job is NOT related to…
-
Certified in Cybersecurity
I have been security-minded for most of my adult life. Whether or not I have always lived it is another matter, but I have learned my lessons and have done my best to continually improve. While I have been taking IT certification courses and exams for nearly twenty-five years, it was only in 2022 that…
-
Goodbye to an Era

In the days after the demise of cassette tapes and before MP3s existed there were basically two ways get your music legally: You could listen to the radio of course… but the vast majority of people purchased it on Compact Disc (CDs). Tower Records reigned supreme but there were many other places to purchase them……
-
Security Copilot: WARNING!

I have been a technology blogger since 2002. I could not possibly go back to count, but I would not be surprised if I have written over a thousand articles on or around Microsoft products, technologies, events, and solutions. Whether you have read one or two, or all of them, I can guarantee you that…
-
Domain vs. Entra… or both?
This will be the first of a multi-part series on configuring and managing device Identity and Access Management (IAM) for Microsoft In the year 2000, Windows 2000 Server was released, and with it came a new era of authentication. Microsoft introduced Active Directory to the world, which would later be known as Active Directory Domain…
