Josh Brade


Cybersecurity Link Collection

I’ve put together a collection of Cybersecurity web links that I’ve gathered over the years, featuring tools, resources, news, tutorials, and more. I’m always adding new links, so the list keeps growing. Some of the links are still unsorted, but I think you’ll find plenty of useful information here. Take a look and see if… Continue reading Cybersecurity Link Collection

Network Adapters in Windows – A Shortcut Story

Microsoft’s constantly evolving layouts can be a bit frustrating, making it tricky to locate settings at times. One of these pesky settings, now requiring a bit of a runaround, is accessing Network Adapters in both Windows 10 and 11. But fear not! Here’s a quick tip to swiftly navigate to the network adapters and put… Continue reading Network Adapters in Windows – A Shortcut Story

Adobe Acrobat Is Scanning Your Documents

The generative AI features in Adobe Acrobat are scanning your documents! This could possible lead to sensitive data leakage. You can turn this feature off through the windows registry. “Go to Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Adobe Acrobat\DC\FeatureLockDown create a new dword key under feature lockdown, bEnableGentech 1 will enable the feature, 0 will disable the feature and remove all… Continue reading Adobe Acrobat Is Scanning Your Documents

Starting a Journey through Cybersecurity: A Roadmap

Embark on your cybersecurity journey with this well-rounded curriculum. These courses and learning paths equip you with fundamental knowledge and hands-on skills essential in the cybersecurity landscape. By completing these certifications, you’ll be well on your way to becoming a capable and well-rounded cybersecurity professional. Remember, continuous learning and practical application are key in this… Continue reading Starting a Journey through Cybersecurity: A Roadmap

Two Free Cybersecurity Training Platforms

Empowering Cybersecurity Enthusiasts In the dynamic landscape of cybersecurity, knowledge and skills are the armor that shields against digital threats. SecurityBlue Team and AntiSyphon Training, both dedicated to bolstering cyber defense proficiency, offer an invaluable opportunity to harness expertise in this critical field. Let’s dive into a comprehensive exploration of these two remarkable platforms that… Continue reading Two Free Cybersecurity Training Platforms

Streamlining Windows Image Preparation

Streamlining Windows Image Preparation with the Power of PowerShell: An In-depth Look at the Remarkable Windows10Debloater Script In the ever-evolving realm of IT, efficiency and precision are paramount, especially when it comes to preparing Windows machine images. Enter the Windows10Debloater script by Sycnex, a powerhouse tool that transforms the image preparation process into a streamlined… Continue reading Streamlining Windows Image Preparation

Rejoin to Azure Domain Command

When you’re dealing with an Azure Domain and you end up needing to rejoin a computer to the domain, things can get a bit tricky, especially if you’ve renamed the PC after it joined the domain. Here’s the deal: sometimes, even after you’ve changed the computer name, the old one still shows up when you… Continue reading Rejoin to Azure Domain Command

Privacy Forward Operating Systems

Imagine you’re someone who wants to use the internet without others being able to easily see what you’re doing online. You also want to keep your personal information safe from hackers and prying eyes. That’s where operating systems like Tails and Whonix come in. Tails: Tails is like a special tool you can use when… Continue reading Privacy Forward Operating Systems

Installing Kali Linux as Proxmox Container

Obtaining the Latest Kali Image When it comes to getting the latest Kali image, follow these steps: Navigate to the Image Source – First, head over to the official Kali Linux images repository at Select the Current Version Folder – Within the repository, locate and click on the folder that corresponds to the current… Continue reading Installing Kali Linux as Proxmox Container

UNC Path – Still Asking for credentials

I have been working on a project with GED machines at work, and wanted to share my hair-pulling story. Specifically, the machines that students utilize require a mapped drive for establishing a connection to the proctor/administrative machine in the setup. During this process, I encountered an unexpected complication. Despite successfully mapping the drive and ensuring… Continue reading UNC Path – Still Asking for credentials