Nu er geen Brexit-akkoord komt, is het onduidelijk hoe de uitwisseling van persoonsgegevens met het Verenigd Koninkrijk geregeld moet worden. Het foutief delen van data met het land kan leiden tot boetes voor Nederlandse organisaties. https://t.co/yuIvD9N3pA
18 Jan 2019
@Enexis wil graag de slimme meter plaatsing weigeren en afzeggen
14 Jan 2019
Rem Closing the loop 2018 GoTo 1964 https://t.co/HqtoP36czg
04 Jan 2019
One zeroday that still needs attention as there is no fix for it. Thanks @AndyF for sharing. A logged on user without admin rights can overwrite system files with this POC. Screen you users email attachments and downloads and educate your colleagues on security. Do not click! https://t.co/XcEwmYqLHI
31 Dec 2018
CVE-2018-8617 - CVE-2018-8618 -CVE-2018-8583 - Chakra Scripting Engine Memory Corruption Vulnerability in Edge browser fixed in December 11th 2018 update. So upgrade your Windows 10 systems. Thanx 4 the warning @AndyF https://t.co/HMvG33xhff
28 Dec 2018
Microsoft Windows Attack Surface AnalyzerThe, as always great, Petri Insider Newsletter by Petri.com pointed me to the Microsoft Windows Attack Surface Analyzer.
Attack Surface Analyzer is developed by Microsoft's Trustworthy Computing Security group. It is the same tool used by Microsoft's internal product groups to catalogue changes made to operating system attack surface by the installation of new software. Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface. This tool allows:
Reporting requires Microsoft .NET Framework 4 and can run on Windows 7, Windows 8, Windows Server 2008 R2, Windows Server 2012 R2.
Running the system scan
Reporting after installationWhen you start the program after installation and run the Attack Surface Analyzer, the reporting gives you a html page containing information about:
Attack Surface Report:
Table Of Contents
DownloadYou can download the Attack Surface Analyzer and the extensive documentation here.
You may vote your opinion about this article:
Scripts and programming examples disclaimerUnless stated otherwise, the script sources and programming examples provided are copyrighted freeware. You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation. However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data. Make sure you have verified full backups and the associated restore software available before running any script or programming example. Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
Generated by WebHalla™ Version 0.1.e.2 : Tuesday 22-1-2019
© Copyright 1995-2019 Johan van Soest