4.64 score from hupso.pl for:
bluesoul.me

### HTML Content

Titlebluesoul [dot] me – i am the it manager, and so can you.

Length: 62, Words: 12
Description pusty

Length: 0, Words: 0
Keywords pusty
Robots
Charset UTF-8
Og Meta - Title exist
Og Meta - Description exist
Og Meta - Site name exist
Tytuł powinien zawierać pomiędzy 10 a 70 znaków (ze spacjami), a mniej niż 12 słów w długości.
Meta opis powinien zawierać pomiędzy 50 a 160 znaków (łącznie ze spacjami), a mniej niż 24 słów w długości.
Kodowanie znaków powinny być określone , UTF-8 jest chyba najlepszy zestaw znaków, aby przejść z powodu UTF-8 jest bardziej międzynarodowy kodowaniem.
Otwarte obiekty wykresu powinny być obecne w stronie internetowej (więcej informacji na temat protokołu OpenGraph: http://ogp.me/)

### SEO Content

Words/Characters 3561
Text/HTML 46.44 %
H2 7
H3 6
H4 0
H5 0
H6 0
H1
H2
##### the most important piece to getting hired isn’t the certs or the degree. it’s the interview.use nested traversal groups to allow access to abe-enabled grandchild folders.use gpo to change the default behavior of potentially malicious file extensions.dangitbobby.ps1 – remotely disable a nic given only a username.quick tips: programmatically emptying the temp folder for all user profiles in a terminal server.quick tips: share permissions do more than you think.ransomware is the future.
H3
H4
H5
H6
strong
###### comfortableacl_folder1-folder2_traversethis folder onlyacl_folder1-folder2_traverseacl_folder1-folder2-folder3_traversethis folder onlythis folder onlybackups.tested
b
i
em comfortable
acl_folder1-folder2_traverse
this folder only
acl_folder1-folder2_traverse
acl_folder1-folder2-folder3_traverse
this folder only
this folder only
backups.
tested
Bolds strong 9
b 0
i 0
em 9
Zawartość strony internetowej powinno zawierać więcej niż 250 słów, z stopa tekst / kod jest wyższy niż 20%.
Pozycji używać znaczników (h1, h2, h3, ...), aby określić temat sekcji lub ustępów na stronie, ale zwykle, użyj mniej niż 6 dla każdego tagu pozycje zachować swoją stronę zwięzły.
Styl używać silnych i kursywy znaczniki podkreślić swoje słowa kluczowe swojej stronie, ale nie nadużywać (mniej niż 16 silnych tagi i 16 znaczników kursywy)

### Statystyki strony

Pliki zewnętrzne 29
Pliki CSS 6
Pliki javascript 23
Plik należy zmniejszyć całkowite odwołanie plików (CSS + JavaScript) do 7-8 maksymalnie.

Linki - Użyj atrybutu tytuł dla każdego łącza. Nofollow link jest link, który nie pozwala wyszukiwarkom boty zrealizują są odnośniki no follow. Należy zwracać uwagę na ich użytkowania

pusty

bluesoul [dot] me https://bluesoul.me
the most important piece to getting hired isn’t the certs or the degree. it’s the interview. https://bluesoul.me/2017/04/13/the-most-important-piece-to-getting-hired-isnt-the-certs-or-the-degree-its-the-interview/
use nested traversal groups to allow access to abe-enabled grandchild folders. https://bluesoul.me/2016/10/06/use-nested-traversal-groups-to-allow-access-to-abe-enabled-grandchild-folders/
use gpo to change the default behavior of potentially malicious file extensions. https://bluesoul.me/2016/05/12/use-gpo-to-change-the-default-behavior-of-potentially-malicious-file-extensions/
dangitbobby.ps1 https://gist.github.com/pxdnbluesoul/c7754a2da87b2a517ddd76e2231e14c8
quick tips: programmatically emptying the temp folder for all user profiles in a terminal server. https://bluesoul.me/2016/03/28/quick-tips-programmatically-emptying-the-temp-folder-for-all-user-profiles-in-a-terminal-server/
quick tips: share permissions do more than you think. https://bluesoul.me/2016/03/21/quick-tips-share-permissions-do-more-than-you-think/
ransomware is the future. https://bluesoul.me/2016/03/18/ransomware-is-the-future/
cryptolocker software restriction policies http://i.imgur.com/hjxj2bv.jpg
here https://bluesoul.me/2016/05/12/use-gpo-to-change-the-default-behavior-of-potentially-malicious-file-extensions/
practical malware analysis starter kit https://bluesoul.me/practical-malware-analysis-starter-kit/
the most important piece to getting hired isn’t the certs or the degree. it’s the interview. https://bluesoul.me/2017/04/13/the-most-important-piece-to-getting-hired-isnt-the-certs-or-the-degree-its-the-interview/
use nested traversal groups to allow access to abe-enabled grandchild folders. https://bluesoul.me/2016/10/06/use-nested-traversal-groups-to-allow-access-to-abe-enabled-grandchild-folders/
use gpo to change the default behavior of potentially malicious file extensions. https://bluesoul.me/2016/05/12/use-gpo-to-change-the-default-behavior-of-potentially-malicious-file-extensions/
quick tips: programmatically emptying the temp folder for all user profiles in a terminal server. https://bluesoul.me/2016/03/28/quick-tips-programmatically-emptying-the-temp-folder-for-all-user-profiles-in-a-terminal-server/
andy https://itring.pl
use gpo to change the default behavior of potentially malicious file extensions. https://bluesoul.me/2016/05/12/use-gpo-to-change-the-default-behavior-of-potentially-malicious-file-extensions/#comment-16
ransomware is the future. https://bluesoul.me/2016/03/18/ransomware-is-the-future/#comment-14
ransomware: past, present and future | the security blogger http://www.thesecurityblogger.com/ransomware-past-present-and-future/
ransomware is the future. https://bluesoul.me/2016/03/18/ransomware-is-the-future/#comment-13
use gpo to change the default behavior of potentially malicious file extensions. https://bluesoul.me/2016/05/12/use-gpo-to-change-the-default-behavior-of-potentially-malicious-file-extensions/#comment-12
use gpo to change the default behavior of potentially malicious file extensions. https://bluesoul.me/2016/05/12/use-gpo-to-change-the-default-behavior-of-potentially-malicious-file-extensions/#comment-11
april 2017 https://bluesoul.me/2017/04/
october 2016 https://bluesoul.me/2016/10/
may 2016 https://bluesoul.me/2016/05/
april 2016 https://bluesoul.me/2016/04/
march 2016 https://bluesoul.me/2016/03/
abe https://bluesoul.me/tag/abe/
automation https://bluesoul.me/tag/automation/
file servers https://bluesoul.me/tag/file-servers/
fsrm https://bluesoul.me/tag/fsrm/
group policy https://bluesoul.me/tag/group-policy/
ntfs permissions https://bluesoul.me/tag/ntfs-permissions/
permissions https://bluesoul.me/tag/permissions/
powershell https://bluesoul.me/tag/powershell/
ransomware https://bluesoul.me/tag/ransomware/
share permissions https://bluesoul.me/tag/share-permissions/
soft skills https://bluesoul.me/tag/soft-skills/
windows server https://bluesoul.me/tag/windows-server/
bluesoul [dot] me https://bluesoul.me
theme junkie http://www.theme-junkie.com/
bluesoul [dot] me https://bluesoul.me/

