Home
MCNC CNE
Cancel

Windows-based SFTP Server

This guide demonstrates the precedure for creating a Windows-based SFTP server using the built-in OpenSSH instance. The end result is an SFTP server only available to the “sftpusers” group via sftp...

SSL Certificate Management

PEM Format (*.pem \ *.crt \ *.cer \ *.key) The PEM format is a base64 encoded file format representing an X.509 certificate, or the certificate you are presented in your browser. If you open the ce...

Securing Admins with Smart Cards (Yubikeys)

We all know that giving local admin rights to normal users is a big no-no, but what happens if an administrator’s account is compromised? What if a domain admin’s account credentials are obtained? ...

PowerShell Script Signing

Windows PowerShell has what’s called an Execution Policy. This policy defines how scripts are handled, and by default it is set to Restricted, which means no script is allowed to run. This is to pr...

PAC File Syntax Explained

PAC files can seem a bit complicated at first, but keep in mind that they are just a javascript function with only two inputs. We’ll be going over an example PAC file and discussing what each sect...

PAC File Tips & Tricks

Lets try to clear up some common questions and issues with PAC files Understand what the “url” and “host” variables are You will always see the following on the top line of a PAC file function...

Allowing Wifi Calling

Cell phone coverage can be spotty in some areas, as we all know. This is especially true in old concrete-walled buildings. Since most, if not all, educational institutions today have a wireless in...

Network Throughput Testing with iPerf

Should you want to test your througput between two points in your network, you’ll need a tool like iPerf to do so. This guide will show you how to get the client and server up and running, as wel...

Capture Packets on iOS Devices

From time to time you may need to gather some information about what an iOS device is doing on your network. For instance, you may need to know what URLs an app is using so it can be bypassed in ...