AUTHOR

Bill McCauley

Stories by Bill


Posts


Training

How to iterate through advfirewall rules

This article describes how to use Powershell to sort through Windows advfirewall rules and settings. It also provides information on using loops,...


Training

Working With Data: IP and Port Filtering

This article describes how to improve filtering on excel columns containing IP:Port information. A custom filter can be created to differentiate...


Training

How to allow multiple RDP sessions

A quick technology tips and tricks article to explain how to allow multiple RDP sessions on a Windows machine. A general use case is provided and...


Training

Secure Copy with SSH

A blog about using Secure Shell (SSH) to securely copy files using SCP.


Boolean Math (NOT Logic) – CISSP Domain 3

Hello everyone.  We’ve got another Boolean math session lined up for you today.  This time we’re going to take a quick look at the NOT logic and...


Boolean Math (XOR Logic) – CISSP Domain 3

Hello everyone.  We’ve got another Boolean math session to look over today.  Our focus this time will be on the XOR logic.  The XOR stands for...


Boolean Math (OR Logic) – CISSP Domain 3

Today we are going to take another look at some Boolean mathematics.  In particular, we’re going to focus on the OR operational logic, as covered in...


Boolean Math (AND Logic) - CISSP Domain 3

Today we’re going to take a quick look at the AND Boolean logic, which is covered in Domain 3 of the CISSP common body of knowledge (CBK).  To begin...


Encryption – CISSP Domain 3

We’re circling back to some more CISSP-related materials.  Today’s topic will be encryption, which can be found in CISSP Domain 3. By its very...