Enter your email Address
Skip to content
70-412 Configure Advanced WinServer 2012/R2
70-411 Administering Win 2012/R2
System Center Configuration Manager(SCCM)
PowerShell and Batch scripting
Share this page :
We can Code it
Microsoft Server and Related exames
Networking, Cisco, Juniper, security
Hosting, database, Python, WordPress
Penetration test and defend
Releash the power of Penguin
There are enough fishes here~
Download a Resume
Install Openmanage on VMware Esxi
February 19, 2019
EnglishČeskyDanskDeutschEspañolSuomiFrançaisItaliano日本語한국어NederlandsNorskPolskiPortuguêsРусскийSvenskaTürkçe简体中文 5This article describes the installation process of OpenManage Server Administrator VIB (OMSA) on VMware ESXi 5.x and/or VMware ESXi 6.x. Table of Contents Download Dell OpenManage Server Administrator vSphere Installation Bundle (VIB) Upload VIB to Datastore Enable SSH VIB Installation Rebooting the Host OMSA Download and Installation for Windows (Optional) Collecting logs with SupportAssist...
Direct attached Storage (DAS)
February 6, 2019
Direct Attached Storage (DAS) is a storage that is in direct contact with an accessing computer. This kind of storage includes devices such as hard drives, external hard drives, and optical disk drives. The DAS Storage stays in the connection with one computer at a time. A standard DAS environment is built with data storage...
Unison File Synchronizer (network or local)
January 22, 2019
Installation Options The Makefile in the distribution includes several switches that can be used to control how Unison is built. Here are the most useful ones: Building with NATIVE=true uses the native-code OCaml compiler, yielding an executable that will run quite a bit faster. We use this for building distribution versions. Building with make DEBUGGING=true generates debugging symbols. Building with make STATIC=true generates...
Linux system config
December 10, 2018
Change your timezone # mv /etc/localtime /etc/localtime.backup # ln -s /usr/share/zoneinfo/Europe/Brussels /etc/localtime You need to substitute the lines in bold with your actual current timezone. That will change the timezone in the current session and should prevail upon reboots. To be absolutely certain, edit the file /etc/sysconfig/clock as well. That’s the file that will be read on boot the...
Transparently redirect root folder to a sub folder
December 10, 2018
Enable mod_rewrite Module The mod_rewrite module is enabled by default on CentOS 7. If you find it is not enabled on your server, you can enable it by editing 00-base.conf file located in /etc/httpd/conf.modules.d/ directory. sudo nano /etc/httpd/conf.modules.d/00-base.conf Add or uncomment the following line: LoadModule rewrite_module modules/mod_rewrite.so Save and close the file, then restart the...
Install LAMP ( Linux, Apache, Mysql (MariDB) , PHP)
November 27, 2018
Install LAMP would be the basic skill for a Linux admin. Step 1: Install Apache Server with Basic Configurations 1. After performing a minimal system installation and configure your server network interface with a Static IP Address on RHEL/CentOS 7.0, go ahead and install Apache 2.4 httpd service binary package provided form official repositories using...
October 25, 2018
LDAP stands for Lightweight Directory Access Protocol. As the name suggests, it is a lightweight protocol for accessing directory services, specifically X.500-based directory services. LDAP runs over TCP/IP or other connection oriented transfer services. LDAP is an IETF Standard Track protocol and is specified in “Lightweight Directory Access Protocol (LDAP) Technical Specification Road Map” RFC4510. The LDAP...
Slow or endless login to Terminal Server (TS)
October 19, 2018
Investigating the situation Sometimes the TS login process takes minutes instead of second to complete. The best point to start investigation is the debug log file. In order to start debugging create or modify the following registry value: Subkey: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon Entry: UserEnvDebugLevel Type: REG_DWORD Value data: 0x00030002 (Hexadecimal) This value gives the most verbose...
Encryption and Tunneling Techniques
October 18, 2018
Authentication can be performed in several different ways, including the following: ■ Something you know—Passwords ■ Something you have—Tokens, smart cards, and certifi cates ■ Something you are—Biometrics Password Authentication Password authentication typically fails for a number of reasons: The account holder loses control of the password; the password is weak, simple, and easy to guess; or the...
Enroll your mobile device to O365 MDM
October 18, 2018
Enroll iOS device with intune https://docs.microsoft.com/en-us/intune-user-help/using-your-ios-device-with-intune Enroll android device with intune https://docs.microsoft.com/en-us/intune-user-help/using-your-android-device-with-intune...
