

PowerShell script to remotely query Windows computers to determine if protected against Speculation Control Exploit (Meltdown\Spectre).
PowerShell script to remotely query Windows computers to determine if protected against Speculation Control Exploit (Meltdown\Spectre).
Students are able to access and run commands from the command prompt by creating a shortcut to registry and modifying a key.
By default any user can create a shortcut to C:\Windows\System32\reg.exe. This article describes how to prevent this.
Explains how to edit the security permissions associated with a Community Connect 4 (CC4) package, via write-access entries.
Explains how to edit the security permissions associated with a Community Connect 4 (CC4) package, via write-access entries.