-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

  • Provisioning and Deprovisioning in Network Security: A Complete IAM Guide

    Provisioning and Deprovisioning in Network Security: A Complete IAM Guide


     

    Provisioning and deprovisioning in network security are critical components of Identity and Access Management (IAM). These processes control how user access is granted, modified, and revoked across an organization’s IT infrastructure. When implemented correctly—especially through automation—they significantly reduce security risks, compliance violations, and insider threats.



    What Is Provisioning in Network Security?



    Provisioning is the process of creating user identities and granting access to systems, applications, and network resources based on predefined roles and policies.



    Key Functions of Provisioning


    User Onboarding:

    #. Automatically creates digital identities for new employees and assigns birthright access such as email, collaboration tools, VPN, and internal applications.

    #. Role-Based Access Control (RBAC):
    Access is granted according to job role, department, or seniority—ensuring consistency and security.

    #. Least Privilege Principle:
    Users receive only the permissions required to perform their tasks, reducing the attack surface and limiting lateral movement.

    #. Security Risk in Provisioning

    Over-provisioning is a major security weakness. Excess permissions increase the likelihood of data leaks, privilege escalation, and insider attacks.



    What Is Deprovisioning in Network Security?


    Deprovisioning is the systematic removal of access when a user no longer requires it—such as during employee exit, role changes, or project completion.



    Key Functions of Deprovisioning



    Immediate Access Revocation:
    #. Accounts must be disabled as soon as employment ends to prevent unauthorized access.


    Elimination of Orphaned Accounts:
    #. Inactive or forgotten accounts (“zombie accounts”) are frequently exploited by attackers.


    Full Identity Cleanup:
    #. Includes revoking API keys, terminating active sessions, removing SSH keys, and reassigning file ownership.



    Security Risk in Deprovisioning


    Delayed or incomplete deprovisioning is a leading cause of post-employment data breaches.

     

     

    Why Automation Is Essential for IAM Security


    Manual provisioning and deprovisioning processes are slow, inconsistent, and prone to human error—one of the primary causes of enterprise security breaches.


    Benefits of Automated Identity Lifecycle Management


    #. Real-Time Access Control:
    Integration with HR systems such as Workday or SAP SuccessFactors ensures instant updates to user access.

    #.Compliance and Audit Readiness:
    Automated logs provide immutable audit trails for GDPR, HIPAA, SOX, ISO 27001, and other regulations.

    #. Prevention of Privilege Creep:
    Old or unnecessary permissions are automatically removed when roles change.


     

     

    Provisioning and Deprovisioning in Network Security: A Complete IAM Guide

     

      

    Role of SCIM in Automated Provisioning and Deprovisioning



    SCIM (System for Cross-domain Identity Management) is an open standard used to automate identity lifecycle events across cloud and enterprise applications.



    How SCIM Improves Network Security



    #. Automatically syncs users between Identity Providers (IdPs) like Okta or Microsoft Entra ID
    #. Ensures consistent access across SaaS platforms such as Salesforce, Dropbox, GitHub
    #. Reduces manual errors and provisioning delays




    Best Practices for Secure Provisioning and Deprovisioning


    #. Implement Role-Based Access Control (RBAC)
    #. Enforce least privilege access
    #. Automate IAM workflows using SCIM
    #. Conduct regular access reviews
    #. Monitor logs for identity anomalies



    Conclusion



    Provisioning and deprovisioning are essential pillars of network security and IAM. Automated identity lifecycle management reduces attack surfaces, strengthens compliance, and prevents unauthorized access. Organizations that neglect these processes expose themselves to data breaches, regulatory penalties, and operational risk.

     



  • How to change the name of server in windows 2019

     

    How to change the name of server in windows 2019

     

    How to change the name of server in windows 2019


    To change the name of a Windows Server 2019, use Server Manager, System Properties (Control Panel), or PowerShell, but always remember to restart the server to apply changes, especially if it's a Domain Controller, which requires extra steps. Let's follow the step by step.

     

    Change the Name of Server  

     

     First we will change open windows server 2019 in VMware so after that go to Local Server then click on computer name.

     

    How to change the name of server in windows 2019

     

     

    Click on change button and we will write Computer name  server1 and click on OK button. 

     

     

    How to change the name of server in windows 2019

     

    So after that you must restart your computer to apply these changes.

     

     

     

    How to change the name of server in windows 2019

     

    Hurry you can see we did it and finally name is server1 is displaying. 