### Zdjęcia

Zdjęcia 2
Zdjęcia bez atrybutu ALT 0
Zdjęcia bez atrybutu TITLE 2
Korzystanie Obraz ALT i TITLE atrybutu dla każdego obrazu.

empty

Alexa Traffic

Majestic SEO

### Text on page:

bluesoul [dot] me the most important piece to getting hired isn’t the certs or the degree. it’s the interview. it’s an unfortunate reality that you can be, and maybe already have been, rejected for a position you applied for. certifications in the relevant fields in hand, a degree to your name…would you be gutted to know that “warm and fuzzies” carries equal weight to the other two? improving your warmth and fuzziness is key not only to getting a foot in the door, but advancement in your career. this is one of a few things that go into the nebulous area of “soft skills,” and i have passed on a lot of candidates because the soft skills aren’t there, and it takes a long, long time to train. lacking it skills, in comparison, isn’t a big deal; i can tell an admin that if they aren’t comfortable with what the next step is on a project, stop and come find me. when you lack soft skills, i can’t tell you to change who you are. what goes into “warm and fuzzies” from the perspective of a technical manager? it’s a few things for me, and i’ll lay them out to the best of my ability: confidence is one. this manifests as high self-esteem, eye contact, and being relaxed and able to express a range of emotions in the interview. if you’re shrinking away the whole time, looking down, giving fearful responses that you’re very obviously hoping are the ones i want to hear, it gives me concern that you’re not going to be composed in an actual emergency, or that you’re going to embarrass the both of us if come higher-up puts you on the spot. another is the ability to speak to topics in your resume, on the spot. i am not a quizmaster-style interviewer. however, if your resume mentions “configured and maintained active directory and group policy,” that is highly relevant to the position here, so i’m going to say “tell me about your work with ad and group policy.” a bad answer would be “uh, you know, all sorts of stuff.” it’s a bad answer for both of us, because now i’m going to have to ask some more direct quizmaster style questions to understand where you’re at with understanding windows infrastructure. a good answer would be “sure, before i arrived everyone was having to add network printers by hand, so i set up some security groups for different areas of the building, put the computers in the group that made sense, and set up gpos to do the printer installation depending on the security group.” that answers a lot of questions at the same time, it shows knowledge of multiple areas at the same time. it probably knocks 5 minutes off the interview that would’ve only been an opportunity for you to dig yourself in a hole. it’s really important to me that if you are going to put a technology on your resume, you’d better be prepared to explain exactly what you know about it. i have lost count of the times i’ve had someone say on their resume that they know “networking”, but the reality of the situation is that they know what an ip address is and what a mac address is. they don’t know why they have to enter a subnet mask, they have no concept of basic switching and routing, they don’t know tcp vs. udp. they would’ve been better off leaving it off entirely, because it feels very dishonest to me, and it puts you in a huge hole for the rest of the interview. but that’s me, i’m a technical manager. when i had my interview here with 3 other c-levels, i could give a nonsensical answer like “an ip address is what identifies you to the world,” but as soon as the words “ip address” hit their ears, i may as well be talking about tachyon emitters and flux capacitors. my predecessor told me, “the best thing about this position is nobody here knows what you do. the worst thing about this position is nobody here knows what you do.” so think about this. you’ve got non-technical management evaluating you. your certifications may as well be from starfleet academy. they don’t know, nor do they particularly care, what a hypervisor is. their needs are simpler: the computers and internet must not break. if the computers or internet break, i must feel comfortable with you being the one handling it. i must be able to have a human interaction with you when things are not broken if i’m ever to let you out of your cage. and guys and girls, we have a bad reputation when it comes to that third bullet point. some of it is on our predecessors, some of it is on us, some of it is on the media’s portrayal of us. tv sitcoms involving “nerdy guys” have not done us any favors. but you don’t need to fix the whole world’s vision of it professionals. you need to fix the hiring managers vision of you. this is more for advancement potential than getting in, because many organizations aren’t expecting that human interaction from an it person. but they must feel comfortable with you if you’re going to get in. in the long run, spending $300 on a public speaking course at your local junior college will do more for your career than$300 on another certification. you may be in the majority of people that say “ugh, i hate giving speeches.” and that’s totally understandable. honestly though, the real world doesn’t have a lot of people giving speeches like you had to give in 8th grade history. sales professionals and executives need that skillset, but that’s not the extent of what you get out of public speaking classes. what you just might get is a bit of confidence as you speak around a table, going over a plan of action, or answering questions in