Tech Tips from the Castle


Keeping the Wolves at Bay

April 18, 2018

The old biblical adage to “beware of the wolf in sheep’s clothing” in many cases applies to system administrators. Unfortunately, their mission sometimes conflicts with the security department. They must provide computing resources to users and they want to do it as quickly as possible. Bus...

Continue Reading...


High value targets are resources that would be of great interest to people who should not have access to them.

These might be folders containing compensation information, the email mailbox of the CEO, or the database containing the credit card numbers of your customers. Knowing where that data is...

Continue Reading...


Stay Away from the DUPs

March 20, 2018

We call them DUPs (rhymes with pups) and we are not referring to duplicates. What we mean are Direct User Permissions.

In the Microsoft world of CIFS shares you can provision access to folders in three ways: direct user permissions, Active Directory groups, or through built-in groups such as A...

Continue Reading...


In the days of lords and ladies, knights and pages, the lord of the manor decided what was important and not important to him. If it was important it stayed in the castle. If it was disposable and easily sacrificed it stayed outside the moat. Then all the lord’s efforts were spent defending the...

Continue Reading...