     

     

    How to change the name of server in windows 2019

     

     


    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     

     

  • How to clone of virtual machine or vmware ?

     

    How to clone of virtual machine or vmware ?

     

     

    How to clone of virtual machine or vmware ?


    The exact replica or copy of any thing that exist or we can say that ditto of any products is called clone. without time wasting we will go in our vmware and i have already installed widows 10 pro in VMware and with this windows 10 pro we will clone of this. 

     

    How we can create the clone of the Virtual Machine in VMware workstation? 



    --By using the "clone" feature of the VMware workstation:-

    --Open VMware workstation pro

    --Select the virtual machine that you want for creating clone.

    --Right click on that virtual machine.

    --Go to option "Manage"

    --There you will find the option "Clone", click on that



    How to clone of virtual machine or vmware ?

     

     

    --The wizard will appear.

    --Within that wizard click on Next

    --Before that it will ask "From the current state of the Virtual Machine or with Snapshot", By default it will go with "From the Current state of the Virtual Machine"


    How to clone of virtual machine or vmware ?


     

     

    --Then click on "Next"

    --It will ask the option you want to create "Full Clone " or Linked Clone", Select the option "Full Clone" or any option you prefare or it asked.

     

     

    How to clone of virtual machine or vmware ?

     

     



    --The It will ask you to enter the "Name" of your virtual machine as well as there will be location option.

    --Here if you want to provide the "Name" you can and if you want to change the location you can, -The click on the "Next"

     

     

    How to clone of virtual machine or vmware ?

     



    --There will be the option "Clone" click on that and here you will see that clone is strarted.

    --Once it got completed it will create the virutal machine on it's own.

     

     

    How to clone of virtual machine or vmware ?

     

     

    How to clone of virtual machine or vmware ?

     




    --You can click on the option "Power on this virtual machine" to turn it on and use the same username and password (Belonging with the cloned virutal machine) for login.


    How to clone of virtual machine or vmware ?



    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     



     

  • Top Computer Problems with Solution For IT, Desktop, Help Desk Support

     

    Top Computer Problems with Solution For IT, Desktop, Help Desk Support

     

    Top Computer Problems with Solution For IT, Desktop, Help Desk Support

     

    Hello guys in this blog, I will discuss with you the most common computer problems and their solutions. So, the first problem that is commonly observed is that our computer slows down over time. That's a very big problem.



    So, for that, you should first know that all our software and documents are basically saved in our C drive, which we call the primary drive. And gradually, as we work, install software, and save files, the C drive will fill up. As soon as the C drive is full or nearly full, the system will automatically start to slow down. 


    Top Computer Problems with Solution For IT, Desktop, Help Desk Support




    Top Computer Problems with Solution For IT, Desktop, Help Desk Support





    So, what is the solution? 



    The first solution is to check the Recycle Bin. Empty the Recycle Bin, because the Recycle Bin is a folder where all our deleted files are saved. Deleting them will release some memory. 


    Besides that, go to the Control Panel and uninstall any unnecessary software that you have installed and are not using. This will also free up some space.

     

     

    Top Computer Problems with Solution For IT, Desktop, Help Desk Support

     

     




    Additionally, there are some temporary files in our system with the extension ".tmp" so open run box with the help of ctrl + R and type without "%temp%". 

     

     

    Top Computer Problems with Solution For IT, Desktop, Help Desk Support

     



    You can search for them and delete them.


    Furthermore, if you want to check the size of your C drive, every Windows computer has a folder called My PC or Computer. If you open it, you will see something like this (I have shared a small diagram). So, here, the C drive shows how much free space is available out of 111 GB. This means that your hard disk drive is mostly full, so you need to reduce some data from it. 


    Because if it goes any higher, you can see it has turned red. Red means that the storage is quite full, and you should reduce the amount of storage used. Besides this, this is how you check the drive. Besides that, you should know that there are some software programs and applications that launch automatically as soon as you start your computer.


    To see these, you can search for "System Configuration Tool" in Windows. When you search for this, a window like this will open. It has several tabs: General, Boot, Services, Startup, and Tools. By going to the Startup tab, you can see which applications and software programs are loading automatically when Windows starts. You can disable them by clicking the checkboxes, or you can disable all of them. However, my recommendation is that if you don't know which ones to disable, please don't do this. Otherwise, your system might encounter problems.

     


    Computer Hanging



    Now, a computer can hang at any time, and the main reasons for a computer hanging are:

    First, a virus infection. The solution for a virus is antivirus software, so you should have updated antivirus software on your computer. Many antivirus programs are available in the market. Windows also comes with its own built-in Windows Defender.

