Rachel Jasurda

Hi, my name is Rachel; I'm a Cybersecurity Specialist and the founder of Cybersecurity Demystify. I enjoy learning and love helping others learn the easy way. Happy Learning!

Guide for Configuring Windows Non-Domain (Local) Scanning Authentication Account in Qualys VMDR

What is Non-Domain (Local) Scanning? Non-Domain (Local) Scanning: This is when authentication scans are performed on local systems not joined to a domain. In your Qualys VMDR account, click the drop-down arrow at the top left and select VMDR. First, we will create an Option Profile for the Non-Domain (Local) Scanning. Click on the scans tab […]

Guide for Configuring Windows Non-Domain (Local) Scanning Authentication Account in Qualys VMDR Read More »

How to uninstall VirtualBox Extension Pack for VirtualBox 7.0.14

Open VirtualBox, in VirtualBox Manager. Click the File tab > Tools > Extension Pack Manager. Right-click on the Oracle VM VirtualBox Extension Pack. And click Uninstall Click Remove, and Click Yes on Do you want to allow this app to make changes to your device screen that appears. VirtualBox Extension Pack was successfully uninstalled. Click

How to uninstall VirtualBox Extension Pack for VirtualBox 7.0.14 Read More »

VirtualBox and VirtualBox Extension Pack Installation Guide

Click here to download VirtualBox and VirtualBox Extension Pack. Once downloaded, locate the downloaded VirtualBox installer on your system and double-click it to start the installation process. You get a promo asking if you want the application to make changes to your system. Click Yes. Click the Next button. Select how you want the future

VirtualBox and VirtualBox Extension Pack Installation Guide Read More »

How to install Metaspoitable3 on Windows using Vagrant (VirtualBox)

What is Metasploitable3? Metasploitable3 by Rapid7 is a Virtual Machine that is intentionally built to contain many security weaknesses and misconfigurations to serve as a valuable tool for cybersecurity education and training. Allowing us to use it as a target for practicing hacking and penetration testing in a controlled and safe environment. Now that you

How to install Metaspoitable3 on Windows using Vagrant (VirtualBox) Read More »

Step by Step guide on installing Metaspoitable3 on Windows using Vagrant (VMware Workstation)

Metaspoitable3 Installation on Windows using Vagrant (VMware Workstation) What is Metasploitable3? Metasploitable3 by Rapid7 is a Virtual Machine that is intentionally built to contain many security weaknesses and misconfigurations to serve as a valuable tool for cybersecurity education and training. Allowing us to use it as a target for practicing hacking and penetration testing in

Step by Step guide on installing Metaspoitable3 on Windows using Vagrant (VMware Workstation) Read More »

PCI DSS Policy Sample and Template 2

PCI DSS Policy Click Here to Download the Editable Template Purpose This policy aims to establish and maintain standards to protect cardholder data, ensure adherence to the Payment Card Industry Data Security Standard (PCI DSS), and safeguard our organization’s information systems. Scope This policy applies to all [Company Name] personnel, systems, and processes involved in

PCI DSS Policy Sample and Template 2 Read More »

How to Install Ubuntu Desktop in VMware Workstation: A Step-by-Step Guide

Ubuntu Desktop is one of the most user-friendly Linux distributions available. Running it in a virtual machine (VM) using VMware Workstation or other virtualization is an excellent way to try it out without altering your host. Whether you are new to Linux or want to use Ubuntu Desktop for testing and development, in this post,

How to Install Ubuntu Desktop in VMware Workstation: A Step-by-Step Guide Read More »

How to Analyze Qualys Scan Result

There are two types of vulnerability scans. Authenticated Scan and Non-authenticated scan Non-authenticated scan: This is when you scan target systems without providing any login credentials. In this type of scan, the scanning tool can only gather information that is accessible from external. This means the information that attackers scanning your network without any credentials

How to Analyze Qualys Scan Result Read More »

How to turn Windows Defender off and on in Windows 10

What is Windows Defender Firewall? The Windows Defender Firewall serves as an integrated security component in Windows, safeguarding your computer against entry and potential threats posed by software attempting to infiltrate via the internet or local network. How does Windows Defender Firewall work? Windows Defender Firewall monitors the traffic coming in and out of your system and

How to turn Windows Defender off and on in Windows 10 Read More »

CHAT