Category: Windows

Skillset Required as a 2021 Systems Administrator

Long were the days of a SysAdmin only requiring to know how to babysit server…

Troubleshooting Active Directory Replication Issues

How to Check Domain Controller Syncronization Check replication summary [TEST-DC02]: PS C:\Users\testadmin\Documents> Repadmin /replsummary Replication…

PowerShell: Mapping and Unmapping Network Drives

How to Map Network Drive using Dot Net Framework $driveLetter='T' $smbPath='\\FILESERVER\SHARENAME' $username='DOMAIN\USERNAME' $password='PASSWORD' $networkDrivesObject =…

R5 2400G Zen CPU Cores Undervolt and Overclocking

Some quick tested values: 3600 Mhz | 1.225 mV ~ 70 Watts (need to also…

MBR & GPT Disk Partitioning Comparisons

A quote one has provided to colleagues on this topic: Although speed is the same…

How to Become a DevOps Engineer in 2020

This note is scribbled up with about 5-minute of time. Thus, it may not have…

How To Disable Microsoft One Sync Service

OneSyncSvc is the parent object of OneSyncSvc_#####, and Sync Host_##### is the child's display name.…

How to Disable or Remove Windows Defender

Step 1: Disable Real-time monitoring immediately to minimize current runtime memory resource utilization Set-MpPreference -DisableRealtimeMonitoring…

Java Virtual Machine Optimal Memory Tuning

Overview: There are five available garbage collectors (GC) for Java Virtual Machines (JVM). Here are…

A Case for Graylog 4

Overview: A practical real-world application to aggregate logs would be Graylog. Its current incarnation is…

How to Calculate Logging Storage

The Simple Formula: Storage in Gigabytes = Number of Events x (Average Bytes per Event…

How to Overclock Computer CPU

Step 1:- Buy an overclock-able CPU such as the Intel Pentium G3258- Buy a good…

VMWare CVE-2018-3646 Mitigation

Enable ESXi Side-Channel-Aware Scheduler Version 2 (SCAv2) using ESXCLI SSH to an ESXi host or open a…

Windows Short-cut vs Symbolic Link vs Junction vs Hard Link

Although they behave similarly, there are fundamental differences between a short-cut (a Microsoft's implementation for…

How to Disable SELINUX on CentOS 8

SELinux is a sort of system-call firewall, where processes are in their run spaces. When…

Windows Firewall Block ICMP Ping

Following is a quick exercise in configuring Windows firewall to block certain protocols: # Disable…

How to Fix Duplicate Computer Account Names Issue in Active Directory

Automatic cleanup: # disableDuplicateComputers.ps1 # Version 0.0.1 $defaultPasswordPeriod=30 $disabledComputersReport='c:\disabledComputersReport.csv' function disableDuplicateComputers{ param( $lastLogonDaysExceeding=30, $disabledComputersReport='c:\disabledComputersReport.csv' )…

How to Create a New Jenkins Job to Call a PowerShell Script with Credentials

1. PowerShell & Secured Credentials Support Check for PowerShell support: Manage Jenkins > Plugin Manager…

How to Install & Configure Pihole on Ubuntu 20.04

1. Installation- Run these commands: # sudo apt-get install gamin -ysudo curl -sSL https://raw.githubusercontent.com/pi-hole/pi-hole/master/automated%20install/basic-install.sh |…

How to Block Distracting Sites Such as Youtube and Hulu on Your Home Network

Overview: - You send a voice command 'block youtube' to Alexa, an Amazon personal assistant…