Sreeraj Nair
- ABE
- Active Directory
- Authentication Protocols
- automation
- boot into safe mode
- brontok
- Browser
- conficker
- Desktop Security
- Disk Space
- downadup
- File Server
- Financial Results
- folder options
- IBM
- infection
- Internet
- Internet Explorer
- IT Infrastructure
- Kaspersky
- Kerberos
- kido
- LM
- Logon Process
- Microsoft
- MS Office
- NTLM
- NTLMV2
- Online Security
- opensource
- Operating System
- Operating Systems
- RAID
- Redundancy
- Retail
- security vulnerability
- Services
- Shares
- Super Computers
- virus
- Watson
- Windows 7
Archives
March 2023 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 -
Recent Posts
Recent Comments
SutoCom on How to set the Default Excel V… Sreeraj Nair on WINSXS Mike on WINSXS ashish on WINSXS Vir on WINSXS kamendra chauhan on Watson Vir on Watson Kamendra chauhan on How Kerberos Works Sreeraj Nair on Windows 7 Supports RAID1 Evgenij Smirnov on Windows 7 Supports RAID1 Virsingh Rathore on Notebook Entry: Leftover of Co… Harish Kumar Sharma on Windows 7
Category Archives: IT Infrastructure
BlueBorne
BlueBorne is the latest and the deadliest vulnerability related to Bluetooth. It’s details were published on 12 September 2017. Since it can spread like an airborne disease to any device that has bluetooth enabled on it, the exploit is aptly … Continue reading
Posted in IT Infrastructure
Leave a comment
The ‘Open’ Heartbleed
Before I start, let me; let everyone know that I’m not a fan of opensource, to the extent that you can call me anti opensource. So, on 7th April 2014, the world woke up to heartbleed, a vulnerability in the … Continue reading
Posted in IT Infrastructure
Tagged IT Infrastructure, Online Security, opensource, security vulnerability
Leave a comment
How to set the Default Excel Version when you have multiple versions on your server/PC
As per Microsoft, you need to install the oldest version first and the newest version last, if you intend to use multiple versions of MS Office on the same machine. There are KB articles for each version of Office that … Continue reading
Watson
From Science Fiction to Reality The other day, I was looking at a VB Script, which needed to be modified just a bit in order to be useful for me. Being a scripting illiterate, I was overwhelmed by the complexity … Continue reading
How Kerberos Works
What happens at the windows logon screen between the time you press enter after entering your credentials and ‘Loading Your Personal Settings’ message appears It hardly takes a second for your password to be accepted at the logon screen but … Continue reading
Posted in IT Infrastructure
Tagged Active Directory, Authentication Protocols, Kerberos, LM, Logon Process, Microsoft, NTLM, NTLMV2
1 Comment
IT in Retail
How it’s different from other Sectors It’s been two month’s since my last blog, in these two months, I celebrated my birthday, got hospitalized for the first time in my life and also switched my job (quite an eventful period, … Continue reading