Security

Far Cry 2 NPCs Hate My Cybersecurity Tutorials – Crypto Setup & Kali VM Prep for 1984 VPS Hosting

Far Cry 2 NPCs Hate My Cybersecurity Tutorials – Crypto Setup & Kali VM Prep for 1984 VPS Hosting

This video kicks off my cybersecurity tutorial series. Everything here is legal, safe, and strictly educational, no real hacking is performed. I’m setting up tools in a controlled lab environment as part of my Master’s in Cybersecurity coursework.

To make it more entertaining, I’ve wrapped the tutorial inside the world of Far Cry 2, with NPCs chasing me down. It’s mostly for fun, but the lessons are real foundations for anyone interested in white-hat cybersecurity.

What’s in this episode:

⚠️ Disclaimer

  • This video is for educational purposes only.
  • No malicious activity is shown.
  • All tools demonstrated are legal and open-source.
  • The focus is on safe lab setup and whitehat practices, with gameplay used for entertainment.
  • Produced as part of my Cybersecurity Master’s degree coursework.
  • Always practice cybersecurity responsibly, legally, and within a controlled environment.

Should You Disable “Client for Microsoft Networks”?

When setting up Windows devices, one of the default components enabled on the network adapter is Client for Microsoft Networks. Most IT providers leave it alone, but the truth is: not every environment needs it, and in some cases, leaving it enabled just increases your attack surface.

What Is it

  • Client for Microsoft Networks is the Windows component that allows your PC to authenticate to domain controllers and access SMB file shares.
  • Without it, you can’t log into Active Directory or connect to traditional Windows file/print shares.

When It’s Needed

  • On-prem Active Directory environments
  • Mapped drives / file shares on Windows Servers or NAS devices using SMB
  • Legacy printer and network resource sharing

When It’s Not

  • Home users and cloud-first businesses running Microsoft 365, Google Workspace, Dropbox, etc.
  • Internet-only endpoints where the device never needs to access SMB shares.
  • Hardened environments (kiosks, DMZ servers, etc.) where minimal services = minimal attack surface.

Why It Matters

  • Legacy baggage – it’s been around since the NT4/2000 era.
  • Security implications – extra services mean more opportunities for NTLM relay, credential harvesting, or malicious SMB requests.
  • Best practice – disable what isn’t required, keep the networking stack lean.

Recommended Approach

  • In domain environments: Leave it enabled, it’s required for correct operation.
  • In non-domain environments: Disable it, especially for machines that only need internet/cloud access.
  • For file sharing: If you keep it, make sure you’re using SMB3 and modern authentication.

The Bottom Line

“Client for Microsoft Networks” isn’t inherently unsafe, but leaving it enabled on every device by default is sloppy IT hygiene. Evaluate whether it’s needed in your environment. If it’s not, disable it and shrink your attack surface.

At Boss IT Solutions, we don’t just run with defaults. We harden systems for the real world: keeping what’s necessary, stripping out what isn’t, and leaving you with a leaner, safer setup.

How a Landfill PC Exposed Years of Insecure IT Practices

A new client told me they’d bought a brand-new Windows 11 PC. It even had the shiny sticker on the front. But inside? It was a landfill special:

  • 4 GB of soldered RAM, non-upgradeable
  • Slow eMMC storage barely faster than an SD card
  • Bargain-bin Intel N-series CPU that wheezed opening File Explorer
  • Windows 11 Home slapped on as if it were a feature, not a red flag

Sure, it “ran” Windows 11, but just barely. That wasn’t even the real problem. The real kicker was when it couldn’t connect to the office NAS. They were told if they just bought this new PC that their NAS would start working fine! Thats what drove them to call me.

The Shortcut Fiasco

The NAS had been “breaking” for years apparantly. Every time it did, the previous IT provider came out, charged a support fee, and “fixed” it by creating new shortcuts to the NAS’s new DHCP IP.

By the time I got there, the client’s old windows 10 desktop was a graveyard of old NAS shortcuts. The new Windows 11 machine (they bought to apparantly fix it) finally broke the cycle, because Windows 11 doesn’t support SMB1.0, and the NAS was still running it, So no matter what, it would not connect.

