X

Operating Systems

Hardening your PI: SSHD protection

Steps to take to protect an internet-facing Raspberry PI (or other Debian) from brute-force SSH logins from subnets Note: Fail2ban…

Recovering NTFS inheritance

A little time ago, my (admin) user in Windows 10 was so badly damaged, that I had to re-create it.…

Zabbix monitoring

What is Zabbix monitoring? Zabbix is an enterprise-class open source distributed monitoring solution. Zabbix is software that monitors numerous parameters…

Managing Windows features using RSAT

One of the more useful Windows features for Windows administrators is the Remote Server Administration Tools pack (RSAT). Apart from…

Enable server 2012R2 disk performance counters

Today I was viewing the performance statistics in task manager on Server 2012 R2, and noticed that disk performance is not…

Powershell: Get an indented process tree

In PowerShell, there is the Get-Process cmdlet. However, this does not return the ParentProcessId property, so it is unsuitable for…

Reading the Windows Registry from PowerShell

Reading the Windows registry from PowerShell can be a bit cumbersome, when all you wanted to retrieve is the value…

Fail2Ban setup on CentOS 7

I setup a CentOS 7 server recently, that regrettably needs open SSH to the outside world. As I don't dabble…

Setting up a firewall in Ubuntu

By far the most popular and easy to setup firewall for Ubuntu is UFW, which stands for the 'Uncomplicated FireWall'.…

Ubuntu 14.04 and up: Rename a volume group containing root

When checking my cloned Ubuntu 14.04 LTS VM, I noticed that it still contained the volume group name from the…

This website uses cookies.