Sreeraj Nair
- ABE
- Active Directory
- Authentication Protocols
- automation
- boot into safe mode
- brontok
- Browser
- conficker
- Desktop Security
- Disk Space
- downadup
- File Server
- Financial Results
- folder options
- IBM
- infection
- Internet
- Internet Explorer
- IT Infrastructure
- Kaspersky
- Kerberos
- kido
- LM
- Logon Process
- Microsoft
- MS Office
- NTLM
- NTLMV2
- Online Security
- opensource
- Operating System
- Operating Systems
- RAID
- Redundancy
- Retail
- security vulnerability
- Services
- Shares
- Super Computers
- virus
- Watson
- Windows 7
Archives
May 2023 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 -
Recent Posts
Recent Comments
SutoCom on How to set the Default Excel V… Sreeraj Nair on WINSXS Mike on WINSXS ashish on WINSXS Vir on WINSXS kamendra chauhan on Watson Vir on Watson Kamendra chauhan on How Kerberos Works Sreeraj Nair on Windows 7 Supports RAID1 Evgenij Smirnov on Windows 7 Supports RAID1 Virsingh Rathore on Notebook Entry: Leftover of Co… Harish Kumar Sharma on Windows 7
Author Archives: Sreeraj Nair
This Day, That Year – Detoxifying “Break”
I would like to start by saying this is supposed to be a personal Journal Log for myself and thus whatever health/medication/supplements/lifestyle related information and/or recommendation you may find here are meant for my personal use only, These practices are … Continue reading
Posted in Uncategorized
Leave a comment
BlueBorne
BlueBorne is the latest and the deadliest vulnerability related to Bluetooth. It’s details were published on 12 September 2017. Since it can spread like an airborne disease to any device that has bluetooth enabled on it, the exploit is aptly … Continue reading
Posted in IT Infrastructure
Leave a comment
The ‘Open’ Heartbleed
Before I start, let me; let everyone know that I’m not a fan of opensource, to the extent that you can call me anti opensource. So, on 7th April 2014, the world woke up to heartbleed, a vulnerability in the … Continue reading
Posted in IT Infrastructure
Tagged IT Infrastructure, Online Security, opensource, security vulnerability
Leave a comment
How to set the Default Excel Version when you have multiple versions on your server/PC
As per Microsoft, you need to install the oldest version first and the newest version last, if you intend to use multiple versions of MS Office on the same machine. There are KB articles for each version of Office that … Continue reading
I’m Back!!
OK, So here I’m with my next blog after about two and a half years, That’s a loooong time which flew really fast. I got married in the interim and life has turned on it’s head since then, I’m finding … Continue reading
Posted in Uncategorized
Leave a comment
Watson
From Science Fiction to Reality The other day, I was looking at a VB Script, which needed to be modified just a bit in order to be useful for me. Being a scripting illiterate, I was overwhelmed by the complexity … Continue reading
How Kerberos Works
What happens at the windows logon screen between the time you press enter after entering your credentials and ‘Loading Your Personal Settings’ message appears It hardly takes a second for your password to be accepted at the logon screen but … Continue reading
Posted in IT Infrastructure
Tagged Active Directory, Authentication Protocols, Kerberos, LM, Logon Process, Microsoft, NTLM, NTLMV2
1 Comment
IT in Retail
How it’s different from other Sectors It’s been two month’s since my last blog, in these two months, I celebrated my birthday, got hospitalized for the first time in my life and also switched my job (quite an eventful period, … Continue reading