     

     

    Top Computer Problems with Solution For IT, Desktop, Help Desk Support


    Install Defender, and it will automatically provide virus protection. Otherwise, there are other options like Quick Heal, K7, etc.  Many such antivirus software programs are available that you can download to protect your system from viruses. Besides that, a faulty SMPS (Switched-Mode Power Supply) can also cause problems.

    The SMPS is the power supply unit of our system; it's located inside the CPU or cabinet. If your SMPS is faulty, the system can hang. The only solution is to replace the SMPS with a new one to solve this problem. You should know that our computers have many cooling fans, such as one on the SMPS. Besides that, there's also a fan on the CPU chip, the processor. If any of your fans are faulty, it's better to replace them with new ones so that your system doesn't hang. Furthermore, if the operating system becomes corrupted, if Windows gets corrupted, our system can also hang in that case. In that situation, you should install a fresh copy of the operating system.



    Slow Software Performance

     

    The next problem is slow software performance. What should you do if your software is running slowly? There are mainly two reasons why software runs slowly. The first is that your system's processing power is slow. Your CPU is old and outdated, and the new or heavy software isn't running properly on it. In that case, you should install a new motherboard and CPU, which can solve your problem. Besides that, if your system has insufficient RAM, that can also be a reason for slow software performance. In that case, you should increase your RAM, which can solve your problem to some extent.


    Top Computer Problems with Solution For IT, Desktop, Help Desk Support




    Here, I've provided a small table of different processors available in the market. For example, the Core i3 and Ryzen 3. The Core i3 is an Intel product, and the Ryzen is an AMD product... Both of these products are available in the market. If we talk about CPUs or processors, you can see that it's clearly mentioned that the Core i3 and Ryzen 3 are for basic operations. If you need it for domestic use, you can opt for this processor. If you have a mid-level use case, like in an office, and you think you'll be using your laptop or PC quite a bit, then you can get an i5. If you want a gaming laptop or need to use high-end graphics, you can purchase a Core i7 or Ryzen 7

     

    Top Computer Problems with Solution For IT, Desktop, Help Desk Support 

     

    And if you have professional requirements, then the i9 or Ryzen 9 are both available options in the market. These are the different types of CPUs available. The table also provides information about their clock speed and the number of cores. So, you can choose any CPU according to your requirements.

     

     

    Blue Screen Problem



    The blue screen problem isn't very common, but it does occur. The screen looks something like this, and it usually displays an error code. So, what should you do in this case? This problem can arise due to two reasons. First, it could be a RAM issue. In that case, you need to detach the RAM from the motherboard and then reattach it. 

     

     

     

    Top Computer Problems with Solution For IT, Desktop, Help Desk Support

     

     

    This might solve the problem. If it doesn't, you'll need to replace the RAM. Besides that, this problem can also be related to Windows, a hardware issue, or a driver problem. By looking at the error code, you'll get an idea of ​​what the error is. Search for that error code online, on Google, and you'll find all the information you need on how to resolve the issue.

     

     

    Reboot and Select Proper Device Message



    Reboot and select proper device message. This is what it looks like. Now, the reason for this is quite clear.

     

    Top Computer Problems with Solution For IT, Desktop, Help Desk Support

    Top Computer Problems with Solution For IT, Desktop, Help Desk Support



    There are two possible reasons. Either the bootable disk was not selected, or the operating system is corrupted. If the bootable disk is not selected, then as soon as the system starts, press the F8 or Delete key on your keyboard to open the startup screen. From that screen, you can choose the proper bootable disk, which will solve the problem. And if your operating system is corrupted, you will need to reinstall the operating system, which will also resolve this issue. 

     

     

    Internet Not Working



    The internet is not working on our PC/laptop. There could be two reasons for this. The first is a problem with your internet service provider. If the problem is on their end, you'll need to contact them. The second possibility is a problem with your hardware.

     

    Your router might be faulty, there might be a problem with the modem, a wire might be broken, or there could be some other reason. So what do you need to do?  You'll need to repair or replace any hardware or software that's causing the problem. This should resolve your internet connectivity issues

     

     

    Hard disk failure

     

    Hard disk failure is one of the most common and critical issues faced by IT Support, Desktop Support, and Helpdesk Engineers. A failing hard drive can lead to system crashes, data loss, slow performance, and business downtime.
    Understanding the symptoms, causes, and troubleshooting steps is essential for every support engineer.


