¿What is Windows Server? Most common functions, problems and threats and how...
I hope you had an excellent valentines day community I hope you are having an excellent time and that it has also been a very successful week since there is a lot to do and to contribute to the...
View ArticleDifferences between Virus, Ransomware and Malware and their ways of attacking...
Happy weekend community as always I hope that everything is going excellently, in this article I want to emphasize a common and simple but important issue to clarify since many times due to lack of...
View Article¿What is a Proxy? risks of using a proxy to navigate
Good evening, community, I send a big greeting to all of you and I hope that you have achieved your personal goals of the week as I always say the continuous duty and there is no rest to improve...
View Articlesecurity flaw of windows10 day zero and how to avoid it
We echo a new vulnerability that affects Windows. Specifically, an error in the contact application that could allow an attacker to execute arbitrary code remotely. It is a vulnerability of Zero-Day...
View ArticleThe new era in endpoint protection: the last line of defense or, the first?
The number of devices that have become part of the ecosystem of companies has been increasing. Either because to improve its functioning, organizations have decided to invest in new technology; or...
View Articlehow to avoid viruses on our Android devices
Has your Smartphone been infected by a virus? Do not worry, in a COMO we have the solution for you. Android is a system that has advantages and disadvantages. While it gives you total freedom to...
View ArticleAndroid does not escape from ransomware: the most serious threats and how to...
Android does not escape from ransomware: the most serious threats and how to avoid them.Normally, when we talk about ransomware, we usually think of computers. The most notorious attack was that of...
View ArticleSQL Query Showing Server Settings and Values – Enforce Console
The ContextContinuing the journey of mapping out DLP and its relationship to the Oracle database it sits on, we today look at how the server settings can be viewed and updated (if needed) in the...
View ArticleSQL Server definition, Functions, disadvantages and disadvantages, common...
Happy community week is time to start with new goals and meet the challenges of day to day, in the previous article that I had written I was talking about what is a Proxy and its risks to have an...
View ArticleWhat is a virtual machine, uses and advantages that provides us PART 1
What is a virtual machine, uses and advantages that provides us PART 1WHAT IS A VIRTUAL MACHINE?A virtual machine is software that we install on our computer.This software allows us to install and use...
View ArticleDifferences, characteristics and disadvantages of SQL Server and Oracle
Good evening community in the most recent article I made a focused emphasis of what is SQL Server, its functions, advantages, disadvantages, common mistakes and how to correct some problems that...
View ArticleWhat is a virtual machine, uses and advantages that provides us PART 2
as I had mentioned in my previous post.in this we will talk about what is needed to have a virtual machine, the types of virtual machines and the disadvantages of emulating an operating system.why not...
View ArticleOracle Definition, Functions, Advantages and Disadvantages
Happy evening community is approaching another day full of challenges and I want to take this article to talk a little about what Oracle is in the previous article talk about the comparison between...
View ArticlePowershell Script to Automate Server JRE and Detection Server Installation –...
The ContextWhen performing a DLP installation, there is a point in which two (or more, depending on installation tiers) .msi files must be executed to install the server JRE and Detection Server. This...
View Article15 tips to optimize SQL queries!!!!
hello happy tuesday in this article I will talk about how we can optimize our searches under the optimization of SQL.ok many have already said it for articles through this beautiful page but it is...
View ArticleData Loss Prevention (DLP) - Migrator.exe Automation Script
Hello,In this article I have created an automation script allowing users to automate either the EnforceMigrator.exe or the SingleTierMigrator.exe process following an upgrade from 14.6 to 15.1.As part...
View ArticleData Loss Prevention (DLP) - Migration Rollback Automation Script
Hello,In this guide I've written a basic script which will allow a basic rollback of DLP following issues migrating from 14.6 to 15.1, it should be noted that this article is only relevant if the...
View ArticleMicrosoft Access definition, functions, advantages and disadvantages
Greetings Community Happy Tuesday to all of you today has been a very productive day and with much to do I hope you are in the same and fulfilling the daily goals, in my last 3 articles I talked...
View ArticleThe 5 most destructive viruses of 2018 and are still in force today
2018 has been a very busy year at the level of viruses and malware. Do you want to know some of the most destructive of this year? Do not stop reading. I will reveal five.As is well known, computer...
View ArticleSpam mail, type of email Spam, Virus, Ransomware and Malware in email Spam
Good night community today concludes another day full of success and high productivity in each activity designated by the areas of our work, I recently talked about an article related to Microsoft...
View Article