![https://www.lepide.com/blog/wp-content/uploads/2024/07/4660-small.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/07/4660-small.jpg)
Windows Event ID 4660 – An Object Was Deleted
July 17, 2024, General
It is essential for an administrator to have complete visibility over all activities taking place… Read More
![https://www.lepide.com/blog/wp-content/uploads/2024/07/blog-small-2.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/07/blog-small-2.jpg)
How to Securely Store Sensitive Information
July 9, 2024, General
Sensitive data can be found in various forms, including traditional formats like paper files, local… Read More
![https://www.lepide.com/blog/wp-content/uploads/2024/06/blog-small-6.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/06/blog-small-6.jpg)
When interacting with AI language models, users provide a prompt, which can take the form… Read More
![https://www.lepide.com/blog/wp-content/uploads/2024/05/blog-small-1.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/05/blog-small-1.jpg)
Generative AI Security Risks and How to Overcome Them
May 16, 2024, General
Generative AI (GenAI) is a form of artificial intelligence that generates new data based on… Read More
![https://www.lepide.com/blog/wp-content/uploads/2024/05/password-attacks-small.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/05/password-attacks-small.jpg)
Password attacks are an incredibly common type of security threat that we see. The objective… Read More
![https://www.lepide.com/blog/wp-content/uploads/2024/04/childItem-small.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/04/childItem-small.jpg)
Get-ChildItem PowerShell – A Complete Guide
April 9, 2024, IT Operations
In this comprehensive guide, we’ll dive deep into the intricacies of Get-ChildItem, exploring its myriad… Read More