    What Is Hard Disk Failure?



    Hard disk failure occurs when a storage device (HDD or SSD) stops functioning properly and can no longer read or write data reliably.
    This failure can be partial (system still boots but works slowly) or complete (system does not boot at all).



    Top Computer Problems with Solution For IT, Desktop, Help Desk Support




    Common Symptoms of Hard Disk Failure


    • As an IT support engineer, you should watch for these warning signs:
    • System boot failure or “No boot device found”
    • Frequent system hangs or blue screen errors
    • Unusual clicking or grinding noise (HDD)
    • Very slow file access or application loading
    • Files getting corrupted automatically
    • SMART errors during startup




    Disk not detected in BIOS



    Types of Hard Disk Failures

    1. Logical Failure

    • Caused by corrupted file system, malware, or improper shutdown
    • Disk is physically fine
    • Often recoverable using software tools




    2. Mechanical Failure (HDD)

    • Caused by damaged platters, read/write head crash
    • Produces clicking noise
    • Usually requires replacement




    3. Electronic Failure

    • PCB or controller board damage
    • Disk not detected at all




    4. SSD Failure

    • Controller failure or memory wear-out
    • Sudden data loss without warning
    • Common Causes of Hard Disk Failure
    • Power fluctuations or sudden power loss
    • Overheating due to poor ventilation
    • Physical shock or dropping the laptop
    • Malware or ransomware attacks
    • Bad sectors increasing over time





    Aging hardware (end of disk life)



    How IT Support Engineers Diagnose Hard Disk Issues

    Step 1: Basic Checks

    • Check disk detection in BIOS/UEFI
    • Verify SATA / power cable connections
    • Try connecting disk to another system




    Step 2: Software-Level Checks

    • Run CHKDSK in Windows
    • Check SMART status using tools
    • Review Event Viewer logs




    Step 3: Performance Analysis


    • Monitor disk usage in Task Manager
    • Check read/write speed degradation
    • Troubleshooting Steps for Desktop Support Engineers
    • Backup critical user data immediately
    • Run disk repair tools if logical failure
    • Scan system for malware
    • Reinstall OS if file system is corrupted
    • Replace hard disk if mechanical failure is confirmed
    • Restore data from backup after replacement
    • Best Practices to Prevent Hard Disk Failure
    • Always maintain regular data backups
    • Use UPS to prevent power-related damage
    • Keep system temperature under control
    • Avoid improper shutdowns
    • Monitor disk health periodically
    • Upgrade from HDD to SSD for better reliability

     

     


    When Should You Replace the Hard Disk?



    Replace the disk if:

    • SMART status shows failure
    • Bad sectors keep increasing
    • System crashes continue after OS reinstall
    • Disk is older than 4–5 years (HDD)





    Role of IT Support During Hard Disk Failure



    An IT Support Engineer must:


    • Minimize downtime
    • Communicate clearly with the user
    • Follow data security policies
    • Escalate to vendor if under warranty
    • Update asset and incident records





    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     


  • How to lock user while attempting wrong password in windows 10

     

    How to lock user while attempting wrong password in windows 10

     

    How to prevent users from accessing the control panel


    While attempting multiple times wrong password is occur problem for you so lets fix it when user try to login own account in windows 10 and if user forgot password then how can i lock user account after trying multiple times wrong password even might be possible some unauthorized person trying to access the accounts. So, here comes with lockout policy where you can safe your users account by administrator.

     

    What is Lockout Policy ? 


    A lockout policy in windows is a security features that help protects user accounts from unauthorized access by locking the account after a specific number of failed login attempts. This policy is designed to prevent brute force attacks. Where attackers repeatedly try different passwords to gain access.

     

    Let's Prevent Step by Step  

     

    -- For doing this task you must have a user with administrative rights of administrator account. 

    -- Press win + r and type "secpol.msc" windows. Click on "OK".




    How to lock user while attempting wrong password in windows 10


    -- After opening local security policy > go to "account policies" >  "account lockout policy" .

     

    How to lock user while attempting wrong password in windows 10


    -- then right click on "account lockout threshold" > and go to properties and set "account will lock out after "1"  minute " > then apply / Ok.

     


    How to lock user while attempting wrong password in windows 10



    -- then same as right click on "account lockout duration" > and go to properties and set "account lockout duration "1"  minute " > then apply / Ok.


    How to lock user while attempting wrong password in windows 10


    -- then same as right click on "reset account lockout counter after" > and go to properties and set "1"  minute " > then apply / Ok.

