DNSSec Explained!

DNSSec is yet neither widely deployed nor well understood, but there is already clear and present need for its use. Just like HTTPS, DNSSec is becoming more common, and will eventually become required. In this video tutorial I diagrammatically show how DNSSec works. We’ll look at DNS functionality, DNS referrals, spoofing and man-in-the-middle attacks, asymmetric […]

Posted in Instructional | Tags: | 5 Comments

Columbus, Ohio’s Microsoft Dog Food Technical Conference 2015

Columbus’ annual Microsoft Dog Food Conference will be held October 7-8, 2015 at the Quest Center in Polaris on the outskirts of Columbus, OH. The Dog Food Conference is a two day event focused on Microsoft tools and technologies including ALM, Azure, SQL/BI, CRM, DevOps, Infrastructure, Mobile, .NET, Office 365, SharePoint, Windows, and more. There […]

Posted in Announcements | Tags: | Comments Off on Columbus, Ohio’s Microsoft Dog Food Technical Conference 2015

Building a 2-Tier, Offline-Root, Internal PKI with an IIS CDP on Microsoft Windows Server 2012 R2

It’s long overdue, but more and more applications, systems, and services are finally requiring PKI (Public Key Infrastructure). Sadly, however, any Google or Bing search on the subject will point you to sources that are incomplete, contradictory, or flat-out wrong. There just isn’t a lot of clear and concise information for administrators who are learning and implementing this […]

Posted in Instructional | Tags: | 1 Comment

RoboCopy Switches, Syntax, and Parameters

I know this is pretty basic, but the other day I just got plain sick and tired of not knowing the intricacies of the less commonly used RoboCopy switches, so I did a bunch of research and wrote up some notes. I hope this helps!   RoboCopy Switches, Syntax, and Parameters

Posted in Instructional | Tags: | 2 Comments

Lima, Ohio’s LRITA Technical Conference 2015

The LRITA (Lima Regional IT Alliance) annual tech conference is scheduled for Thursday, April 16, 2015. It’s inexpensive ($10 for members, $20 for non-members), local (Ohio), and has a solid showing of vendors and technical presentations. At this year’s conference I will be giving a forty-five minute presentation on deploying PKI (Public Key Infrastructure) on […]

Posted in Announcements | Tags: | Comments Off on Lima, Ohio’s LRITA Technical Conference 2015

Columbus, Ohio’s Microsoft Dog Food Technical Conference 2014

Columbus’ annual Microsoft Dog Food Conference is being held on September 29-30, 2014 in Columbus, OH (at the Quest Center in Polaris). You can learn more at: www.DogFoodCon.com #DogFoodCon      

Posted in Announcements | Tags: | Comments Off on Columbus, Ohio’s Microsoft Dog Food Technical Conference 2014

Delete Old Accounts (Computer or User) with PowerShell

Over the years I’ve found a lot of VBS and PSh scripts that handle old Windows computer or user accounts, but none of them seem to do it quite right. This script uses LastLogonTimeStamp and PWDLastSet together (but not LastLogon), and it gives the administrator the ability to list, disable, move, and/or delete the old […]

Posted in Instructional | Tags: | Comments Off on Delete Old Accounts (Computer or User) with PowerShell

‘Getting Naked’ by Patrick Lencioni

The book ‘Getting Naked’ by Patrick Lencioni shows by example how to be an honest, honorable, helpful, and effective consultant. It’s not only a guide for ethical professional conduct, it also shows how to be truly free in all of life’s endeavors. I cannot recommend this book strongly enough, I wish everyone would read it, […]

Posted in Announcements | Tags: | Comments Off on ‘Getting Naked’ by Patrick Lencioni

Backup & Restore ADI DNS zones

I’ve found a lot of bad and/or incomplete information online on how to backup and restore Active Directory Integrated (ADI) DNS zones. The following PDF does a good job of explaining the supported method (authoritative restore via system state and NTDSUtil.exe), as well as pointing out the problems associated with a commonly discussed method (DNSCmd.exe). If you have […]

Posted in Instructional | Tags: | Comments Off on Backup & Restore ADI DNS zones

Writing Custom SCCM 2012 Reports

This PDF gives an overview for writing custom SCCM 2012 Reports. It covers: SQL Server Report Builder 3.0 creating a read-only database account for your reports data sources datasets SQL queries SCCM queries (WQL) that can be used to generate SQL queries report tables, and sorting report prompts   Creating Custom SCCM 2012 Reports      

Posted in Instructional | Tags: | Comments Off on Writing Custom SCCM 2012 Reports