DNSSec Explained!
DNSSec is yet neither widely deployed nor well understood, but there is already clear and present need for its use. Just like HTTPS, DNSSec is becoming more common, and will eventually become required. In this video tutorial I diagrammatically show how DNSSec works. We’ll look at DNS functionality, DNS referrals, spoofing and man-in-the-middle attacks, asymmetric […]
Posted in Instructional | Tags: DNSSec | 5 Comments
Columbus, Ohio’s Microsoft Dog Food Technical Conference 2015
Columbus’ annual Microsoft Dog Food Conference will be held October 7-8, 2015 at the Quest Center in Polaris on the outskirts of Columbus, OH. The Dog Food Conference is a two day event focused on Microsoft tools and technologies including ALM, Azure, SQL/BI, CRM, DevOps, Infrastructure, Mobile, .NET, Office 365, SharePoint, Windows, and more. There […]
Posted in Announcements | Tags: Columbus Ohio Microsoft Dog Food Technical Conference | Comments Off on Columbus, Ohio’s Microsoft Dog Food Technical Conference 2015
Building a 2-Tier, Offline-Root, Internal PKI with an IIS CDP on Microsoft Windows Server 2012 R2
It’s long overdue, but more and more applications, systems, and services are finally requiring PKI (Public Key Infrastructure). Sadly, however, any Google or Bing search on the subject will point you to sources that are incomplete, contradictory, or flat-out wrong. There just isn’t a lot of clear and concise information for administrators who are learning and implementing this […]
Posted in Instructional | Tags: Windows PKI | 1 Comment
RoboCopy Switches, Syntax, and Parameters
I know this is pretty basic, but the other day I just got plain sick and tired of not knowing the intricacies of the less commonly used RoboCopy switches, so I did a bunch of research and wrote up some notes. I hope this helps! RoboCopy Switches, Syntax, and Parameters
Posted in Instructional | Tags: RoboCopy switches | 2 Comments
Lima, Ohio’s LRITA Technical Conference 2015
The LRITA (Lima Regional IT Alliance) annual tech conference is scheduled for Thursday, April 16, 2015. It’s inexpensive ($10 for members, $20 for non-members), local (Ohio), and has a solid showing of vendors and technical presentations. At this year’s conference I will be giving a forty-five minute presentation on deploying PKI (Public Key Infrastructure) on […]
Posted in Announcements | Tags: Lima Ohio Technical Conference | Comments Off on Lima, Ohio’s LRITA Technical Conference 2015
Columbus, Ohio’s Microsoft Dog Food Technical Conference 2014
Columbus’ annual Microsoft Dog Food Conference is being held on September 29-30, 2014 in Columbus, OH (at the Quest Center in Polaris). You can learn more at: www.DogFoodCon.com #DogFoodCon
Posted in Announcements | Tags: Columbus Ohio Microsoft Dog Food Technical Conference | Comments Off on Columbus, Ohio’s Microsoft Dog Food Technical Conference 2014
Delete Old Accounts (Computer or User) with PowerShell
Over the years I’ve found a lot of VBS and PSh scripts that handle old Windows computer or user accounts, but none of them seem to do it quite right. This script uses LastLogonTimeStamp and PWDLastSet together (but not LastLogon), and it gives the administrator the ability to list, disable, move, and/or delete the old […]
Posted in Instructional | Tags: delete accounts with PowerShell | Comments Off on Delete Old Accounts (Computer or User) with PowerShell
‘Getting Naked’ by Patrick Lencioni
The book ‘Getting Naked’ by Patrick Lencioni shows by example how to be an honest, honorable, helpful, and effective consultant. It’s not only a guide for ethical professional conduct, it also shows how to be truly free in all of life’s endeavors. I cannot recommend this book strongly enough, I wish everyone would read it, […]
Posted in Announcements | Tags: ethical consulting | Comments Off on ‘Getting Naked’ by Patrick Lencioni
Backup & Restore ADI DNS zones
I’ve found a lot of bad and/or incomplete information online on how to backup and restore Active Directory Integrated (ADI) DNS zones. The following PDF does a good job of explaining the supported method (authoritative restore via system state and NTDSUtil.exe), as well as pointing out the problems associated with a commonly discussed method (DNSCmd.exe). If you have […]
Posted in Instructional | Tags: backup dns zone | Comments Off on Backup & Restore ADI DNS zones
Writing Custom SCCM 2012 Reports
This PDF gives an overview for writing custom SCCM 2012 Reports. It covers: SQL Server Report Builder 3.0 creating a read-only database account for your reports data sources datasets SQL queries SCCM queries (WQL) that can be used to generate SQL queries report tables, and sorting report prompts Creating Custom SCCM 2012 Reports
Posted in Instructional | Tags: SCCM reports | Comments Off on Writing Custom SCCM 2012 Reports