an interview. what else goes into comfort for a non-technical manager? i think comfort and trust are very tightly linked. you can never be entirely comfortable around someone you deem untrustworthy. trust, in turn, goes to integrity, it goes to reliability, and it goes to rationality. you won’t be fully comfortable around someone, and you won’t fully trust them, if they aren’t fully honest, reliable, or rational. consider how each of those can manifest in an interview. if i find that you really oversold your abilities with little probing, i must conclude that you are not fully honest. if your previous employers indicate that you had issues with absences or tardiness, or that you take far longer than you should to complete tasks, i have to question your reliability. your overall behavior in the interview is being judged for rationality, but it is gauged mainly by questions about actions you’ve taken in the past, and whether they match up with what i would consider a rational action. i tend to ask candidates about the biggest mistake they’ve made in it, and the actions they took after they made the mistake. there are two main points to this question. one, if the candidate says “i’ve never made any big mistakes,” they’re either very green or being dishonest. we all make mistakes, and everyone has their own context for what a big mistake is. two, i’m not particularly interested in what the mistake was. what i’m after is the response. letting your manager know immediately after the mistake has been made is rational and honest. fixing a self-inflicted outage and walking away whistling is rational, but not honest. quitting your job because you didn’t want to be seen after making the mistake is honest, but not rational and raises huge issues about reliability. (this did happen to a candidate, and they were not remotely equipped to be unemployed.) oh, and saying “i don’t make mistakes” is neither honest nor rational, and i’ve heard it more than once. really need to knock that off. i’m hoping this is helpful for a few of you. i know it can be disheartening to spend so much time and money (and money and money and) on the papers that show you know your stuff, but still not be given a chance. spend a little time thinking about how you can up your warmth and fuzziness, and i’m confident it’ll help you in the long run. use nested traversal groups to allow access to abe-enabled grandchild folders. say you have the following structure: \\domain\dfs\folder1\ <– usera can access this folder. \\domain\dfs\folder1\folder2 <– usera has no privileges on this folder. \\domain\dfs\folder1\folder2\folder3 <– usera has modify access to this folder, subfolders and files. \\domain\dfs\folder1\folder2\folder4 <– usera has no privileges on this folder. with abe, the usera will not see folder2 even though folder3 is something they do have access to. so permissions are added for usera, but because they were done incorrectly, they can now also enumerate folder4 which they should not even have been aware of. this comes up a lot, and there is a good way to handle it: create the acl group: acl_folder1-folder2_traverse and make usera a member. add the (advanced) acl on folder2: acl_folder1-folder2_traverse –> read –> this folder only now, let’s extend the scenario a level deeper: \\domain\dfs\folder1\ <– usera can access this folder. \\domain\dfs\folder1\folder2 <– usera has no privileges on this folder. \\domain\dfs\folder1\folder2\folder3 <– usera has no privileges on this folder. \\domain\dfs\folder1\folder2\folder4 <– usera has no privileges on this folder. \\domain\dfs\folder1\folder2\folder3\folder5 <– usera has modify rights on this folder, subfolders and files. so, this is handled in much the same way, but it would be smart in this case to nest the security groups. create the acl group: acl_folder1-folder2_traverse. create the acl group: acl_folder1-folder2-folder3_traverse. make the folder3 traverse group a member of the folder2 group. make usera a member of the folder3 traverse group. add the (advanced) acl on folder2: acl_folder1-folder2_traverse –> read –> this folder only add the (advanced) acl on folder3: acl_folder1-folder2-folder3_traverse –> read –> this folder only this keeps the acls clean and lets you attach the most explicit permission needed to the user. use gpo to change the default behavior of potentially malicious file extensions. if you’re like me and don’t have direct control of your own email filtering, or want to go a step beyond, you’re going to want a way to prevent non-pe viruses from running. software restriction policies are good for this if you’re using them in a whitelist capacity, provided that you’ve also added the extension to the designated file types. from a blacklist standpoint it’s tougher. another way to approach the problem is to change the default program to open a particular file extension, and if nothing else it’s another layer of security. this has come up in response to .js-powered ransomware variants and, most recently, a .hta variant of locky. the policy is as follows: user configuration -> preferences -> control panel settings -> folder options -> open with action: replace file extension: hta associated program: %windir%\system32\notepad.exe set as default: enabled. these policies do require you to be either aware of any applications that this will impact or being willing to find out after it’s kicked in. most organizations can modify .hta and .wsh with no negative repercussions. many can modify .vbs but many cannot, as they are used by many old logon scripts still in use. many can modify .js, as even those in web development are likely using