No more shortcuts. No more quick fixes. The game was up.

The Real Issue: Legacy SMB Protocols

This is where the real problem lay: reliance on SMB1.0, a protocol designed in the 1980s and riddled with vulnerabilities.

  • SMB1 was the vector for the WannaCry and NotPetya outbreaks.
  • Microsoft deprecated it years ago.
  • Windows 11 won’t even install SMB1, and for good reason.

Yet many IT providers leave it running on old NAS boxes and file servers because it “still works.” That lazy approach leaves businesses insecure, and eventually, incompatible with modern systems.

Why It Matters

  • Legacy baggage – SMB1 belongs to the NT4/Windows 2000 era.
  • Security risk – it enables ransomware, NTLM relay, and credential theft.
  • Compatibility – new operating systems simply won’t talk to it.

What We Did

We rebuilt the setup properly:

  • Assigned the NAS a static IP (no more broken shortcuts and guaranteed billiable hours for the IT guy).
  • Upgraded it to SMB3 with user-level permissions.
  • Disabled insecure legacy protocols like SMB1.
  • Added SFTP with WinSCP for additional access.

The Result

  • Stronger authentication and encryption via SMB3.
  • Stable IP addressing, no more shortcut graveyards.
  • Safer access via SSH/SFTP.
  • A setup that actually works with Windows 11.

The Bottom Line

The cheap Windows 11 PC was funny, because it exposed a much scarier reality: years of IT abuse and insecure defaults left in place.

  • SMB1 is dead, stop leaving it enabled.
  • If your NAS still requires it, upgrade or replace it.
  • Static IPs and modern protocols save money and frustration.

At Boss IT Solutions, we don’t milk clients with shortcuts or leave them hanging on legacy defaults. We fix the root cause, harden what’s left, and leave you with a network that’s stable, secure, and modern. This was one of the worst we have ever seen.

Why You Should Avoid Preinstalled Antivirus Software from Retailers

Purchasing a new PC is an exciting experience, but one decision you may want to reconsider is whether to keep the preinstalled antivirus software that often comes with it. Retailers like Harvey Norman and JB Hi-Fi frequently bundle their PCs with antivirus solutions, including popular names like Norton, Trend Micro, and McAfee. However, our 25 years of experience in the tech industry have shown us that these preinstalled options might not be in your best interest. In this article, we’ll explore the reasons why you should think twice before relying on these preinstalled antivirus programs and suggest alternatives that can provide better protection for your computer.

  1. Limited Choice: One of the main drawbacks of preinstalled antivirus software from retailers is the lack of choice. These retailers often push a handful of brands, such as Norton, Trend Micro, and McAfee, which may not necessarily be the most effective or cost-efficient options for your needs. This limited selection can prevent you from exploring other reputable antivirus programs that might better suit your requirements.
  2. Profit-Driven Recommendations: It’s important to understand that retailers have a financial interest in promoting certain antivirus products. The brands they push typically have partnerships or agreements in place that allow retailers to profit from each sale. This financial incentive can lead to biased recommendations that prioritize profit margins over your computer’s security.
  3. Deceptive Practices: Unfortunately, some retailers engage in deceptive practices when selling preinstalled antivirus software. They may use scare tactics to convince customers that they need additional layers of protection, upselling unnecessary subscriptions and add-ons. As a result, many users end up with multiple expensive subscriptions, only to find that they’re still susceptible to viruses.
  4. Specialized Removal Tools: Another significant concern with antivirus programs like Norton, McAfee, and Trend Micro is that they often require specialized removal tools to uninstall completely. This is a red flag in itself. The fact that these programs don’t uninstall easily through conventional methods can be frustrating and time-consuming for users. It raises questions about the user-friendliness and transparency of these products.
  5. Better Alternatives: There are several antivirus brands that offer excellent protection but are often ignored by retailers because they don’t yield the same profit margins. Brands like Avast, AVG, Malwarebytes, and Bitdefender consistently rank highly in independent tests for detecting and eliminating malware. These options are typically more cost-effective and provide comprehensive protection without the need for multiple subscriptions.
  6. Bitdefender Basic Protection with Added Features: For those looking for a robust antivirus solution, Boss IT offers Bitdefender Basic Protection starting at just $59-$79 per user per year, depending on the level of security you need, such as VPN capabilities. Bitdefender not only provides top-notch antivirus protection but also offers additional features like phone tracking, remote locking, remote data wiping, and even the ability to capture photos of potential thieves. This comprehensive package ensures not only your computer’s security but also the safety of your mobile devices and personal data.

