Blogs, Videos and Articles

HAFNIUM targeting Exchange Servers with 0-day exploits

Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and [...]

SuperVPN and GeckoVPN Security Breach

The user records of popular VPN services have reportedly been compromised, and millions of user data are now offered for sale [...]

How to network boot computers over ethernet with TFTP

An introduction video explaining how to boot computers and laptops etc over ethernet. The ability to boot devices over a network is [...]

How to setup Microsoft 365 spam filter policies

Microsoft (Office) 365 has many settings available to setup anti-spam policies which are probably overlooked and left unconfigured. In [...]

An introduction to Casilium, an open source ticket system

Sheridan Computers are an IT Support Company based in Manchester. As an IT Support company, or a Managed Service Provider (MSP), [...]

Untangle z4 Security Gateway Appliance overview

Unboxing of the Untangle z4 security appliance (official hardware), including basic installation and setup / overview of the prodct.

How to get started with multi-factor authentication

This video hopefully helps to educate users on multi-factor authentication (MFA) or two-factor authentication (2FA), what it is and why [...]

How to install Arch Linux with full disk encryption

I have recently installed Arch Linux on a few machines to replace Microsoft Windows. I am installing it one more time with the goal of [...]

What is a password manager and why you should use one

if you are not familiar with password managers and why you should be using one, this video walks through what a password manager is, [...]