an ide to work with javascript files rather than simply double-clicking them. just be aware of your environment’s needs when implementing this. enabling this policy and setting it to open in notepad also benefits you because the end-user will still have something unusual (but now harmless) pop-up, a notepad window that is full of dangerous-looking stuff. with any luck, they’ll notify the helpdesk so they can clean the system up. dangitbobby.ps1 – remotely disable a nic given only a username. so i have a code offering today, which i’m calling dangitbobby.ps1. it lets you remotely disable the nic of a computer given only the username that is logged in. in essence, when in the middle of a ransomware infection, and you see that the owner of all the files is changing to bobby, you run the script and provide credentials of a local admin account. then you tell it you’re looking for bobby, it’ll check ad to make sure that’s a valid account, then check with wmi to see if there’s an explorer.exe process running under bobby’s context on each computer, which you can narrow down with the first few characters of what the workstation might be. if they’re logged into multiple workstations it’ll let you choose which one to work with. then it’ll give you a list of nics and a little information about each one, and let you choose which one to disable. i hope i don’t need to tell you to be careful running this. quick tips: programmatically emptying the temp folder for all user profiles in a terminal server. i ended up needing to do this last week, we have a lob application that people access via terminal services, and it doesn’t clean up after itself in the temp folder, which causes the application to act up. can’t get the developers to fix the problem so it’s on us. the existing fix was one batch file, tied to one scheduled task, for every user (50+) of the terminal server. nightmare to keep maintained. so i built a simple powershell script, one script for all user profiles. for(;;) { try { set-location "c:\users" remove-item ".\*\appdata\local\temp\*" -recurse -force } catch { # eventsentry will watch for powershell dying. break } # wait for a minute start-sleep 60 } then i created a scheduled task to have powershell run on startup with the argument -file path:\to\script.ps1 and had it run as system with highest privileges. since this was the first time using ps1 files on this server i also needed to set-executionpolicy remotesigned. quick tips: share permissions do more than you think. while rebuilding a piece of my lab for file server and dfs services, i had an odd set of symptoms. i had a user in a security group that was not set to be able to change permissions, and no ability to take ownership, in the ntfs permissions. yet they were able to add permissions to give others elevated access, or even elevate their own access. it turns out i’d forgotten the share permission side, where this still had some debug settings; in particular, that “authenticated users” had full control. have you ever really messed with those share permissions? usually we rush right on and do everyone -> full control and then lock it down with ntfs permissions later. but, have you ever tried just doing change and read and leaving full control off? it’s actually what you’re usually trying to accomplish, and gives you a little head start in that you don’t have to hope you don’t get a clever end-user later that elevates their own ntfs permissions. ransomware is the future. when i first started fighting ransomware in late 2013, i had a premonition that this was something serious. while cryptolocker was rather easily defeated in the enterprise and ultimately killed by killing the botnet, media outlets and tech sites ran with the story. it showed this small group making millions and millions of dollars. guess what? more people started writing ransomware. cut to now. ransomware-as-a-service is a real thing you can buy, some variants have live chat support to receive payment, and we routinely see new versions with bugfixes and feature-adds. one of the last major flaws in ransomware, the inability to enumerate non-mapped network shares, was overcome in the latest locky build that calls wnetopenenum() to attempt to traverse every share on the network. for several years, the endgame was more abstract. hit the pc with your rootkit, join it to your botnet, sell botnet access to spammers for a fee. now they can cut out the middle man and have less overhead, since there’s not a need for constant command-control oversight. it’s a path to riches hampered only by the still-high knowledge barrier to acquire and send bitcoin. and by affecting the user’s files, rather than a popup about the fbi or toteslegit antivirus which can simply be fixed by backing up the data and nuking the pc, you’ve got them at your mercy. this is going to get worse way before it gets better. you’ll see builds that try to invoke apis for popular cloud storage providers to delete the versioning. they’ll find ways to avoid taking ownership of a file to quickly spot the vector of infection. while it’s almost impossible to be truly proactive to effectively block ransomware, there are things that can be done. avoid mapping your drives and hide your network shares. wnetopenenum() will not enumerate hidden shares. this is as simple as appending a $to your share name. work from the principle of least permission. very few organizations need a share whereby the everyone group has full control. delegate write access only where it’s needed, don’t allow them to change ownership of files unless it’s a must. be vigilant and aggressive in blocking file extensions