Ultimately, the decision is yours. Whether you prefer Norton or any other antivirus program, we respect your choice. However, we believe it’s crucial to provide you with the information and advice needed to make an informed decision that prioritizes your digital security and financial well-being. Retailers may prioritize profits, but your security should always come first. By considering the alternatives and evaluating your options, you can ensure that your computer remains protected without unnecessary expenses or risks. Of course, we’re here to guide you if you are unsure.

Even our IT professionals acknowledge that relying solely on Windows Defender for virus protection may not be suitable for those who aren’t tech-savvy. It’s a risk we wouldn’t recommend. In our office and workshop, we install Bitdefender on all our PCs, not only to clean and disinfect other systems but also to ensure our own protection. Despite our expertise in virus prevention, we maintain Bitdefender subscriptions for added peace of mind.

Unraveling the Mysteries of Black Hole Firewalls

Black holes have always captured our imagination. These cosmic giants, formed from the remnants of massive stars, are known for their intense gravitational pull, which even light cannot escape. We revisit an old theory – the black hole firewall.

Black holes form when massive stars burn out their nuclear fuel and collapse under the relentless force of gravity. They create a region in space known as the event horizon, which is a one-way boundary where anything can enter, but nothing can escape. This concept is grounded in Albert Einstein’s theory of general relativity.

The Information Paradox

The event horizon, however, poses a problem known as the “information paradox.” According to quantum mechanics, information cannot be lost, yet objects entering a black hole seem to vanish without a trace.

Enter the Firewall Hypothesis

Physicist Joseph Polchinski proposed a solution in 2012: the black hole firewall. According to this idea, at the event horizon, a searing wall of high-energy particles and radiation exists, akin to a blazing firewall. It would obliterate any information trying to cross the event horizon, reconciling quantum mechanics with general relativity.

Closing Thoughts

While the concept of black hole firewalls is still largely theoretical today, it’s exciting to imagine the potential they may hold for humanity’s future exploration and understanding of the cosmos. As science continues to push boundaries and gather new knowledge, we remain open to the ever-expanding mysteries of the universe.

(Our understanding of the universe is based on established models, but scientific knowledge remains open to evolution with new data, provided it remains untainted. So, we assure you open-mindedness, whether the Earth is flat, a globe, or even a banana).

Space blackhole

Do you Forget your Passwords?

We’ve all been there: you receive an email with a link to create a new password, only to be told it’s “too weak” or that you “can’t use an old password.” Sometimes followed by Captcha hell. It’s an infuriatingly common struggle.

You might be tempted to rely on your friendly neighbourhood IT guru, jot down passwords in a text document on your desktop, or even tuck them away in a physical notebook. However, these come with a substantial security risk. They can be easily pilfered or accessed by unauthorized individuals, unless you’re keeping them in a secure vault.

Passwords

So, whether you choose to entrust your memory, your IT Guy’s memory, password manager, or entertain the outlandish notion of getting microchipped (though we don’t exactly endorse that), the key is to remember passwords securely by using a dependable vendor like BitDefender Password Manager or a similar trusted solution, or even your Browsers inbuilt password manager, but be wary, using multiple password managers only spreads the risk.

What about NOW, I need Access NOW!

Boss IT Solutions, excels at resolving password-related headaches, effortlessly resetting multiple passwords when the need arises, and documenting it for the customer. With a remarkable 25 years of experience under their belt, they’ve seen it all, even customers from as far as Sydney seeking help in recalling their passwords from a bygone era as far back as like 2000.

