MAHARJAN-TECH

"Innovate, Implement, Inspire."

  • Home
  • Blog
  • Active-Directory
  • Group-Policy
  • How I Upgrade to Exchange Server Subscription Edition (SE)?

    How I Upgrade to Exchange Server Subscription Edition (SE)?

    July 3, 2025

    🔄 Introduction As Microsoft moves toward a modern servicing model, Exchange Server Subscription Edition (SE) is the next evolution in on-premises email infrastructure. Built on the foundation of Exchange Server 2019, this edition introduces a subscription-based license and an evergreen model—ideal for organizations seeking long-term security, compliance, and hybrid-readiness without disruptive version jumps. If you’re…

  • Forensics Part 4: The Digital Post-Mortem — Healing the City

    January 16, 2026

    We have found the Artifacts, analyzed the Ghosts, and reconstructed the Timeline. The intruder has been identified and their path is clear. But a Mindful Architect knows that the job isn’t finished when the hacker is gone. The most critical work happens now: the Post-Mortem. This is the process of turning a “Crisis” into “Wisdom.”…

  • Forensics Part 3: Timelining the Intrusion — Connecting the Shadows

    January 16, 2026

    In the first two parts of our Forensics series, we collected Artifacts (Logs) and analyzed Ghosts (RAM). But right now, we just have a pile of evidence. To catch an intruder, a Mindful Architect must become a Chronologer. An attack is not a single event; it is a sequence of moments. Timelining is the process…

  • Forensics Part 2: The Memory Trace — Analyzing the Ghosts in the RAM

    January 16, 2026

    In our first archaeology lesson, we looked at Artifacts (logs) left on the hard drive. But modern intruders are clever. They know that files leave footprints, so they often choose to live entirely in the RAM (Random Access Memory). This is called “Fileless Malware.” As a Mindful Architect, you must understand that the most dangerous…

  • Forensics Part 1: The Artifacts of Truth — Beyond Standard Logging

    January 16, 2026

    In our previous levels, we built a city and even practiced attacking it. But if a real intruder entered your city today, would you actually know what they did? Standard Windows Event Logs are like a night watchman who only writes down when someone enters the front door—they miss the thief climbing through the window…

  • The Dojo Part 4: The First Strike — Capturing the Ghost

    January 16, 2026

    We have built the Dojo, created the flaws, and equipped our tools. Now, the time for theory is over. It is time for the First Strike. In this simulation, we are going to demonstrate one of the most common and “silent” attacks in Active Directory history: LLMNR/NetBIOS-NS Spoofing. We are going to prove that even…

  • The Dojo Part 3: The Thief’s Perspective — Seeing Through Kali

    January 16, 2026

    In the previous parts of the Dojo, we built our Sanctuary and populated it with Vulnerabilities. Now, it is time to put on the mask of the intruder. To be a truly Mindful Architect, you must understand the tools of the “Red Team.” We aren’t learning these tools to cause harm; we are learning them…

  • The Dojo Part 2: The Vulnerable City — Designing the Flaws

    January 16, 2026

    In Part 1, we built the Sandboxed Sanctuary—the physical room for our Dojo. But a warrior cannot practice with a straw man that never moves. To learn how to hunt threats, we must create a city that is actually worth hunting. As a Mindful Architect, we are now going to intentionally “downgrade” our security. We…

  • The Dojo Part 1: The Sandboxed Sanctuary — Building Your Virtual Lab

    January 16, 2026

    For five levels, we have been building and managing a “Digital City.” But a true Mindful Architect knows that a fortress is only as strong as the pressure it can withstand. To truly understand defense, you must practice the “Art of the Attack.” However, you never practice swordplay in a crowded market. You go to…

  • Management Part 4: The Art of the Remote Wipe — Securely Ending the Journey

    January 16, 2026

    In the lifecycle of every citizen’s tool, there comes a time for a “Clean Break.” Perhaps a laptop has reached the end of its three-year life, perhaps a citizen is moving on to a different city (company), or—worst case—a device has been stolen in a distant land. As a Mindful Architect, we must be as…

  • Management Part 3: Compliance & Integrity — The New Digital Health Standard

    January 16, 2026

    In the old days of the physical city, we relied on the “Castle Walls.” If you were inside the building and plugged into the wall, we trusted your computer. But in our borderless “Satellite Colony,” a user could be logging in from a home laptop filled with malware or a stolen tablet with no passcode….

Next Page→

Reach out to me

Questions or feedback regarding our digital content? Contact us at helpdesk@maharjan-binod.com.np

  • Twitter
  • LinkedIn
  • Instagram

© 2026 MAHARJAN-BINOD All rights reserved. | Kathmandu, Nepal