Active Directory, AntiVirus, Programming, Security, Software, Technology, Tool

Temporarily Bypassing the GPO: Access to TEMP has been restricted by your Administrator

It can happen that when you are trying to install new software on your device, the installation gets only so far and then mysteriously vanishes without completing the installation. This can happen for various reasons, but in this example, we’ll handle the cause as a policy set by system administrators to protect users from malware trying to exploit their system.

Continue reading “Temporarily Bypassing the GPO: Access to TEMP has been restricted by your Administrator”
Advertisement
.Net, ASP.NET, C#, Database, Programming, Security, SQL, VB.NET, Web Development, WebForms

Example of Encrypting and Decrypting a String into a SQL Table Using ASP.NET

I’ve put together this article because even after a lot of searching, I wasn’t able to find a simple, working example of how to encrypt and then decrypt a string that you are saving in your database in ASP.Net. Sure, there are some partial examples, but partial code usually doesn’t answer the question properly. Added to that, a lot of examples are out there that plain don’t work, confusing the issue and wasting a lot of time. So in this article I’ll give an example of a fully working test Web page that saves an encrypted string to a SQL Server database table, and that also shows the decrypted field back to the user.

Continue reading “Example of Encrypting and Decrypting a String into a SQL Table Using ASP.NET”

Penetration Testing, Programming, Security

Batch Script to Detect Non-Pingable Machines in a Range of IP Addresses

In an earlier article I talked about how to set up a batch script to loop through a range of IP addresses and attempt to resolve active machines within that range. In this article I will follow up on my earlier examples to help make the results of the scan more accurate.

Continue reading “Batch Script to Detect Non-Pingable Machines in a Range of IP Addresses”