Wipe a mobile device in Office 365
October 18, 2018
You can use built-in mobile device management for Office 365 to do a selective wipe to remove only organizational information, or a full wipe to delete all information from a mobile device and restore it to its factory settings. What to know before you begin Full wipe: Deletes all data on a user’s...
Chapter 14 Managing Mailboxes and mailbox content
September 21, 2018
Move mailbox You must always use the 2013 EAC or the New-MoveRequest cmdlet to move mailboxes to, or between, Exchange Server 2013 mailboxes. Do not use the old Exchange Server 2007 Move-Mailbox cmdlet to do this. The process for moving mailboxes to Exchange Server 2010/2013 databases is significantly different than it was in earlier releases....
User Agent Strings
September 17, 2018
User Agent Strings User agent strings act as another method to fingerprint a client. These characteristics range from identifying the browser to the type of OS that it is running on. The user agent string is simply a line of text that is returned whenever your browser connects to a website. The user agent string is based on...
Nmap NSE scripts with examples
September 17, 2018
Information Gathering 1. DNS Brute Force Find sub-domains with this script. Detecting sub-domains associated with an organizations domain can reveal new targets when performing a security assessment. The discovered hosts may be virtual web hosts on a single web server or may be distinct hosts on IP addresses spread across the world in different data...
How to Detect NMAP Scan Using Snort
August 31, 2018
Today we are going to discuss how to Detect NMAP scan using Snort. Basically in this article we are testing Snort against NMAP various scan which will help network security analyst to setup snort rule in such a way so that they become aware of any kind of NMAP scanning. Requirement Attacker: Kali Linux (NMAP...
Snort – Basic
August 29, 2018
Components of Snort A Snort-based IDS consists of the following major components: • Packet Decoder • Preprocessors • Detection Engine • Logging and Alerting System • Output Modules You can see the components work with each other in below way: Packet Decoder The packet decoder takes packets from different types of network interfaces and...
August 29, 2018
Visual C++ 2005/2008 failed
August 22, 2018
Once i removed all the instances of Microsoft Visual C++ 2005/2008 Redistributable (x86)/(x64) ,re-registered msiexec.exe through the below command line options in command prompt. msiexec.exe -unreg msiexec.exe -regserver Restarted the computer and started the installation again...
Snort – Installation
August 15, 2018
Installation As of I write this page, the latest version is 126.96.36.199, so I will use this version as an example. you can find the latest method in following page: https://snort.org Option 1 Install from package yum install https://snort.org/downloads/snort/daq-2.0.6-1.f21.x86_64.rpm yum install https://snort.org/downloads/snort/snort-188.8.131.52-1.f25.x86_64.rpm Option 2 Install from Source Dependencies: sudo yum install -y zlib-devel libpcap-devel...
Snort dnet header error
August 5, 2018
ERROR! dnet header not found, go get it from http://code.google.com/p/libdnet/ or use the --with-dnet-* options, if you have it installed in an unusual place This may caused by both the manually installed libdnet and the one installed via the community , and then remove both (make uninstall and yum remove), re-instal libdnet...
Find the package name according to missing library in CentOS
August 5, 2018
Let’s say you found that bzlib.h is missing, you want to know which package provides it so you can install it from Yum command: sudo yum whatprovides */bzlib.h And then install that package From your comment the package name is bzip2-devel-1.0.6-3.fc15.i686, so do: sudo yum install bzip2-devel-1.0.6-3.fc15.i686...
July 6, 2018
Enumeration can best be defined as the process of counting.The purpose of this type of effort is to map the network and systems to find ways to further exploit it or set up a plan of attack. The overall goal is to reduce the amount of information available to attackers who attempt enumeration for malicious purpose. There are multiple...
Exchange daily administration jobs
June 14, 2018
Calendar access permision Add-mailboxfolderPermission -identity
:\calendar -user xxx -accessrights Set-MailboxFolderPermission Basically this means give user xxx to access the calendar of mailbox
Note that you may add permission entry by add-mailboxfolderPermission, to change the permission, use set-mailboxfolderPermission Required Parameters -AccessRights The AccessRights parameter specifies the permissions that you want to modify for the...
Detecting Live systems and analysing results
June 7, 2018
Tools: Nmap SuperScan, THC-Amap Nmap is explained in another article, please check here: https://frankfu.click/security/nmap.html SuperScan is pretty straight forward. THC-Amap is the final port-scanning tool discussed here. It was developed as a Linux-based port-scanning tool to overcome some problems that had previously plagued port scanners. Traditional scanning programs did not always grab banners effectively. As an example, some services,...
The quieter you become, the more you can hear !