What Is DISM and How Do I Use It?
Reading Time: 8 minutes We will go over all the specifics later but the short answer – DISM is a Microsoft Command Line tool that was designed to allow administration of the ‘Nuts and … Read More
Knowledge You Can Trust
Reading Time: 8 minutes We will go over all the specifics later but the short answer – DISM is a Microsoft Command Line tool that was designed to allow administration of the ‘Nuts and … Read More
Reading Time: 6 minutes The well known and respected Android Security Bulletin is a publication that contains all the details of security vulnerabilities that are affecting Android devices. Security patch levels of 2019-12-05 or … Read More
Reading Time: 3 minutes One of the most dreaded things on a Windows SysAdmin’s ‘to do’ list is maintaining Active Directory and all if it’s inter working parts. Objects, groups, permissions, security groups, rights, … Read More
Reading Time: 3 minutes Are you a WordPress user who has “Ultimate Addons for Beaver Builder” or “Ultimate Addons for Elementor” Installed? If you have not updated since Wednesday, December 11th 2019, chances are … Read More
Reading Time: 5 minutes Active Directory is one of those things that simply has more nuances than many people expect or even know about, especially when discussing different configurations which require the Scheme Admin … Read More
Reading Time: 2 minutes Component Based Servicing ( CBS ) are logs that contain information about installation or uninstallations during updates and patches. I am sure that you probably inferred that without too much … Read More
Reading Time: 3 minutes All Devices From The iPhone 4S to iPhone X are susceptible This latest iOS exploit has been mentioned to create a permanent, unblock-able jailbreak for hundreds of millions of iPhones … Read More
Reading Time: 3 minutes As many of us know – SSL’s are not only a common piece item of good internet structure, but the process has been made so simple that there really isn’t … Read More
Reading Time: 3 minutes Sometimes you only have a MAC address to work with — how do you find and identify the device on the network? If you are in IT, and chances are … Read More
Reading Time: 5 minutes Widely Known CPU Vulnerabilities Meltdown and Sprectre affecting Intel, AMD and ARM Are Creating Issues, Discussions and Hype. What Are They And How Do They Impact You? If you have … Read More