via email. if you’re not blocking .js, .wsf, or scanning the contents of .zip files, you’re not done. consider screening zip files outright. consider if you can abolish .doc and .rtf in favor of .docx which cannot contain macros. install ad-blockers and script-blockers as standard loadout. drive-by malware is out of control right now. cut off the vector of infection. i use ublock origin which is easy to disable case-by-case and offers niceties like element blockers. install the old cryptolocker software restriction policies which will block some rootkit-based malware from working effectively. you can create a similar rule for %localappdata%\*.exe and %localappdata%\*\*.exe as well. it was pointed out in the reddit comments, that if it’s at all feasible, run on a whitelist approach instead of a blacklist. it’s more time-intensive but much safer. stay up-to-date on the latest ransomware news, how they operate, and what the decrypt instruction filenames are. these can be added to file screens with fsrm to execute a command to kill the share. simply disabling the affected user is not enough without also forcing them to log off. backups. having good, working, versionable, cold-store, tested backups makes this whole thing a minor irritation rather than a catastrophe. even windows server backup on a wal-mart external usb drive is better than nothing. crashplan does unlimited versioned backups with unlimited retention at a flat rate, and there’s a linux agent as well. hell, dropbox does versioned backups. get something. [added 5/12/2016] for some non-program (winpe) viruses, you can change the default behavior of some extensions to open in notepad rather than the original vulnerable target. a guide is here. ransomware has evolved a lot in just a couple of years, and the end is nowhere in sight. get your defenses up, and know the enemy. there’s a lot less heartache doing the prevention before you’re hit than after. about i'm a cto and some-time malware researcher. i'm not here to sell anything. twitter: @bluesouldotme stuff practical malware analysis starter kit recent posts the most important piece to getting hired isn’t the certs or the degree. it’s the interview. use nested traversal groups to allow access to abe-enabled grandchild folders. use gpo to change the default behavior of potentially malicious file extensions. dangitbobby.ps1 – remotely disable a nic given only a username. quick tips: programmatically emptying the temp folder for all user profiles in a terminal server. recent commentsandy on use gpo to change the default behavior of potentially malicious file extensions.anonymous on ransomware is the future.ransomware: past, present and future | the security blogger on ransomware is the future.justin on use gpo to change the default behavior of potentially malicious file extensions.mike on use gpo to change the default behavior of potentially malicious file extensions.archives april 2017 october 2016 may 2016 april 2016 march 2016 tagsabe automation file servers fsrm group policy ntfs permissions permissions powershell ransomware share permissions soft skills windows server © copyright 2017 bluesoul [dot] me · designed by theme junkie bluesoul [dot] me proudly powered by wordpress theme: bulan. Here you find all texts from your page as Google (googlebot) and others search engines seen it. ### Words density analysis: #### Numbers of all words: 3384 ### One word ### Two words phrases ### Three words phrases the - 6.68% (226) you - 3.37% (114) and - 3.07% (104) old - 2.07% (70) folder - 1.92% (65) are - 1.8% (61) use - 1.45% (49) for - 1.33% (45) that - 1.27% (43) this - 1.18% (40) one - 1.09% (37) not - 1.03% (35) all - 0.95% (32) can - 0.92% (31) our - 0.92% (31) they - 0.89% (30) your - 0.86% (29) user - 0.86% (29) with - 0.83% (28) out - 0.83% (28) file - 0.83% (28) have - 0.71% (24) now - 0.71% (24) able - 0.65% (22) what - 0.59% (20) here - 0.56% (19) some - 0.53% (18) group - 0.53% (18) act - 0.53% (18) ran - 0.53% (18) man - 0.53% (18) it’s - 0.5% (17) - 0.5% (17) but - 0.5% (17) folder2 - 0.5% (17) know - 0.47% (16) thing - 0.44% (15) ide - 0.44% (15) ransomware - 0.41% (14) get - 0.41% (14) add - 0.41% (14) permission - 0.41% (14) ever - 0.41% (14) you’re - 0.41% (14) lock - 0.38% (13) usera - 0.38% (13) main - 0.38% (13) work - 0.38% (13) about - 0.38% (13) end - 0.38% (13) take - 0.38% (13) acl - 0.38% (13) need - 0.38% (13) files - 0.35% (12) has - 0.35% (12) nest - 0.35% (12) share - 0.33% (11) very - 0.33% (11) than - 0.33% (11) access - 0.33% (11) change - 0.33% (11) set - 0.33% (11) own - 0.33% (11) let - 0.33% (11) permissions - 0.33% (11) ones - 0.3% (10) dfs - 0.3% (10) any - 0.3% (10) interview - 0.3% (10) had - 0.3% (10) don’t - 0.3% (10) give - 0.3% (10) put - 0.3% (10) only - 0.3% (10) was - 0.3% (10) time - 0.3% (10) extension - 0.3% (10) which - 0.3% (10) nic - 0.27% (9) run - 0.27% (9) full - 0.27% (9) i’m - 0.27% (9) off - 0.27% (9) going - 0.27% (9) traverse - 0.27% (9) \\domain\dfs\folder1\ - 0.27% (9) two - 0.27% (9) mistake - 0.27% (9) <– - 0.27% (9) folder3 - 0.27% (9) kill - 0.27% (9) them - 0.27% (9) honest - 0.27% (9) block - 0.24% (8) control - 0.24% (8) server - 0.24% (8) way - 0.24% (8) even - 0.24% (8) will - 0.24% (8) more - 0.24% (8) there - 0.24% (8) real - 0.24% (8) default - 0.24% (8) me, - 0.24% (8) rational - 0.24% (8) would - 0.21% (7) behavior - 0.21% (7) ability - 0.21% (7) comfort - 0.21% (7) extensions - 0.21% (7) other - 0.21% (7) \\domain\dfs\folder1\folder2 - 0.21% (7) make - 0.21% (7) from - 0.21% (7) folder. - 0.21% (7) fix - 0.21% (7) script - 0.21% (7) when - 0.21% (7) because - 0.21% (7) after - 