Top News

Understanding Remote Desktop Protocol Theaths

[VIDEO] Understanding Remote Desktop Protocol Threats

The recently reported hack of LabCorp – one of the largest blood testing labs in the U.S. – has raised some legitimate questions about the defense strategies of corporations in an era when cyber attac...

sysadminotaur bios kali

Sysadminotaur Bios: Kali

sysadminotaur bios boss

Sysadminotaur Bios: Boss

sysadminotaur bios bob

Sysadminotaur Bios: Bob

Explainlikeimfive Devolutions Products

Explain Like I’m Five (ELI5): Devolutions’ Products

If you spend any time on Reddit — and hopefully some of that is on Devolutions’ very own subreddit — then you’ve probably come across a great forum called “Explain Like I’m Five”, or ELI5 for short. I...

5 Reasons Why Not Use RDM

5 Reasons Why You Shouldn’t Use Remote Desktop Manager

Pfffftttt – who needs a password management solution? I mean, I can totally remember all my passwords and manage everything myself. And anyway, I will never, ever get hacked! So why use Remote Desktop...

The 16 Geekiest Places to Visit in the World

Traveling is all about discovering new places, new customs, new cultures, and much more. But what if I told you that traveling could help bring your favorite geeky games, TV shows, movies and scientif...

sysadminotaur 073 Trips

Sysadminotaur #73: Trips

Remote Desktop Manager 32-bit or 64-bit?

Some questions in life are hard to answer, like: would you rather step on a piece of Lego barefoot every day for a week or get a single paper cut between your toes? (Don’t worry, there’s a cure.) Or i...

Poll July Windows Commands for IT Pros

July Poll: Which Windows Commands Should Every IT Pro Know?

Last November, we asked our community of IT Pros if they were Windows or Mac. Not surprisingly, most of you are Windows — if not necessarily by choice, then by requirement, since you work in a Windows...

3-Things Employees Leaves Organization

5 Things to Do When an Employee Leaves Your Organization

For all kinds of reasons, turnover is a fact of life. Even companies that routinely make “Best Employers” lists like Google and Costco need to be prepared for when — not if — an employee heads for the...

3 Things Onboarding New Employees

3 Things to Do Before Onboarding New Employees

Adding a new team member is exciting — especially if they know how to play foosball! Of course, it’s always nice to say “welcome aboard” by having a team lunch, assigning a mentor, or viewing an orien...

Re Think Privileged Access Management

Is It Time to Rethink Privileged Access Management?

Privileged Access Management (PAM) helps organizations achieve two key objectives: restricting access to privileged accounts and maintaining compliance. PAM is especially vital these days because, in ...

Using Rust Code Devolutions Insider Series

[Insider Series] Using Rust Code in a C/C++ Project with CMake

As you hopefully know, we publish different series in our blog. For example, The Basics covers essential Remote Desktop Manager functions, while Case Studies highlight examples of IT pros using our pr...

rdcman outdated devolutions

Is Microsoft Remote Desktop Connection Manager (RDCMan) Outdated?

As an IT enthusiast, I spend a lot of time on IT-related blogs, forums, subreddits and so on. But one thing I’ve noticed in my journey across the interwebs is that there aren’t a lot of IT pros recomm...

sysadminotaur 072 Demotivator

Sysadminotaur #72: Demotivator

7 Best Worst Password Practices 2

Best of the Worst Password Practices

Don’t you hate it when your boss tells you thereasons cyber security is so importantand that the organization must adopt a stronger password policy? Seriously — who is your boss trying to impress? The...

Improved Remote Desktop Manager 13.5 Feature: Templates

I could easily spend the next few months highlighting all of the new and improved features in Remote Desktop Manager 13.5. But today, I’ll wrap things up with a look at how we’ve improved the template...

sysadminotaur 071 Layered Security pt4

Sysadminotaur #71: Layered Security (Part 4)

Read part 1 here.

Sysadminotaur #71: Layered Security (Part 3)

Read part 1 here. Read Part 4 here.