Martin's selection of few interesting IT Security, Privacy, and free tools from the Net

Tuesday, July 18, 2017

Free books from Microsoft

I am sure there is something that you will find useful



https://blogs.msdn.microsoft.com/mssmallbiz/2017/07/11/largest-free-microsoft-ebook-giveaway-im-giving-away-millions-of-free-microsoft-ebooks-again-including-windows-10-office-365-office-2016-power-bi-azure-windows-8-1-office-2013-sharepo/
Posted by MVJBlogger at 1:39 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Free book

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Translate

About Me

MVJBlogger
View my complete profile

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Popular Posts

  • New Pen Test Poster from SANS
    Get it here. http://counterhack.net/Poster_PenTest_2015.pdf
  • Good news - Firefox (v58 - Jan 2018) will add a new feature - BLOCK canvas-browser-fingerprinting
    Mozilla is testing a new feature in the upcoming version of its Firefox web browser that will grant users the ability to block canvas f...
  • Serverless Architectures - We can't add any endpoint protection (firewall,HIPS,EDR) so, what can we do?
    No magic bullet here - Serverless computing forces software architects and developers to approach security the way it should've been a...
  • Useful Add-On - For Symantec DLP - for better dashboard with Real-time Data. (if you have extra money to spend)
    This might help those who need real-time data According to the article:-  MetriX provides those within security with an unprecedented...
  • njRat (not New Jersey Rat) Malware - infect 24K computers, and is used by 487 groups.
    This is the downside of (evil)code that can easily be ported or shared. According to the article:- "Symantec analysed 72...
  • I was not aware of this - Google DNS was hijacked for 22 minutes on March 16
    It does not seem to be Google's fault but the ISP  According to the article:-  Google's Public DNS servers are used...
  • You are not safe any more - Malvertising hits websites such as YouTube, Amazon and Yahoo
    If three of the most popular sites are being targeted by Malware how, can a common man survive. If you have not done this before , ...
  • Six examples - How employee accounts could be compromised.
    Everyone knows compromised accounts are hard (not impossible) to detect.  One of the problem is that employees don't like it when...
  • With negligent admins , hackers don't have to work hard - A hacker managed to obtain the sensitive documents (U.S. Military Drone Documents) by gaining access to a Netgear router that was using the default FTP login settings for file sharing.
    The authentication vulnerability in Netgear routers that hacker exploits to access the sensitive military data was initially discovered tw...
  • Value of a hacked PC in Pictures
    From: http://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/

Categories

  • 3rd party
  • 3rd Party Risk
  • abuse
  • Active Directory
  • Add-On
  • admin error
  • advisory
  • AI
  • AMAZON
  • Android
  • App Security
  • Apple
  • APT
  • ATM
  • attack
  • Authentication
  • automation
  • automobiles
  • Availability
  • backdoor
  • Bad Programming
  • Bad Security
  • Banks
  • Basics
  • bec
  • best practice
  • Big Brother
  • Big Data
  • biology
  • Biometrics
  • BLOCKCHAIN
  • Botnet
  • browser
  • Bureaucracy
  • Business
  • buzzword
  • BYOD
  • c
  • certificate
  • checklist
  • child privacy
  • children
  • chrome
  • Cloud
  • Communication
  • COMPLIANCE
  • Compromise
  • confidentiality
  • Consumer Goods
  • containers
  • Contrarian View
  • COVID-19
  • creative
  • credentials
  • Credit Card
  • Credit Card Privacy
  • cryptocurrency
  • cryptomining
  • Cyber Insurance
  • CyberAttack
  • Cyberespionage
  • CyberSecurity
  • Dangerous
  • Dashboard
  • Data Breach
  • data collection
  • Data exposed
  • Data Loss
  • database
  • DDoS
  • Defense-In-Depth
  • Denials
  • discovery
  • dishonesty
  • DLP
  • DNS
  • do-it-yourself
  • doubbt
  • double-standards
  • Dumb
  • email
  • encryption
  • end of life
  • endpoint
  • EOL
  • ERP
  • Exfiltration
  • exploit
  • exposed
  • extortion
  • extra
  • Fact-is-stranger-than-fiction
  • fake
  • fingerprinting
  • Fix
  • Flaw
  • Forensic tool
  • Forensics
  • Fraud
  • Free book
  • Free Courses
  • free poster
  • Free Software
  • free tools
  • Funny
  • Future Tech
  • Gadgets
  • GDPR
  • General
  • General Knowledge
  • Geo-Tracking
  • gone with the wind
  • Good News
  • Good Reads
  • Google
  • gov
  • Government
  • GRC
  • Guidelines
  • Habits
  • Hack Tools
  • hacked
  • Hacking
  • Hacktivism
  • Hall Of Shame
  • hardware bug
  • health
  • HealthCare
  • Hijack
  • HIPAA
  • History
  • HOW-TO
  • HP
  • Human Nature
  • human vulnerability
  • Hypocricy
  • IAM
  • Identification
  • identity theft
  • illiterate
  • Incident Response
  • Industry News
  • infection
  • Insider Threat
  • inspiring
  • interesting
  • internal theft
  • Invention
  • IoT
  • iPhone
  • Ir-responsible
  • ISACA
  • ISP
  • Jargon
  • Law
  • Layered Security
  • laz
  • laziness
  • lazy coding
  • Legal
  • LIES
  • LIFE
  • Linux
  • mail
  • Malware
  • Management
  • Marketing
  • Medical
  • Mergers and Takeovers
  • Metadata
  • Methodology
  • Metrics
  • mfa
  • Microsoft
  • misinformation
  • mistakes
  • Mobile
  • Mobile App
  • Money
  • Monitoring
  • Multi-Factor
  • Myths
  • Nature
  • Negative Report
  • networking
  • new feature
  • nice
  • no-confidence
  • non-profit
  • Open Source
  • OS
  • Outdated
  • OutSourced
  • password
  • patches
  • PDF
  • Pen Test
  • Penalty
  • Philosophy
  • Phishing
  • PII
  • PKI
  • Policies
  • Poster
  • Predictions
  • Privacy
  • process failure
  • product knowledge
  • Programming
  • Protection
  • Public Incidents
  • Questions
  • QUIZ
  • Quotes
  • Ransomware
  • RAT
  • Repeated Failures
  • Report
  • Research
  • Risk
  • ROI
  • RSA
  • SANS
  • SANS top 20
  • scams
  • scareware
  • Science
  • Scientists
  • screw-up
  • Security
  • Security Analytics
  • security awareness
  • Security Breach
  • Security Ignorance Syndrome
  • Security Mistakes
  • serious
  • serverless
  • SIEM
  • SIS
  • smart devices
  • smart home
  • smart phones
  • SmartHome
  • SOAR
  • Social Network
  • Software
  • spyware
  • State Sponsored
  • Storage
  • Strange
  • supply chain
  • surveillance
  • Survey
  • Symantec
  • Synergy
  • Technology
  • Terminology
  • testing
  • Theft
  • third party
  • third party insecurity
  • Threat
  • tips
  • tracking
  • training
  • traking
  • Trojan
  • Trust
  • tutorial
  • unethical
  • Universe
  • USB
  • useful
  • Victims
  • Video
  • virtualization
  • Vmware
  • VPN
  • Vulnerability
  • Watchout
  • wearable tech
  • Web
  • web attack
  • White Papers
  • WiFi
  • windows
  • Wireless
  • Wisdom
  • Worm
  • XP
  • zero trust
  • zero-day

