Category: M365

Bluesnarfing

 tonyhughes  May 24, 2023

Bluesnarfing is a type of Bluetooth-based attack that targets mobile devices and allows unauthorized access to sensitive information stored on…

Bluejacking

 tonyhughes  May 24, 2023

Bluejacking is a form of Bluetooth-based wireless hacking or prank that involves sending unsolicited messages or files to Bluetooth-enabled devices,…

Backdoor

 tonyhughes  May 15, 2023

A computer backdoor is a hidden entry point or vulnerability intentionally created within a software application, operating system, or network…

Trojan

 tonyhughes  May 15, 2023

A computer Trojan, often referred to as a Trojan horse or simply a Trojan, is a type of malware that…

Virus

 tonyhughes  May 15, 2023

A computer virus is a type of malicious software (malware) that infects and spreads by attaching itself to legitimate programs…

Worms

 tonyhughes  May 15, 2023

A computer worm is a type of malicious software (malware) that spreads itself from one computer to another, typically over…

Microsoft Assessment and Planning (MAP)

 tonyhughes  April 21, 2023

The Microsoft Assessment and Planning (MAP) tool is a free, agentless tool designed to simplify and streamline the IT infrastructure…

Microsoft Deployment Toolkit (MDT)

 tonyhughes  April 21, 2023

Let’s dive into more detail about the Microsoft Deployment Toolkit (MDT), its features, functions, installation prerequisites, and a step-by-step guide…

Deployment: Microsoft Assessment and Deployment Kit (ADK)

 tonyhughes  April 21, 2023

The Microsoft Assessment and Deployment Kit (ADK) is a collection of tools that are used for deploying Windows operating systems,…

Deployment Answer Files

 tonyhughes  April 21, 2023

Answer files are configuration files used by Microsoft’s deployment tools such as Windows Deployment Services (WDS), Microsoft Deployment Toolkit (MDT),…