Archives

Martin Zugec

Password Wars: Randomizing Local Admin Passwords in Non-persistent Environments

The Phantom Menace

Achieving complete control over a company is a feat that requires a black belt and serious Jedi hacking skills. You must create a chain of multiple zero-day exploits to get into a network (we all know they


  

Related Stories

Continue reading..

Citrix Optimizer

What does it do?

I’ve always found the way operating systems evolve and adapt to be fascinating. They have more functionality with every release, their inner workings are more intelligent, they can automatically adapt to different situations, and are generally …


  

Related Stories

Continue reading..

Citrix Optimizer

What does it do?

I’ve always found the way operating systems evolve and adapt to be fascinating. They have more functionality with every release, their inner workings are more intelligent, they can automatically adapt to different situations, and are generally …


  

Related Stories

Continue reading..

“Unsinkable”: The Myth of Foolproof IT Security

When we hear the name “Titanic,” there are many words and associations that immediately come to mind.

Tragedy.
Disaster.
Lifeboats.
Catastrophe.
Leonardo DiCaprio.

Arguably, though, the word most commonly associated with the storied ship is “unsinkable.” The advertisement and marketing …


  

Related Stories

Continue reading..

The Art of Cyberwar

“If you know yourself, but not the enemy, for every victory gained you will also suffer a defeat.” 

― Sun TzuThe Art of War

There has never been a better time in history to work in cybersecurity. Crypto-currencies …


  

Related Stories

Continue reading..

You Can’t Touch This

What is GDPR?

Mission: The mother of data protection laws. Now, with teeth!
Impact: Potentially global. Do you have customers from the EU? Then you might be affected by GDPR, no matter where you’re located.
Fines: Up to EUR …


  

Related Stories

Continue reading..

WannaCry: Why Citrix Customers Are Not Crying Today

What is WannaCry?

On Friday, 12 May 2017, one of the largest cyber-attacks in modern history had started. Ransomware WannaCry (or WannaCrypt) had infected more than 230,000 computers in 150 countries in a very short time. It had global impact, …


  

Related Stories

Continue reading..

How to Assign Desktops to Specific Servers in XenApp 7

This is part 2 of my blog post series about new application and desktop publishing. Part 1 explained how the application publishing works, part 2 will focus on desktop publishing.

Why do we need this?

XenApp 7.12 has …


  

Related Stories

Continue reading..

How to Assign Applications to Specific Servers in XenApp 7

The latest release of XenApp and XenDesktop includes a key feature - the ability to assign applications and desktops to specific servers — and the ability to quickly remove some servers from application. To learn how that works, read on.


  

Related Stories

Continue reading..

Secure Browsing with Citrix & Bitdefender

The internet: friend or foe?

In my career as a field consultant, I’ve worked in a lot of different environments with a lot of different customers, from a very small hospital in Qatar with just a few employees to Russia …


  

Related Stories

Continue reading..

Go Que Newsroom

Categories