Filters:

  • Technologies

  • Instructors

  • Blog Author Archives: Mike Danseglio

    Installing Synaptic Package Manager in Kali Linux

    Kali Linux is a fantastic operating system for penetration testing and security evaluation. It comes with virtually all security tools built in, it’s lightweight by default, and it has a huge ecosystem that is constantly helping with the project. A great benefit of using Kali comes from the larger Linux community. Open source repositories are … Continue reading Installing Synaptic Package Manager in Kali Linux

    Enabling BitLocker Drive Encryption Without a TPM in Windows 10

    Windows 10 is quite an impressive operating system. It’s fast, it runs all of my old apps (even my retro games!), and it has tons of security improvements. BitLocker Drive Encryption isn’t new to Windows 10. Encrypting files in Windows goes all the way back to the Encrypting File System (EFS) in Windows 2000. BitLocker … Continue reading Enabling BitLocker Drive Encryption Without a TPM in Windows 10

    How to Span Two Monitors with One Background Image in Windows 10

    Windows 10 is quite an impressive operating system. It’s fast, it runs all of my old apps (even my retro games!), and it has tons of security improvements. It’s even got some nice user interface improvements, one of which I want to describe in this article. Many people use two (or more) monitors. I love … Continue reading How to Span Two Monitors with One Background Image in Windows 10

    Installing Every Possible Penetration Testing Tool in Kali Linux

    Kali Linux is a fantastic operating system for penetration testing and security evaluation. It comes with virtually all security tools built in, it’s lightweight by default, and it has a huge ecosystem that is constantly helping with the project. Kali recently began moving towards a rolling distribution. This allows both the core Debian operating system … Continue reading Installing Every Possible Penetration Testing Tool in Kali Linux

    The Importance of Updating Kali Linux Rolling Distribution

    Kali Linux is a fantastic operating system for penetration testing and security evaluation. It comes with virtually all security tools built in, it’s lightweight by default, and it has a huge ecosystem that is constantly helping with the project. Kali recently began moving towards a rolling distribution. This allows both the core Debian operating system … Continue reading The Importance of Updating Kali Linux Rolling Distribution

    Installing .NET Framework 2.0 3.0 and 3.5 in Windows 10

    Windows 10 is quite an impressive operating system. It’s fast, it has tons of security improvements, and is usually compatible with older apps. One quirk that I encountered recently was when I went to install mRemoteNG, a remote desktop client application. It requires the .NET Framework to work. That’s fine, because Windows 10 comes preconfigured … Continue reading Installing .NET Framework 2.0 3.0 and 3.5 in Windows 10

    How to Create a Bootable USB Windows To Go Installation for Windows 10

    I am a huge Windows 10 fan. I’ve had great success with deployment and configuration so far. Most of the functionality I want from both Windows 7 and Windows 8.1 is in there, along with lots of new features and improvements. For instructor-led Windows 10 training, see our complete class schedule.  Windows 8 introduced the … Continue reading How to Create a Bootable USB Windows To Go Installation for Windows 10

    CEHv9 Certified Ethical Hacking – White Hat vs. Black Hat – Why Ethical Hacking is important

      Transcription I’m Mike Danseglio, and I’m an instructor here at Interface Technical Training. One of the classes I teach here at Interface is Certified Ethical Hacking CEHv9. I Ethical hacking is a critical skill-set for anybody to have that’s in IT Security. Ethical Hacking is all about learning how hackers attack systems, how they … Continue reading CEHv9 Certified Ethical Hacking – White Hat vs. Black Hat – Why Ethical Hacking is important

    Performing Root Tasks as a Non-Root User in Kali Linux

    Kali Linux is a fantastic operating system for penetration testing and security evaluation. It comes with virtually all security tools built in, it’s lightweight by default, and it has a huge ecosystem that is constantly helping with the project. For instructor-led Security training see our course schedule.  I created a new installation of Kali Linux … Continue reading Performing Root Tasks as a Non-Root User in Kali Linux