Security, Compliance, and Identity Blog

Options
There are no articles in this blog yet.

Latest Comments

So if we use a point and print based windows print server to deploy printers to users/computers based on location AD location and all that, will this still work?WIll it be able to be simplified to not require drivers if all our printers are supported for WPP?Will we need a newer version of windows s...
0 Likes
Hi @SecPmCj thank you for your valueable article. Would you like to add words on nartac IIS crypt? It helps to understand Windows Server Crypto, cipher, orders and read and configure these. Of not limited to IIS but also Windows Server and Client in General and Server products such as Exchange Serve...
0 Likes
Sorry to hijack these comments but would like to ask the crowd here if they noticed these two phenomenon about Search-MailboxAuditLog, particularly in my case for Shared mailboxes, but I'm not sure that has any bearing on the issue. 1.) When you use Recover Deleted Items (i.e., items are in the Reco...
0 Likes
@Eric_Lawrence Thank you for the clarification and the excellent reference article. I had forgotten that strong naming and Authenticode are different things. I was not strong naming the assembly, only Authenticode signing which was definitely successful.
0 Likes
@Thehetz What steps specifically did you use to strong name the file? Strong Naming is a different sort of signature than Authenticode; you can Authenticode-sign binaries without Strong Naming them. (Fiddler does this, for example). https://stackoverflow.com/questions/4469646/net-strong-naming-vs-au...
0 Likes