Open in app

Sign in

Write

Sign in

HotCakeX
HotCakeX

35 Followers

Home

About

Pinned

Rethinking Trust: Advanced Security Measures for High-Stakes Systems

A digital signature is an excellent preventive measure, but when it comes to exploiting or infiltrating high-value targets things change….

Nov 4
Rethinking Trust: Advanced Security Measures for High-Stakes Systems
Rethinking Trust: Advanced Security Measures for High-Stakes Systems
Nov 4
Pinned

EKUs in WDAC, App Control for Business, Policies

EKU stands for Extended Key Usage, which is an extension of X.509 certificates that delineates the functions of the public key of the…

Jan 27
EKUs in WDAC, App Control for Business, Policies
EKUs in WDAC, App Control for Business, Policies
Jan 27
Pinned

The proper security mindset and rationale for Personal and Business users

Proper and proven ways to defend, secure and harden your environment for personal, business, enterprise or military use cases.

Aug 14, 2023
The proper security mindset and rationale for Personal and Business users
The proper security mindset and rationale for Personal and Business users
Aug 14, 2023
Pinned

WDAC policy for BYOVD Kernel mode only protection

This scenario involves removing the trust to any Kernel mode driver, whether they are vulnerable or not. It does not affect User-mode…

Jul 23, 2023
WDAC policy for BYOVD Kernel mode only protection
WDAC policy for BYOVD Kernel mode only protection
Jul 23, 2023

How to Securely Connect to Azure VMs and Use RDP

To establish a secure connection to your Azure VM, you need to make some preparations. You can avoid exposing your VM’s RDP port

Sep 24, 2023
How to Securely Connect to Azure VMs and Use RDP
How to Securely Connect to Azure VMs and Use RDP
Sep 24, 2023

BitLocker, TPM and Pluton | What Are They and How Do They Work

BitLocker, TPM and Pluton | What Are They and How Do They Work

Aug 31, 2023
BitLocker, TPM and Pluton | What Are They and How Do They Work
BitLocker, TPM and Pluton | What Are They and How Do They Work
Aug 31, 2023
Detect FYI

Published in

Detect FYI

Clean Source principle, Azure and Privileged Access Workstations

We have explored the clean source principle, which states that all security dependencies must be as trustworthy as the object being secured

Aug 24, 2023
Clean Source principle, Azure and Privileged Access Workstations
Clean Source principle, Azure and Privileged Access Workstations
Aug 24, 2023

How to create Bootable Windows USB flash drive with no 3rd party tools

How to create Bootable USB flash drive with no 3rd party tools for Windows clean installation.

Aug 14, 2023
How to create Bootable Windows USB flash drive with no 3rd party tools
How to create Bootable Windows USB flash drive with no 3rd party tools
Aug 14, 2023

Privacy, Anonymity and Compartmentalization

Privacy, Anonymity and Compartmentalization, First, we discuss privacy, which is the right to control what information is collected

Jul 23, 2023
Privacy, Anonymity and Compartmentalization
Privacy, Anonymity and Compartmentalization
Jul 23, 2023

Windows Defender Application Control (WDAC) Introduction

Application control is a crucial line of defense for protecting enterprises given today’s threat landscape.

Jul 23, 2023
Cyber CatGirl Command Centre
Cyber CatGirl Command Centre
Jul 23, 2023
HotCakeX

HotCakeX

35 Followers

Microsoft MVP - Visit my GitHub for all my works: https://github.com/HotCakeX | Harden Windows Security: https://github.com/HotCakeX/Harden-Windows-Security

Help

Status

About

Careers

Press

Blog

Privacy

Terms

Text to speech

Teams