Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.
Working With Data: IP and Port Filtering
During our day-to-day work, there’s a lot of data that we interact with. In order to make good use of it, you need to be able to work with it in a way that makes sense for the task at hand. In today’s example, we’re going to consider a situation where the expected scan output contains IP ...Learn more
Training | penetration testing | pentesting | Windows | technology tips and tricks | rdp | sysadmin | system administration
How to allow multiple RDP sessions
The goal of this article is to walk through how to set up a Windows host to allow multiple remote ...Learn more
encryption | security | professionally evil | Secure Ideas | getting started | BitLocker | VHD | rtfm | manage-bde | mount-vhd | manage bitlocker | technology | technology tips and tricks | Windows 10 | VHDX | encrypted drive | technology tips | how-to | btfm | Windows 11
PowerShell Tips: How do I Mount a VHD or Lock a BitLocker Drive?
PowerShell Tips How do I Mount a VHD or Lock a BitLocker Encrypted Drive?Learn more