Windows

Scan for POODLE using nmap from a Windows machine

Researchers from the Google Security Team have published findings about a vulnerability in SSL 3.0. CVE-­2014­-3566 has been allocated for this protocol vulnerability. It is possible to use nmap to scan for the presence of this vulnerability by doing a scan on the supported SSL/TLS protocols. This post shows how to scan for the POODLE weakness using nmap.

Tags: 

Windows built-in command-line tools

A list of tools which are available on any Windows operating system.

General

  • date /t: shows the current date
  • time /t: shows the current time

Windows memory

  • mem /P: Displays status of programs currently loaded in memory.
  • mem /D: Displays status of programs, internal drivers, and other information.
  • mem /C: Classifies programs by memory usage. Lists the size of programs, provides a summary of memory in use, and lists largest memory block available.

Tags: 

Deny access to C-drive

In some companies, you can find that access to the C-drive of a Windows computer has been blocked. How do they do this?

You can easily do this by creating an entry in your domain policy. The path to the policy is
User Configuration\Administrative Templates\Windows Components\Windows Explorer
In that location, two policy-settings are available:

Tags: 

Pages

You might also be interested in...

Subscribe to RSS - Windows