Blog Archive

  • ►  2020 (71)
    • ►  July (8)
    • ►  June (6)
    • ►  May (10)
    • ►  April (8)
    • ►  March (16)
    • ►  February (12)
    • ►  January (11)
  • ►  2019 (145)
    • ►  December (10)
    • ►  November (9)
    • ►  October (11)
    • ►  September (10)
    • ►  August (22)
    • ►  July (8)
    • ►  April (10)
    • ►  March (17)
    • ►  February (24)
    • ►  January (24)
  • ►  2018 (352)
    • ►  December (18)
    • ►  November (30)
    • ►  October (25)
    • ►  September (19)
    • ►  August (37)
    • ►  July (43)
    • ►  June (49)
    • ►  May (36)
    • ►  April (26)
    • ►  March (22)
    • ►  February (9)
    • ►  January (38)
  • ▼  2017 (155)
    • ►  December (30)
    • ►  November (29)
    • ►  October (35)
    • ►  September (14)
    • ►  August (5)
    • ▼  July (14)
      • Wannacry and NotPetya are just the beginning - Can...
      • You have heard gone in 60 seconds - How about 7 mi...
      • Interesting Article - The Cyber Kill Chain is maki...
      • Free books from Microsoft
      • WatchOut - Fake Whatsapp email - "Your subscriptio...
      • Fact is stranger than fiction: 50% of Ex-Employees...
      • Top 10 Malware - According to Check Point
      • Top 10 Phishing Emails
      • Digital Parenting? - 5 Key tips
      • Cybersecurity guide for small and medium size busi...
      • There is no such thing as “too small to hack"
      • MQTT - The scary part of IoT
      • SpyDealer - Not a movie name , It is an Android Ma...
      • What happens if you don't patch your computers - W...
    • ►  June (2)
    • ►  May (8)
    • ►  April (6)
    • ►  March (6)
    • ►  February (4)
    • ►  January (2)
  • ►  2016 (64)
    • ►  December (3)
    • ►  November (1)
    • ►  October (2)
    • ►  July (7)
    • ►  June (3)
    • ►  May (7)
    • ►  April (19)
    • ►  March (6)
    • ►  February (8)
    • ►  January (8)
  • ►  2015 (127)
    • ►  October (16)
    • ►  September (18)
    • ►  August (20)
    • ►  July (21)
    • ►  June (23)
    • ►  May (22)
    • ►  April (3)
    • ►  March (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2014 (411)
    • ►  December (7)
    • ►  November (1)
    • ►  October (6)
    • ►  September (4)
    • ►  August (20)
    • ►  July (27)
    • ►  June (8)
    • ►  May (33)
    • ►  April (68)
    • ►  March (191)
    • ►  February (46)
Simple theme. Powered by Blogger.