Several vulnerabilities were found in the firmware of the Logitech wireless dongles that can allow a skilled hacker to take control of your computer sending keystrokes through the wireless dongles. The attach is possible even if the receiver was designed for a mouse or a presenter. The attach is not so naive and requires specialised […]
From the basic configuration of Sentinel EMS to the product activation in four quick and easy to follow videos. You will learn how to do the essential configuration to start using Sentinel EMS, how to define a product from scratch, how to create an entitlement for that product and how to consume that entitlement using […]
Vivo da oltre 12 anni all’estero, in UK, e qualche giorno fa, per aiutare un amico connazionale che aveva la necessità di inviare una domanda di partecipazione a un concorso pubblico m sono imbattuto nella PEC (Posta Elettronica Certificata), un realtà tutta italiana. Questi gentiluomini banditori del concorso avevano configurato la loro casella così da […]
I just realised for Gemalto a series of videos to explain in a nutshell how to use Sentinel LDK. I cover in this short series of short videos all the process from installing the suite from scratch to burn the license on a key and use it. I talk briefly about the APIs as well […]
I just wrote a new article about a particular aspect of Sentinel RMS: the challenge response mechanism. In a nutshell, this mechanism is to enhance the security of you RMS solution verifying that the libraries of RMS are not forged. The article is available on LinkedIn here: https://www.linkedin.com/pulse/sentinel-rms-challengeresponse-mechanism-unveiled-zuppone
I’m drilling down in Adobe Captivate 9 a lot recently and I problem that I faced was how to add a button to every single slide of an assessment project to return back to a page that explains the objectives of it. The other problem was how to return back from the assessment objectives page […]
How to extract information from the Chrome preferences file and collect them with Custom Inventory R...
If you already had a look inside the Chrome folders on your Windows machine for sure you noticed that Chrome saves the preferences in a file under: C:\%USERPROFILE%\AppData\Local\Google\Chrome\User Data\Default\ The file that contains the preferences is called Preferences and it is in JSON format. The best approach to extract the information that we need from that […]
In this video I’d like to show you how to use SNMP to monitor the disk space usage of the DELL KACE K1000 appliance using the new Asset Subtypes feature in conjunction with the Agentless feature. There is no more the need to use any 3rd party tools!!
Generally if you have installed the Windows OS using the distribution ISO you can notice that you have two partitions: one containing the OS and your data that occupies most of the disk space. another one that’s called the System Partition that is generally occupies 200MB. Capturing the image of a system with that partition schema […]
A customer, time ago, asked me more clarifications about how to join his scripted installed Windows 7 x64 to the domain and change the name to it as well in one go so I started to play a bit around with WSNAME and this is the solution that I suggested: Create a Scripted installation where […]