This document contains method which can be used to elevate priviledges from a Windows Operating System which includes (Windows 7, Windows 8, Windows 10) All Versions
The Checklist will help to identify the weak areas on cloud Servers Cloud Assessment will harden the controls that are beyond the control of normal Users The mentioned controls are the baseline requirements of Cloud Security..