The following is from John C. Maxwell.
Leadership is influence.
Leadership is the ability to obtain followers.
After installing a Windows 2012 Server on one of my lab networks I found myself reading Windows Server 2012 Unleashed by SAMS. This is a very detailed book which is great for beginners or professionals. It helped me experiment and configure various Server 2012 features such as DNS, AD, DHCP, and IIS.
Windows Server 2012 Unleashed
Valuable for Windows professionals at all skill levels, this book will be especially indispensable for intermediate-to-advanced level professionals seeking expert, in-depth solutions. Every chapter contains tips, tricks, best practices, and lessons learned from actual deployments: practical information for using Windows Server 2012 to solve real business problems.
- Plan and migrate from Windows Server 2003 and 2008
- Leverage powerful capabilities that are truly new in Windows Server 2012
- Install Windows Server 2012 and the GUI-less Windows Server Core
- Upgrade to Windows Server 2012 Active Directory
- Utilize advanced AD capabilities including federated forests and identity management
- Plan and deploy network services, from DNS and DHCP to IPv6, IPAM, and IIS
- Protect systems and data with server-level security, transport-level security, and security policies
- Deliver true end-to-end secured anytime/anywhere access to remote/mobile clients
- Efficiently configure and manage users, sites, OUs, domains, and forests through Server Manager console
- Create more fault-tolerant environments with DFS, clustering, and Network Load Balancing
- Leverage major Hyper-V virtualization improvements in availability, redundancy, and guest support
- Manage Active Directory more efficiently with Active Directory Administrative Center, Best Practice Analyzer, and PowerShell scripts
- Systematically tune, optimize, debug, and troubleshoot Windows Server 2012
- Posted In: Book, Recently Read, Server
- Tags: AD, Administration, book, DHCP, DNS, IIS, Lab, Server, Windows Server 2012
I recently found myself reading about an older man-in-the-middle attack:
WPAD Man In The Middle Attacks
Web Proxy Auto-Discovery Protocol (WPAD)
Used to intercept web traffic by using a non-authorized server as a proxy server. This can lead to various attacks as simple as capturing clear text passwords on an internal network.
I recently found myself reading:
Basic Security Testing with Kali Linux by Daniel W. Dieterle
In “Basic Security Testing with Kali Linux“, you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system.
This hands-on, step by step learning book covers topics like:
- Kali Linux Introduction and Overview
- Metasploit & Metasploitable 2 Tutorials
- Information Gathering
- A section on Shodan (the “Hacker’s Google”)
- Exploiting Windows and Linux Systems
- Escalating Privileges in Windows
- Wireless (WiFi) Attacks
- Social Engineering Attacks
- Password Attacks
- Kali on a Raspberry Pi
- Securing your Network