Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.
Training,
professionally evil,
Secure Ideas,
Windows 10,
Windows 11,
sysadmin,
system administration,
cmd,
powershell,
firewall rules
How to iterate through advfirewall rules
There are several ways to pull firewall information from a Windows system. Today we will leverage Powershell to quickly find and review the different Remote Desktop rules that are in place. This use case revolves around Remote Desktop being our key search term, but this filter can be adjusted ...
Learn more
Never miss a Professionally Evil update!

Training |
professionally evil |
Secure Ideas |
technology tips and tricks |
sysadmin |
data |
data manipulation |
excel |
spreadsheet |
filtering
Working With Data: IP and Port Filtering
During our day-to-day work, there’s a lot of data that we interact with. In order to make good ...
Learn more
Training |
professionally evil |
Secure Ideas |
hacking |
Windows |
Windows 10 |
Windows 11 |
sysadmin |
system administration |
cmd |
wireless |
wifi |
wifi password |
powershell |
wireless profile
View Wireless Profile Password Information Using PowerShell or CMD
There are a couple different ways for you to access your Windows wireless password information. ...
Learn more

information security |
penetration testing |
CISSP |
education |
compliance |
risk assessment |
security controls |
information security program |
GLBA |
Safeguards Rule |
Dec 9, 2022 |
automotive |
banking |
vulnerability assessment
What are the key requirements of the GLBA Safeguards Rule?
The Gramm-Leach-Bliley Act (GLBA) contains the Safeguards Rule. This requires financial ...
Learn more
Training |
penetration testing |
pentesting |
Windows |
technology tips and tricks |
rdp |
sysadmin |
system administration
How to allow multiple RDP sessions
The goal of this article is to walk through how to set up a Windows host to allow multiple remote ...
Learn more
encryption |
security |
professionally evil |
Secure Ideas |
getting started |
BitLocker |
VHD |
rtfm |
manage-bde |
mount-vhd |
manage bitlocker |
technology |
technology tips and tricks |
Windows 10 |
VHDX |
encrypted drive |
technology tips |
how-to |
btfm |
Windows 11
PowerShell Tips: How do I Mount a VHD or Lock a BitLocker Drive?
PowerShell Tips How do I Mount a VHD or Lock a BitLocker Encrypted Drive?
Learn more

Boolean Math (NOT Logic) – CISSP Domain 3
Hello everyone. We’ve got another Boolean math session lined up for you today. This time we’re ...
Learn more

Boolean Math (XOR Logic) – CISSP Domain 3
Hello everyone. We’ve got another Boolean math session to look over today. Our focus this time ...
Learn more

Boolean Math (OR Logic) – CISSP Domain 3
Today we are going to take another look at some Boolean mathematics. In particular, we’re going to ...
Learn more

Boolean Math (AND Logic) - CISSP Domain 3
Today we’re going to take a quick look at the AND Boolean logic, which is covered in Domain 3 of ...
Learn more