shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

261
active users

#videotutorial

0 posts0 participants0 posts today
La Loica<p>He publicado en mi <a href="https://social.anartist.org/tags/NoBlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoBlog</span></a> y en <a href="https://social.anartist.org/tags/Peertube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Peertube</span></a> otro video tutorial. En este explico como cierro mi <a href="https://social.anartist.org/tags/bordado" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bordado</span></a> </p><p><a href="https://social.anartist.org/tags/videotutorial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>videotutorial</span></a> <a href="https://social.anartist.org/tags/autogesti%C3%B3n" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>autogestión</span></a> </p><p><a href="https://video.anartist.org/w/5ihwcAGiSirEJ45ssyUC9Q" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">video.anartist.org/w/5ihwcAGiS</span><span class="invisible">irEJ45ssyUC9Q</span></a></p>
Lukas Beran<p>𝗛𝗼𝘄 𝘁𝗼 𝗯𝗹𝗼𝗰𝗸 𝗻𝗲𝘄𝗹𝘆 𝗿𝗲𝗴𝗶𝘀𝘁𝗲𝗿𝗲𝗱 𝗱𝗼𝗺𝗮𝗶𝗻𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿 𝗳𝗼𝗿 𝗘𝗻𝗱𝗽𝗼𝗶𝗻𝘁</p><p>Newly registered domains can of course be legitimate. Every domain is new at some point. But usually there isn’t any content on new domains right away – the content is still being developed, and the launch of the site won’t happen for some time.</p><p>But newly registered domains are often a tool for phishing attacks. Such domains are usually used in phishing attacks immediately after registration and usually disappear again after a short time, for example because they are cancelled or blocked by the registrar.</p><p>Blocking access to newly registered domains is a relatively popular and effective way of eliminating phishing.</p><p>It is possible to block newly registered and parked domains within Microsoft Defender for Endpoint. Domains within the first 30 days of registration are considered newly registered.</p><p>📺 Watch my YouTube video bellow 👇 👇 <br><a href="https://youtu.be/oYtDHK90P1M" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/oYtDHK90P1M</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/cswrld" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cswrld</span></a> <a href="https://infosec.exchange/tags/videotutorial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>videotutorial</span></a> <a href="https://infosec.exchange/tags/mde" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mde</span></a> <a href="https://infosec.exchange/tags/defender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defender</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/newdomains" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newdomains</span></a></p>
Lukas Beran<p>𝗛𝗼𝘄 𝘁𝗼 𝗿𝗲𝗾𝘂𝗶𝗿𝗲 𝗰𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝘁 𝗱𝗲𝘃𝗶𝗰𝗲 𝗳𝗼𝗿 𝗮𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗮𝗰𝗰𝗲𝘀𝘀 𝗶𝗻 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗘𝗻𝘁𝗿𝗮 𝗜𝗗</p><p>Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.</p><p>This is because in such a case it is not enough for a threat actor to obtain, for example, login credentials through phishing. It is not even enough to somehow obtain or bypass MFA. In such a case, the threat actor would also have to have a managed device from the organization’s tenant. Which should be unrealistic to obtain.</p><p>Thus, requiring access from a managed device is a very effective and powerful method of protecting corporate identity. And yet it shouldn’t be too complicated to deploy, since corporate devices should be managed anyway.</p><p>📺 Watch my YouTube video on how to require compliant devices via conditional access policies in Microsoft Entra ID 👇 👇 <br><a href="https://youtu.be/mH-8x29xdW0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/mH-8x29xdW0</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/cswrld" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cswrld</span></a> <a href="https://infosec.exchange/tags/videotutorial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>videotutorial</span></a> <a href="https://infosec.exchange/tags/entraid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>entraid</span></a> <a href="https://infosec.exchange/tags/devicecompliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devicecompliance</span></a> <a href="https://infosec.exchange/tags/applications" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>applications</span></a></p>
Paul O'Malley<p>Struggling to keep track of everything you need to get done each day? Then you need to learn how to use Google Tasks, a smart tool that helps you manage your tasks, projects, and deadlines. I personally use this every day for managing my tasks. 🙌</p><p>In my latest video, I will teach you everything you need to know to get started with Google Tasks, such as how to access it, how to create and edit tasks with details, how to set due dates and reminders for your tasks, how to mark them as completed, and how to view your completed tasks. I will also show you how to organize your tasks into lists and subtasks, and how to sync them with your Gmail, Calendar, and the Google mobile apps. Plus, I will share with you some best practices and tips on how to use Google Tasks effectively and efficiently. 💯</p><p>🎥 <a href="https://buff.ly/3DYtIyT" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">buff.ly/3DYtIyT</span><span class="invisible"></span></a></p><p>If you found this valuable, please boost it to your network, and a sub to the channel would be super. 🎉</p><p><a href="https://c.im/tags/GoogleTasks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleTasks</span></a> <a href="https://c.im/tags/GoogleWorkspace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleWorkspace</span></a> <a href="https://c.im/tags/Productivity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Productivity</span></a> <a href="https://c.im/tags/Efficiency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Efficiency</span></a> <a href="https://c.im/tags/TaskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TaskManagement</span></a> <a href="https://c.im/tags/VideoTutorial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VideoTutorial</span></a> <a href="https://c.im/tags/YouTube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YouTube</span></a> <a href="https://c.im/tags/Boost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Boost</span></a></p>