     

     

    How to lock user while attempting wrong password in windows 10

     


    -- then open cmd prompt and type "gpupdate /force " it will update policy for all user.

     

    How to lock user while attempting wrong password in windows 10

     

    -- So you can check after attempting 3 times wrong password user getting pop and saying you account has been locked so wait for some times.

     

     

    How to lock user while attempting wrong password in windows 10


    So finally we got it!.

     

     

    Purpose of the "net_user" cmd in windows ? 

     

    The net_user cmd in windows is used to manage user ccount on a local or remote computer. It allows administrator and users with the necessary privilege to create, modify, delete and view user account and their settings from the cmd prompts.

     

     

     

     


     


     

     

    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     



  • Disable to firewall in windows server 2019

     


     

     

    Disable to firewall in windows server 2019


    To disable the firewall in Windows Server 2019, you can use PowerShell for a quick command (Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled false), the GUI via Server Manager (Local Server -> Windows Defender Firewall -> On -> Off for each profile), or Command Prompt (netsh advfirewall set allprofiles state off) for all profiles, but PowerShell offers the most straightforward method for all profiles at once, ensuring all network types are covered. Lets follow the step by step.

    A firewall is a security device—either hardware, software, or both—that monitors and controls incoming and outgoing network traffic based on predefined security rules. The main purpose of a firewall is to act as a barrier between a trusted internal network and untrusted external networks, such as the internet. It helps protect systems from unauthorized access, cyberattacks, malware,
    and data breaches. 

     

     

    Disable the firewall 

     

    For disabling the firewall in windows server, open run cmd with the help of win + r and type firewall.cpl then hit enter

     


     

    Then go to turn windows defender firewall on or off after that 

     

     

     


     

     In a practical setup, firewalls are used to:


    ● Block or allow specific ports or IP addresses.
    ● Filter traffic based on protocols and applications.
    ● Prevent access to malicious websites or content.

     

     

     

    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking. 
     
     
     
     
  • How to prevent users from accessing the control panel

     

    How to prevent users from accessing the control panel

     

    How to prevent users from accessing the control panel


    Lets start with policy- 

    • Inherited Policy
    • Explicit Policy

     

    A policy is a set of rules, principles, or guidelines established, by an organization to regulate action , ensure consistency and achieve specific goals, Policies provide a framework for decision making and help maintain order & compilance with a system.

     

    What is Inherited Policy ?

     

    Inherited policy permissions are automatically passed down from a parent object (such as a folder) to its child objects (sub-folder and files). They simplify permission management by ensuring consistency across an entire directory structure. 

     

    Characterstics -

    -- Automatically propaged from parent to child objects.

    -- Reduce administrative overhead by providing consistent access.

    -- Can be over-hidden by explicit policy

    -- Can by disable if needed.

     

     

    What is Explicit policy ?

      

     Explicit permissions are manually set or assigned to a file, folder or object by any administrator of system owner. They take priority over inherited permissions and apply on the specific object they are set on.

     

    Characterstics

    -- Applied directly to a resources (file ,folder ,registry key)

    -- Not affected by changes in parent object.

     

     

     How to assign a permission on a local user in local machine (standalone)?

     

    Standard User Account (Local User) - This account is having limited permission, allows basic task like running application and changing personal settings ,This cannot install software or change system wide settings. This account is allowed for doing its daily basic task, what it is allowed for.  



    -- For doing this task you must have a user with administrative rights of administrator account. 

    -- Press win + r and type "mmc" (microsoft management console) windows. Click on "files" & then click on "add/remove snap-In" 

     

    How to prevent users from accessing the control panel

     

     


     

     

     

    -- Then on windows search "Group policy object editor" then click on "Add".

     

    How to prevent users from accessing the control panel

     

     

    How to prevent users from accessing the control panel

     

    -- In the next windows, click on Browser and go to the "user" tab.

    -- Click on the user, on which you need to assign permissions.

    -- Then click on "OK" and then finish.

     

     


     

     

    -- Click on "OK" and return on mmc windows.

     

     

    How to prevent users from accessing the control panel

     

     

     

    -- then assign the permission and click on the close. It ask you to save the so click on the save button.

     

     

    How to prevent users from accessing the control panel

     

     

    How to prevent users from accessing the control panel

     

    -- Open cmd prompt and run the "gpupdate / force"

    -- Logout from the administrator 

     

     

    How to prevent users from accessing the control panel

     

     

    -- Login to the user account & check whether the policy works or not.

     

     

     

    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.