Skip to content
Menu
IT-DRAFTS
  • About
  • Privacy policy
IT-DRAFTS

Month: February 2025

February 28, 2025

Microsoft will end support for App-V in 2026 (plan for migration to MSIX)

Migration Plan: App-V to MSIX Convert App-V to MSIX Use the MSIX Packaging Tool to convert existing App-V packages. Validate application functionality post-conversion. Preserve User Settings App-V stores settings in %APPDATA%, %LOCALAPPDATA%, and HKCU\Software\Microsoft\AppV\Client\Packages. MSIX stores them in containerized locations (C:\Users\<User>\AppData\Local\Packages\). Migration Options: Pre-Migration Script: Export & reimport registry settings, copy user data files. Package…

Read More
February 27, 2025

project of face detection Python v.1

import cv2 import mediapipe as mp # Initialize MediaPipe Face Mesh mp_face_mesh = mp.solutions.face_mesh face_mesh = mp_face_mesh.FaceMesh() # Capture video from the webcam cap = cv2.VideoCapture(0) while True: ret, frame = cap.read() if not ret: break # Convert frame to RGB (MediaPipe requires RGB images) rgb_frame = cv2.cvtColor(frame, cv2.COLOR_BGR2RGB) # Process the frame to detect…

Read More
February 27, 2025

Complex Azure Failure Scenario: Massive Azure AD Infrastructure Outage and User Authentication Issues

Complex Azure Failure Scenario: Massive Azure AD Infrastructure Outage and User Authentication Issues Scenario: A company relies on Azure Active Directory (Azure AD) to manage access to all cloud and on-premises services, including Microsoft 365, Azure virtual machines, VPN access, SQL Database, and third-party SaaS solutions. The Problem: Suddenly, users begin reporting widespread issues: –…

Read More
February 25, 2025

Microsoft Fixes Power Pages Zero-Day Exploited in Attacks: A Deep Dive

Microsoft has recently patched a critical zero-day vulnerability in its Power Pages platform, which had been actively exploited in targeted attacks. The flaw, tracked as CVE-2025-24989, is a high-severity elevation of privilege vulnerability that allowed attackers to bypass user registration controls and gain unauthorized access to sensitive systems. Here’s a detailed breakdown of the issue,…

Read More
February 21, 2025

OWASP Top 10 NHIs Risks 2025

1. Improper Offboarding When NHIs (Non-Human Identities) like service accounts, API keys, and machine credentials are not properly offboarded, they can become a security risk. This includes failing to deactivate old or deprecated secrets, leading to “zombie NHIs” that attackers can exploit. Automating the NHIs lifecycle ensures stale secrets are discovered and revoked, reducing attack…

Read More
February 20, 2025

Howto remotly reboot Dell server (if u are using iDrac of coz)

Hey mate! So, you want to remotely reboot a server using iDRAC, huh? Sounds like you’re about to give that server a proper “digital slap” to wake it up. 😄 Let’s get to it! 1. Connect to iDRAC Open your browser and type in the iDRAC IP address. Log in with your credentials. Default is root for…

Read More
February 19, 2025

How to simple setted up Cisco router

Hi, for All, just quick review of how to simple setup a Cisco router Setting up a basic Cisco router involves several steps to ensure it can route traffic between networks and provide basic connectivity. 1. **Connect to the Router** Use a console cable to connect your computer to the router’s console port. Open a…

Read More
February 19, 2025

How NAT works

Network Address Translation (NAT) is a technique used to modify network address information in packet headers while in transit across a traffic routing device. In simple terms, NAT allows multiple devices on a local network to share a single public IP address when accessing the internet. Here’s a basic explanation of how NAT works, particularly…

Read More
February 19, 2025

How EDR Works?

Hu for All, that image appears to be an infographic or presentation slide explaining how Endpoint Detection and Response (EDR) works in cybersecurity. 1. **EDR Overview**: EDR is a cybersecurity solution that continuously monitors and analyzes endpoint activities to detect, investigate, and respond to threats like malware and ransomware. It records system behaviors, uses data…

Read More

Categories

  • 365
  • Active Directory
  • announcement
  • App-V
  • Artificial intelligence
  • AZURE
  • Cisco
  • Dell
  • en Français
  • Entra
  • GDPR
  • How its works
  • Intelligence Artificielle
  • juste des pensées
  • Licensing
  • Microsoft Product Name
  • Microsoft will end support
  • Migration
  • MS Teams
  • Network
  • new items
  • Office
  • OWASP
  • SAM
  • Security
  • Servers
  • Troubleshooting
  • Uncategorized
  • Updates
  • Virtualization
  • Windows10
  • Windows11

Archives

  • May 2025
  • February 2025
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

Recent Comments

No comments to show.

Recent Posts

  • How to- Azure Front Door with your Power Pages website (includes step by step)
  • Work around the OCSP validation issue in Azure Application Gateway
  • Windows 11 Insider Preview Build 27842
  • Microsoft will end support for App-V in 2026 (plan for migration to MSIX)
  • project of face detection Python v.1
©2025 IT-DRAFTS | Powered by WordPress and Superb Themes!