0.21% (7) how - 0.21% (7) did - 0.18% (6) privileges - 0.18% (6) lot - 0.18% (6) security - 0.18% (6) most - 0.18% (6) is. - 0.18% (6) interview. - 0.18% (6) then - 0.18% (6) their - 0.18% (6) see - 0.18% (6) must - 0.18% (6) log - 0.18% (6) policy - 0.18% (6) open - 0.18% (6) –> - 0.18% (6) soft - 0.18% (6) come - 0.18% (6) answer - 0.18% (6) over - 0.18% (6) gpo - 0.18% (6) cut - 0.18% (6) start - 0.18% (6) question - 0.18% (6) ask - 0.18% (6) say - 0.18% (6) potential - 0.18% (6) skills - 0.18% (6) tech - 0.18% (6) every - 0.18% (6) in. - 0.15% (5) many - 0.15% (5) were - 0.15% (5) read - 0.15% (5) may - 0.15% (5) disable - 0.15% (5) create - 0.15% (5) like - 0.15% (5) hit - 0.15% (5) potentially - 0.15% (5) malicious - 0.15% (5) rather - 0.15% (5) also - 0.15% (5) program - 0.15% (5) manager - 0.15% (5) extensions. - 0.15% (5) up. - 0.15% (5) still - 0.15% (5) modify - 0.15% (5) just - 0.15% (5) local - 0.15% (5) been - 0.15% (5) high - 0.15% (5) being - 0.15% (5) cto - 0.15% (5) long - 0.15% (5) goes - 0.15% (5) temp - 0.15% (5) list - 0.15% (5) backup - 0.15% (5) late - 0.15% (5) network - 0.15% (5) made - 0.15% (5) where - 0.15% (5) right - 0.15% (5) 2016 - 0.15% (5) computer - 0.15% (5) hole - 0.15% (5) ps1 - 0.15% (5) tell - 0.15% (5) comfortable - 0.15% (5) me. - 0.15% (5) few - 0.15% (5) trust - 0.12% (4) fully - 0.12% (4) into - 0.12% (4) ntfs - 0.12% (4) resume - 0.12% (4) remotely - 0.12% (4) another - 0.12% (4) want - 0.12% (4) speak - 0.12% (4) that’s - 0.12% (4) things - 0.12% (4) honest. - 0.12% (4) find - 0.12% (4) big - 0.12% (4) lack - 0.12% (4) less - 0.12% (4) acl_folder1-folder2_traverse - 0.12% (4) bluesoul - 0.12% (4) candidate - 0.12% (4) who - 0.12% (4) are. - 0.12% (4) little - 0.12% (4) aren’t - 0.12% (4) added - 0.12% (4) takes - 0.12% (4) technical - 0.12% (4) build - 0.12% (4) consider - 0.12% (4) powershell - 0.12% (4) quick - 0.12% (4) there’s - 0.12% (4) does - 0.12% (4) future - 0.12% (4) position - 0.12% (4) done - 0.12% (4) backups - 0.12% (4) getting - 0.12% (4) under - 0.12% (4) you’ve - 0.12% (4) notepad - 0.12% (4) better - 0.12% (4) stuff - 0.12% (4) think - 0.12% (4) really - 0.12% (4) groups - 0.12% (4) everyone - 0.12% (4) data - 0.12% (4) something - 0.12% (4) malware - 0.12% (4) try - 0.12% (4) owner - 0.12% (4) people - 0.12% (4) rest - 0.12% (4) well - 0.12% (4) questions - 0.12% (4) terminal - 0.12% (4) good - 0.12% (4) it’ll - 0.12% (4) window - 0.12% (4) particular - 0.12% (4) given - 0.12% (4) address - 0.12% (4) recent - 0.09% (3) aware - 0.09% (3) working - 0.09% (3) folder4 - 0.09% (3) enumerate - 0.09% (3) name. - 0.09% (3) spot - 0.09% (3) install - 0.09% (3) ownership - 0.09% (3) folder, - 0.09% (3) files. - 0.09% (3) drive - 0.09% (3) kit - 0.09% (3) lets - 0.09% (3) variant - 0.09% (3) first - 0.09% (3) hta - 0.09% (3) tips: - 0.09% (3) and, - 0.09% (3) server. - 0.09% (3) response - 0.09% (3) profiles - 0.09% (3) down - 0.09% (3) running - 0.09% (3) dangitbobby.ps1 - 0.09% (3) provide - 0.09% (3) username - 0.09% (3) system - 0.09% (3) setting - 0.09% (3) \\domain\dfs\folder1\folder2\folder3 - 0.09% (3) simply - 0.09% (3) application - 0.09% (3) simple - 0.09% (3) media - 0.09% (3) member - 0.09% (3) group. - 0.09% (3) case - 0.09% (3) now, - 0.09% (3) (advanced) - 0.09% (3) botnet - 0.09% (3) clean - 0.09% (3) future. - 0.09% (3) policies - 0.09% (3) using - 0.09% (3) break - 0.09% (3) task - 0.09% (3) while - 0.09% (3) needed - 0.09% (3) elevate - 0.09% (3) group: - 0.09% (3) either - 0.09% (3) degree - 0.09% (3) those - 0.09% (3) each - 0.09% (3) feel - 0.09% (3) this. - 0.09% (3) got - 0.09% (3) computers - 0.09% (3) ears, - 0.09% (3) organizations - 0.09% (3) same - 0.09% (3) skills, - 0.09% (3) count - 0.09% (3) whole - 0.09% (3) looking - 0.09% (3) world - 0.09% (3) area - 0.09% (3) giving - 0.09% (3) around - 0.09% (3) i’ve - 0.09% (3) someone - 0.09% (3) one. - 0.09% (3) one, - 0.09% (3) us. - 0.09% (3) show - 0.09% (3) money - 0.09% (3) you. - 0.09% (3) spend - 0.09% (3) help - 0.09% (3) piece - 0.09% (3) direct - 0.09% (3) [dot] - 0.09% (3) allow - 0.09% (3) important - 0.09% (3) understand - 0.09% (3) much - 0.09% (3) before - 0.09% (3) bad - 0.09% (3) “i - 0.09% (3) windows - 0.09% (3) nor - 0.09% (3) isn’t - 0.09% (3) major - 0.06% (2) now. - 0.06% (2) ransomware, - 0.06% (2) botnet, - 0.06% (2) millions - 0.06% (2) confidence - 0.06% (2) story. - 0.06% (2) new - 0.06% (2) away - 0.06% (2) best - 0.06% (2) permissions. - 0.06% (2) since - 0.06% (2) maintained - 0.06% (2) resume, - 0.06% (2) spot. - 0.06% (2) active - 0.06% (2) minute - 0.06% (2) keep - 0.06% (2) us, - 0.06% (2) know, - 0.06% (2) here, - 0.06% (2) puts - 0.06% (2) both - 0.06% (2) doing - 0.06% (2) head - 0.06% (2) later - 0.06% (2) time, - 0.06% (2) hoping - 0.06% (2) usually - 0.06% (2) actual - 0.06% (2) gives - 0.06% (2) control. - 0.06% (2) started - 0.06% (2) path - 0.06% (2) relevant - 0.06% (2) backups. - 0.06% (2) certifications - 0.06% (2) be, - 0.06% (2) reality - 0.06% (2) hand, - 0.06% (2) command - 0.06% (2) cryptolocker - 0.06% (2) origin - 0.06% (2) “warm - 0.06% (2) well. - 0.06% (2) fsrm - 0.06% (2) unlimited - 0.06% (2) versioned - 0.06% (2) april - 0.06% (2) hired - 0.06% (2) 2017 - 0.06% (2) theme - 0.06% (2) powered - 0.06% (2) certs - 0.06% (2) i'm - 0.06% (2) rate, - 0.06% (2) degree. - 0.06% (2) sight. - 0.06% (2) up, - 0.06% (2) fuzzies” - 0.06% (2) warmth - 0.06% (2) scheduled - 0.06% (2) step - 0.06% (2) files, - 0.06% (2) admin - 0.06% (2) avoid - 0.06% (2) can’t - 0.06% (2) manager? - 0.06% (2) lay - 0.06% (2) locky - 0.06% (2) wnetopenenum() - 0.06% (2) years, - 0.06% (2) sell - 