A Handy Reference for Windows Logon Types with Status and Substatus Codes

This list of logon types and status/substatus for Event ID 4625 comes from Microsoft documentation for threat-protection auditing, and is beneficial for analysts and people that are curious about what is going on in their PC. Logon type Logon title Description 2 Interactive A user logged on to this computer. 3 Network A user or […]

How to Speed up Your Windows PC

  We all hate slow computers, so this tutorial will show you how to speed up your Windows PC. Disk Cleanup Tool Windows 7 Programs→Accessories→System Tools→Disk Cleanup. Go ahead and tick everything in the disk cleanup window. Wait for the program to finish and click the delete files button. Windows 10 Start menu -> Type […]

What Can a Hacker Do With Your Computer?

I often hear people say that they don’t understand why a hacker would be interested in their computer and subsequent life. When you consider how much you do on your computer, it becomes clear that the value of your computer lies in the life you have built over your lifetime. This image shows you what […]

Briggs Stratton Healthcare Information Breach 2017

Briggs and Stratton, a maker of gasoline engines for outdoor power equipment, were breached and client information was stolen. NATURE OF THE BREACH Briggs and Stratton experienced a malware attack(software that is intended to damage or disable computers and computer systems) on Briggs’ computer systems at its Milwaukee, Wisconsin and Munnsville, New York locations that potentially compromised information […]

You’ve Been Hacked – What Should You Do?

Signs You’ve Been Hacked In today’s threat landscape it is a matter of when hackers will gain access to your computer or cell phone, not if. Proper layers of security keep most of the malware out of your system and when malware does make it on your system the impact is reduced by containment, but none of us […]