Hardening Website Security – Part 1: HTTP Security Headers

Introduction It feels like almost every week there’s another news item about personal information being stolen because yet another company’s website got hacked. Most of these attacks are perpetrated through social engineering, persuading somebody to hand over some detail which allows the hacker to gain additional privileges and, eventually, access to personal information. However, a…

Overcee and Variables

Introduction Today I’m going to be creating a custom computer reboot tool in Overcee in order to show off how to use variables to lock tools down. Situation As has been previously mentioned, allowing free access to modify some tools can be inherently dangerous and can result in unexpected or unwanted behaviour. However, sometimes you…

Understanding Overcee Permissions

Introduction Overcee is about delegation, we want you to use it empower your Service Desk, and to achieve this we have developed an incredibly powerful permissions system so that you control who can do what. Unfortunately, with great power comes great complexity (or something like that), and it would be all too easy to make…

Set Client KMS Server

Introduction Many large sites deploy a Key Management Service (KMS) to manage the activation of Microsoft products including Windows and Office. Windows devices know to find this server via a service (SRV) record in your DNS, however occassionally this process fails and a product needs to be shown the KMS server manually. This tutorial will…