0.06% (2) candidates - 0.06% (2) vector - 0.06% (2) zip - 0.06% (2) fuzziness - 0.06% (2) .doc - 0.06% (2) favor - 0.06% (2) cannot - 0.06% (2) blocking - 0.06% (2) advancement - 0.06% (2) infection. - 0.06% (2) effectively - 0.06% (2) done. - 0.06% (2) shares. - 0.06% (2) latest - 0.06% (2) printer - 0.06% (2) bit - 0.06% (2) plan - 0.06% (2) might - 0.06% (2) professionals - 0.06% (2) speeches - 0.06% (2) else - 0.06% (2) never - 0.06% (2) acl_folder1-folder2-folder3_traverse - 0.06% (2) honest, - 0.06% (2) won’t - 0.06% (2) entirely - 0.06% (2) email - 0.06% (2) prevent - 0.06% (2) approach - 0.06% (2) blacklist - 0.06% (2) problem - 0.06% (2) speaking - 0.06% (2) public - 0.06% (2) career - 0.06% (2) whitelist - 0.06% (2) viruses - 0.06% (2) software - 0.06% (2) restriction - 0.06% (2) doesn’t - 0.06% (2) manifest - 0.06% (2) issues - 0.06% (2) off. - 0.06% (2) though - 0.06% (2) knock - 0.06% (2) making - 0.06% (2) rational, - 0.06% (2) nested - 0.06% (2) traversal - 0.06% (2) grandchild - 0.06% (2) subfolders - 0.06% (2) abe-enabled - 0.06% (2) \\domain\dfs\folder1\folder2\folder4 - 0.06% (2) handle - 0.06% (2) context - 0.06% (2) actions - 0.06% (2) reliability. - 0.06% (2) level - 0.06% (2) should - 0.06% (2) past, - 0.06% (2) tend - 0.06% (2) mistakes, - 0.06% (2) they’re - 0.06% (2) it, - 0.06% (2) folder2: - 0.06% (2)$300 - 0.06% (2)
nothing - 0.06% (2)
it. - 0.06% (2)
sure - 0.06% (2)
would’ve - 0.06% (2)
multiple - 0.06% (2)
knowledge - 0.06% (2)
check - 0.06% (2)
mac - 0.06% (2)
logged - 0.06% (2)
middle - 0.06% (2)
enter - 0.06% (2)
bobby, - 0.06% (2)
workstation - 0.06% (2)
choose - 0.06% (2)
last - 0.06% (2)
style - 0.06% (2)
via - 0.06% (2)
services, - 0.06% (2)
having - 0.06% (2)
emptying - 0.06% (2)
folders. - 0.06% (2)
hope - 0.06% (2)
areas - 0.06% (2)
programmatically - 0.06% (2)
leaving - 0.06% (2)
dishonest - 0.06% (2)
human - 0.06% (2)
settings - 0.06% (2)
these - 0.06% (2)
.js, - 0.06% (2)
internet - 0.06% (2)
interaction - 0.06% (2)
guys - 0.06% (2)
vision - 0.06% (2)
variants - 0.06% (2)
.hta - 0.06% (2)
comes - 0.06% (2)
needs - 0.06% (2)
particularly - 0.06% (2)
nobody - 0.06% (2)
predecessor - 0.06% (2)
huge - 0.06% (2)
knows - 0.06% (2)
do. - 0.06% (2)
non-technical - 0.06% (2)
end-user - 0.06% (2)
stuff. - 0.06% (2)
they’ll - 0.06% (2)
quizmaster - 0.06% (2)
in the - 0.44% (15)
this folder - 0.35% (12)
that you - 0.3% (10)
<– usera - 0.27% (9)
it’s a - 0.27% (9)
to change - 0.27% (9)
on the - 0.24% (8)
you can - 0.24% (8)
of the - 0.24% (8)
going to - 0.24% (8)
this folder. - 0.21% (7)
on this - 0.21% (7)
to the - 0.21% (7)
usera has - 0.21% (7)
change the - 0.21% (7)
the default - 0.21% (7)
what you - 0.18% (6)
this is - 0.18% (6)
folder. \\domain\dfs\folder1\folder2 - 0.18% (6)
default behavior - 0.18% (6)
have a - 0.18% (6)
if the - 0.18% (6)
and the - 0.18% (6)
behavior of - 0.18% (6)
is the - 0.15% (5)
file extensions. - 0.15% (5)
when i - 0.15% (5)
you to - 0.15% (5)
privileges on - 0.15% (5)
has no - 0.15% (5)
if you’re - 0.15% (5)
to get - 0.15% (5)
potentially malicious - 0.15% (5)
of potentially - 0.15% (5)
gpo to - 0.15% (5)
use gpo - 0.15% (5)
malicious file - 0.15% (5)
no privileges - 0.15% (5)
the mistake - 0.12% (4)
as the - 0.12% (4)
can be - 0.12% (4)
ntfs permissions - 0.12% (4)
soft skills - 0.12% (4)
have to - 0.12% (4)
what a - 0.12% (4)
the acl - 0.12% (4)
with you - 0.12% (4)
as well - 0.12% (4)
i have - 0.12% (4)
full control - 0.12% (4)
and it - 0.12% (4)
what the - 0.12% (4)
share permission - 0.12% (4)
need to - 0.12% (4)
they do - 0.12% (4)
rather than - 0.12% (4)
security group - 0.12% (4)
able to - 0.12% (4)
user profiles - 0.09% (3)
the temp - 0.09% (3)
fix the - 0.09% (3)
all user - 0.09% (3)
some of - 0.09% (3)
to fix - 0.09% (3)
for all - 0.09% (3)
terminal server. - 0.09% (3)
to open - 0.09% (3)
the most - 0.09% (3)
folder only - 0.09% (3)
acl group: - 0.09% (3)
–> this - 0.09% (3)
acl on - 0.09% (3)
folder. \\domain\dfs\folder1\folder2\folder3 - 0.09% (3)
create the - 0.09% (3)
way to - 0.09% (3)
what i - 0.09% (3)
only a - 0.09% (3)
given only - 0.09% (3)
that is - 0.09% (3)
goes to - 0.09% (3)
they were - 0.09% (3)
because the - 0.09% (3)
bluesoul [dot] - 0.09% (3)
can modify - 0.09% (3)
a little - 0.09% (3)
and money - 0.09% (3)
temp folder - 0.09% (3)
i must - 0.09% (3)
want to - 0.09% (3)
you are - 0.09% (3)
you’re not - 0.09% (3)
the same - 0.09% (3)
you know - 0.09% (3)
with the - 0.09% (3)
remotely disable - 0.09% (3)
there’s a - 0.09% (3)
the end - 0.09% (3)
you’re going - 0.09% (3)
the security - 0.09% (3)
to have - 0.09% (3)
out of - 0.09% (3)
work with - 0.09% (3)
would be - 0.09% (3)
thing a - 0.09% (3)
than a - 0.09% (3)
a user - 0.09% (3)
comfortable with - 0.09% (3)
quick tips: - 0.09% (3)
to getting - 0.09% (3)
you don’t - 0.09% (3)
don’t know - 0.09% (3)
ransomware is - 0.09% (3)
on use - 0.09% (3)
share permissions - 0.09% (3)
a terminal - 0.09% (3)
that if - 0.09% (3)
[dot] me - 0.09% (3)
ability to - 0.09% (3)
lot of - 0.09% (3)
a member - 0.09% (3)
restriction policies - 0.06% (2)
folder3 traverse - 0.06% (2)
windows server - 0.06% (2)
and what - 0.06% (2)
folder2: acl_folder1-folder2_traverse - 0.06% (2)
to disable - 0.06% (2)
programmatically emptying - 0.06% (2)
folder for - 0.06% (2)
profiles in - 0.06% (2)
from a - 0.06% (2)
needed to - 0.06% (2)
on ransomware - 0.06% (2)
dangitbobby.ps1 – - 0.06% (2)
control of - 0.06% (2)
the vector - 0.06% (2)
tips: programmatically - 0.06% (2)
emptying the - 0.06% (2)
don’t have - 0.06% (2)
i don’t - 0.06% (2)
and let - 0.06% (2)
which one - 0.06% (2)
to work - 0.06% (2)
and do - 0.06% (2)
have you - 0.06% (2)
run on - 0.06% (2)
