This guy has made an interesting comparison between different password generators and password managers.
Azure AD B2B Collaboration is now Generally Available! Azure AD B2B collaboration capabilities enable any organization using Azure AD to work safely and securely with users from any other organization, with or without Azure AD.
You will find the documentation on the following site:
Good blogpost about NTFS reconstruction:
VMware are providing vSphere PowerCLI to make it possible to administer vSphere and vCloud Director using PowerShell.
A good startingpoint is the VMware vSphere PowerCLI Documentation page that is available at: https://www.vmware.com/support/pubs/ps_pubs.html
If you´re in a hurry you could follow my quick starting guide below:
Step 1. Download and install VMware vShere PowerCLI:
VMware vSphere PowerCLI is available for download from http://www.vmware.com/support/developer/PowerCLI/index.html
Select the release you want to download from the drop-down list and click on the download-link.
Double-click on the downloaded installation-package and follow the instructions to install PowerCLI.
Step 2. Start PowerCLI and connect to a vCenter Server:
Double-click on the “VMware PowerCLI” icon to start PowerCLI.
Use the CmdLet ‘Connect-VIServer’ as shown below to connect to the vCenter Server:
Connect-VIServer -Server <server-IP> -Protocol https -Username '<Username>' -Password '<Password>'
Now you are ready to explore and manage the VMware vCenter environment using PowerShell. Start by executing the following CmdLet to list all available commands.
Bruce Schneier has published a good collection of links to IoT security and privacy guidlines on his blog:
Powershell makes it really easy to compare text-files, just use the following oneliner to compare two files:
Compare-Object -ReferenceObject (Get-Content c:pathtofile1.txt) -DifferenceObjet (Get-Content c:pathtofile2.txt)
Microsoft released an interesting whitepaper with their recommendations for password management:
I found a good blogpost that lists the most essential tools for penetration testing:
To summarise the post, the following tools are a good start:
– Vulnerability scanner (OpenVAS, Nexpose, Nessus)
– Word processor (Word, Writer)
– Internet access
– Liability insurance
– Virtualization (VirtualBox, VMware, Hyper-V)
– Kali Linux and a virtual Windows PC
– Network cables and a switch
Google released their “Vendor Security Assessment Questionnaire” as open source:
Good description on how to crack passwords (in Swedish):