<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

how-to

Posted on 06.21.19 by Dan Franciscus

Detecting and Defending Against Pass the Hash Attacks

A pass the hash attack is a common attack vector utilized by many adversaries. In this attack, a Windows username is paired with the hashed value of a Windows account password. Let's take a deeper look.

Posted on 03.29.19 by Prateek Singh

How to Create and Configure an AWS VPC with Python

Amazon Web Services enables you to create a custom defined virtual network also know as Amazon VPC or Amazon Virtual Private Cloud, which, just like any traditional network in a data center, is highly scalable and easily configurable using programming languages like...

Posted on 03.06.19 by Prateek Singh

How to Automate AWS S3 Static Websites Using Python

Amazon Web Services offers a very popular object storage service known as Amazon S3 (Simple Storage Service) that enables you to store data, files, images and even videos in highly available containers called ‘buckets’ which are also easy to access endpoints using any...

Posted on 12.28.18 by Jeff Edwards

Podcast: What it's like to Start Your Own IT Website

A lot of people dream of leaving their day job and starting their own business, but for many, the risk, and the leap of faith required to take it, is simply to great of an unknown. For the 40th edition of Defrag This, we spoke to someone who's taken that risk to launch...

Posted on 10.29.18 by Nate Lewis

Safeguarding Your Network From Insider Threats

"The call is coming from inside the house...” This line from 1979’s When a Stranger Calls terrorized audiences by introducing the notion that the things we should be most fearful of may be in the spaces we feel most safe. This idea translates neatly to the enterprise...

Posted on 10.10.18 by Prateek Singh

Managing Windows System Administration with WMI and Python

Tired of managing Windows system administration tasks manually? Wish you could set up a few Python scripts instead? Where there's a will, there's a way! In this article, we'll show you how to install Python's WMI module and how you can use it to perform system...

Posted on 10.03.18 by Nate Lewis

The IT Guide to Handling BYOD Security Risks in the Workplace

Holding off from adopting a BYOD policy is an uphill battle. In the past five years alone, we’ve seen a number of significant shifts in technology and workplace culture. With these new changes come new security risks, so how do we address them?

Posted on 10.02.18 by Prateek Singh

How to Manage AWS IAM Users with Python

Amazon Web Services (AWS) offers a service known as Identity and Access Management (IAM) that lets AWS Administrators provision and manage users and permissions in AWS cloud.  AWS IAM can prove very useful for System Administrators looking to centrally manage users,...

Posted on 09.25.18 by Prateek Singh

How to Manage AWS EC2 Infrastructure with Python

In this article, we'll take a look at how system administrators can use Python to manage their Amazon Web Services (AWS)  Elastic Compute Cloud (EC2) infrastructure. You’ll learn to query existing EC2 instances, change the state of the virtual machines and their...

Posted on 09.21.18 by Jeff Edwards

VIDEO: How to Discover Azure Virtual Machines in WhatsUp Gold 2018

A new feature in Ipswitch's WhatsUp Gold network monitoring product is the ability to monitor Azure Virtual Machines. In this video from Ipswitch contributor Adam Betram, we'll cover how to add an Azure credential to WhatsUp Gold and how to set up an initial discovery to...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.