this was - 0.06% (2)
file server - 0.06% (2)
ntfs permissions. - 0.06% (2)
full control. - 0.06% (2)
you choose - 0.06% (2)
ransomware in - 0.06% (2)
they can - 0.06% (2)
– remotely - 0.06% (2)
disable a - 0.06% (2)
open in - 0.06% (2)
of infection. - 0.06% (2)
vector of - 0.06% (2)
ownership of - 0.06% (2)
nic given - 0.06% (2)
hit the - 0.06% (2)
down with - 0.06% (2)
the first - 0.06% (2)
of what - 0.06% (2)
that this - 0.06% (2)
and you - 0.06% (2)
the latest - 0.06% (2)
the middle - 0.06% (2)
the problem - 0.06% (2)
grandchild folders. - 0.06% (2)
that they - 0.06% (2)
but the - 0.06% (2)
they know - 0.06% (2)
they have - 0.06% (2)
off the - 0.06% (2)
do the - 0.06% (2)
security groups - 0.06% (2)
set up - 0.06% (2)
me, and - 0.06% (2)
you in - 0.06% (2)
knows what - 0.06% (2)
nobody here - 0.06% (2)
you’ve got - 0.06% (2)
may as - 0.06% (2)
well be - 0.06% (2)
position is - 0.06% (2)
here knows - 0.06% (2)
i’m a - 0.06% (2)
this position - 0.06% (2)
is nobody - 0.06% (2)
i’m going - 0.06% (2)
and fuzzies” - 0.06% (2)
and fuzziness - 0.06% (2)
one of - 0.06% (2)
things that - 0.06% (2)
it’s the - 0.06% (2)
the degree. - 0.06% (2)
piece to - 0.06% (2)
most important - 0.06% (2)
getting hired - 0.06% (2)
isn’t the - 0.06% (2)
certs or - 0.06% (2)
they aren’t - 0.06% (2)
soft skills, - 0.06% (2)
or that - 0.06% (2)
interview. if - 0.06% (2)
the spot. - 0.06% (2)
and group - 0.06% (2)
the best - 0.06% (2)
few things - 0.06% (2)
tell you - 0.06% (2)
goes into - 0.06% (2)
“warm and - 0.06% (2)
technical manager? - 0.06% (2)
feel comfortable - 0.06% (2)
human interaction - 0.06% (2)
access this - 0.06% (2)
usera can - 0.06% (2)
\\domain\dfs\folder1\folder2\folder3 <– - 0.06% (2)
to this - 0.06% (2)
folder, subfolders - 0.06% (2)
\\domain\dfs\folder1\ <– - 0.06% (2)
to abe-enabled - 0.06% (2)
warmth and - 0.06% (2)
more than - 0.06% (2)
nested traversal - 0.06% (2)
groups to - 0.06% (2)
allow access - 0.06% (2)
and files. - 0.06% (2)
\\domain\dfs\folder1\folder2\folder4 <– - 0.06% (2)
has modify - 0.06% (2)
\\domain\dfs\folder1\folder2 <– - 0.06% (2)
this folder, - 0.06% (2)
subfolders and - 0.06% (2)
the folder3 - 0.06% (2)
can access - 0.06% (2)
acl_folder1-folder2_traverse –> - 0.06% (2)
have been - 0.06% (2)
a good - 0.06% (2)
make usera - 0.06% (2)
on folder2: - 0.06% (2)
but not - 0.06% (2)
rational and - 0.06% (2)
\$300 on - 0.06% (2)
do more - 0.06% (2)
of people - 0.06% (2)
giving speeches - 0.06% (2)
the long - 0.06% (2)
in. in - 0.06% (2)
don’t need - 0.06% (2)
are not - 0.06% (2)
the whole - 0.06% (2)
vision of - 0.06% (2)
must feel - 0.06% (2)
but that’s - 0.06% (2)
an interview. - 0.06% (2)
but it - 0.06% (2)
up with - 0.06% (2)
there are - 0.06% (2)
comfortable around - 0.06% (2)
manager? i - 0.06% (2)
around someone - 0.06% (2)
it goes - 0.06% (2)
you won’t - 0.06% (2)
traverse group - 0.06% (2)
change the default - 0.21% (7)
<– usera has - 0.21% (7)
this folder. \\domain\dfs\folder1\folder2 - 0.18% (6)
the default behavior - 0.18% (6)
to change the - 0.18% (6)
default behavior of - 0.18% (6)
of potentially malicious - 0.15% (5)
potentially malicious file - 0.15% (5)
has no privileges - 0.15% (5)
no privileges on - 0.15% (5)
on this folder. - 0.15% (5)
gpo to change - 0.15% (5)
use gpo to - 0.15% (5)
malicious file extensions. - 0.15% (5)
behavior of potentially - 0.15% (5)
this folder only - 0.09% (3)
bluesoul [dot] me - 0.09% (3)
this folder. \\domain\dfs\folder1\folder2\folder3 - 0.09% (3)
ransomware is the - 0.09% (3)
the (advanced) acl - 0.09% (3)
create the acl - 0.09% (3)
is the future. - 0.09% (3)
for all user - 0.09% (3)
on use gpo - 0.09% (3)
all user profiles - 0.09% (3)
(advanced) acl on - 0.09% (3)
read –> this - 0.09% (3)
the temp folder - 0.09% (3)
–> read –> - 0.09% (3)
some of it - 0.09% (3)
to fix the - 0.09% (3)
you’re going to - 0.09% (3)
they don’t know - 0.09% (3)
traversal groups to - 0.06% (2)
profiles in a - 0.06% (2)
a few things - 0.06% (2)
on the spot. - 0.06% (2)
tips: programmatically emptying - 0.06% (2)
to open in - 0.06% (2)
answer would be - 0.06% (2)
ip address is - 0.06% (2)
remotely disable a - 0.06% (2)
nic given only - 0.06% (2)
which one to - 0.06% (2)
let you choose - 0.06% (2)
tell you to - 0.06% (2)
in a terminal - 0.06% (2)
degree. it’s the - 0.06% (2)
certs or the - 0.06% (2)
hired isn’t the - 0.06% (2)
the most important - 0.06% (2)
piece to getting - 0.06% (2)
temp folder for - 0.06% (2)
programmatically emptying the - 0.06% (2)
“warm and fuzzies” - 0.06% (2)
warmth and fuzziness - 0.06% (2)
dangitbobby.ps1 – remotely - 0.06% (2)
disable a nic - 0.06% (2)
given only a - 0.06% (2)
abe-enabled grandchild folders. - 0.06% (2)
be able to - 0.06% (2)
need to fix - 0.06% (2)
this folder, subfolders - 0.06% (2)
acl group: acl_folder1-folder2_traverse - 0.06% (2)
on folder2: acl_folder1-folder2_traverse - 0.06% (2)
must feel comfortable - 0.06% (2)
usera can access - 0.06% (2)
to abe-enabled grandchild - 0.06% (2)
in an interview. - 0.06% (2)
in the long - 0.06% (2)
if they aren’t - 0.06% (2)
your warmth and - 0.06% (2)
to allow access - 0.06% (2)
nested traversal groups - 0.06% (2)
as well be - 0.06% (2)
here knows what - 0.06% (2)
the folder3 traverse - 0.06% (2)
knows what you - 0.06% (2)
a member of - 0.06% (2)
is nobody here - 0.06% (2)
comfortable with you - 0.06% (2)
folder2: acl_folder1-folder2_traverse –> - 0.06% (2)
subfolders and files. - 0.06% (2)
\\domain\dfs\folder1\folder2\folder4 <– usera - 0.06% (2)
access this folder. - 0.06% (2)
<– usera can - 0.06% (2)
\\domain\dfs\folder1\folder2 <– usera - 0.06% (2)
position is nobody - 0.06% (2)
\\domain\dfs\folder1\folder2\folder3 <– usera - 0.06% (2)