Our Top Recommendation: BitDefender Password Manager

When it comes to finding a dependable solution, our choice is clear – Our Security Partner – BitDefender and their Password Manager, included as part of a security solution, works! It offers a comprehensive security suite as well as a user-friendly way to manage your passwords. Consider using a trustworthy, open-source browser like Firefox/Mullvad for added security, or contact us if you want comprehensive security solutions.

Do You Know What Your Apps Are Really Up To?

Smartphones have become an integral part of our daily routines, providing countless functionalities through various apps. But have you ever paused to consider what these apps do behind your back?
Many apps harvest and share data to enhance the user experience—think location-based recommendations or targeted advertisements. However, if an app’s data-sharing practices are murky or suspect, that’s your cue to dig deeper.

Pay a Little, Gain a Lot: The TAPAI vs. LENZ Example

Consider two photo-editing apps: TAPAI and LENZ. While LENZ is free, its data-sharing policy leaves much to be desired. TAPAI, on the other hand, has a nominal fee of $4/month but offers a transparent data usage policy. Sometimes, investing a few bucks a month can buy you peace of mind.
Even when it comes to big tech giants like Google, ‘free’ often comes with strings attached. Always read the fine print to fully understand how your data will be utilized.
So, the next time you’re itching to tap that “Install” button, pause. Review the app’s data-sharing policies. If something doesn’t sit right, perhaps a small subscription fee for a more secure app is a better way to go.
Have you experienced any alarming issues related to app data sharing? We want to know, as your security is our top priority.

BOSS IT Solutions: Your Guardian Against Cyber Threats

In an era where data security is non-negotiable, BOSS IT Solutions emerges as your unwavering shield, providing you with peace of mind:
1. Private Clouds
Secure data storage on dedicated servers, putting you in complete control of your information. #PrivateCloud #DataSecurity
2. In-House NAS
• Your digital fortress within your network, ensuring maximum data control and confidentiality. #NAS #DataControl
3. Security-Focused Distros
• Incorporating bootable Linux distros inspired by Tails and Qubes to elevate your protection game. #LinuxSecurity #DataProtection
4. Security Partner

• Our strategic partnership with Bitdefender guarantees top-notch software-level security, complemented by our extensive range of hardware and software services. #Bitdefender #CyberSecurity

At BOSS IT, we empower businesses to fortify their data defenses, offering tailor-made solutions for the modern digital landscape. In a world where connectivity reigns supreme, entrust BOSS IT to be your vigilant guardian of data security. #CyberProtection

QR Codes: Convenience with Security by BOSS IT Solutions

QR Codes: Convenience with Security by BOSS IT Solutions

In today’s digital age, QR codes offer speed and efficiency. They simplify tasks like website access, payments, and information sharing. Yet, QR codes also bring security and privacy concerns. BOSS IT Solutions is your partner in securing QR code use. ✨

Benefits of QR Codes:

Efficient and contactless interactions.
Effective marketing tools.
Accurate data entry. ✅
Challenges and Risks:
Malicious QR codes can lead to cyberattacks.
Privacy risks from tracking.
Phishing threats through QR codes.

How BOSS IT Solutions Helps:

Validates QR codes for safety. ✅
Provides robust device security.
Protects privacy and offers guidance.
Offers employee training in security awareness.

Confidently Used QR codes simplify digital life, but security is crucial. BOSS IT Solutions ensures you can enjoy QR codes with confidence, safeguarding your security and privacy in a digital world.

Boss IT Sets up a HIK VISION CCTV System prior to install for Testing

A Hikvision CCTV IP67 camera is a rugged surveillance camera designed to withstand harsh environmental conditions. The “IP67” rating signifies its exceptional resistance to dust and moisture, as it is completely dust-tight (IP6) and capable of withstanding temporary immersion in water up to 1 meter (approximately 3.3 feet). This durability makes it ideal for outdoor security applications, ensuring reliable performance even in challenging outdoor environments.

 

https://youtu.be/vkspTwcEfuA