How-Tos


8 ingredients dr
video

8 ingredients of an effective disaster recovery plan

How to keep your business running in the event of an emergency or disaster.

nwht 018 thumb
video

Linux tip: How to use the hostnamectl command

In this Linux tip, we look at the hostnamectl command. It’s a command that provides information on a particular system – including but not limited to its hostname – and even allows you to make some changes.

cssg 013 thumbnail
video

How to harden Windows workstations and servers from attack

Use these basic settings to make it harder for attackers to Windows hardware.

nwht 017 thumb2
video

Linux tip: How to use the pstree command

In this tip, we look at the pstree command. It allows you to get a listing of running processes that clearly indicates the relationship between them.

thumb
video

How to defend Office 365 from spear-phishing attacks

Configure Office 365 to detect email-delivered malware.

thumb
video

R tip: Write your own RStudio addins

This RStudio Addins tutorial shows step by step how to create an addin for the RStudio IDE

student books with apple for teacher

What is ITIL? Your guide to the IT Infrastructure Library

ITIL is a framework of best practices for delivering IT services. ITIL’s systematic approach to IT service management can help businesses manage risk, strengthen customer relations, establish cost-effective practices, and build a...

thumb
video

How to set up security in Office 365 to CIS recommendations

Following the Center for Internet Security’s benchmarks and checklists, here’s how to configure Microsoft Office 365 for the security level you need.

thumn
video

R tip: Creating color-coded calendars

See how well you’re achieving daily goals with a color-coded calendar made in R

thumbnail
video

How to enable and configure Office 365 logging and auditing

Make sure Microsoft Office 365 logging and auditing is set up properly so forensic data is available when needed.

thumb
video

How to find Windows security setup resources

Find security scripts, compliance and other Windows resources.

thumbnail
video

Preventing data leakage in Windows

Set data loss prevention policies in Windows 10 to prevent data leakage.

thumbnail
video

Preventing malicious links in Windows

Set Office 365 Advanced Threat Protection policies to block known malicious URL addresses.

thumbnail
video

R tip: Addins and keyboard shortcuts

Discover an easy way to use key-value pairs in R

thumbnail
video

How to set up multi-factor authentication in Microsoft Office 365

Follow these steps to enable multi-factor authentication in Office 365 for more secure log-ins.

thumbnail
video

Avoid malicious Outlook email forwarding

Set up Office 365 to defend against hackers who use hidden Outlook rules to forward emails.

thumbnail
video

How to use Windows Delivery Optimization

Allow devices to share and distribute updates across a network without having to rely on Windows Software Update Services.

thumbnail
video

R tip: Quick lookup tables with named vectors

Learn an easy method to use key-value pairs in R

Load More