September 2016
M T W T F S S
 1234
567891011
12131415161718
19202122232425
2627282930  

Categories

September 2016
M T W T F S S
 1234
567891011
12131415161718
19202122232425
2627282930  

How to force HTTPS behind AWS ELB

How to force HTTPS behind AWS ELB

In the most common configurations, when running your web app behind Nginx or Apache, your https:// request will get redirected to http://. Sometimes, you may want to rewrite all HTTP requests to HTTPS.

The Amazon Elastic Load Balancer (ELB) supports a HTTP header called X-FORWARDED-PROTO. All the HTTPS […]

A fatal flaw in TCP on Linux hijacks HTTPS connections. Here is the fix

A fatal flaw in TCP on Linux hijacks HTTPS connections. Here is the fix

If you are running Linux kernel 3.6 or newer, anyone in the world on a network that allows IP spoofing can hijack your encrypted communications in less than a minute, with a success rate of 90%.

Here is how to […]

update your Linux kernel from 3.1 to 4.7.2-1

Update Your Linux Kernel in Place (Running CentOS 7 or Above)

If you started an instance from the official CentOS AMI on AWS, you are running kernel 3.1 as of this writing, while you could easily take advantage of improved security features of newer kernels that are already available in a stable release. Here […]

Postfix With smtpd Access Restrictions

Anti-Spam Defense: Using Postfix With smtpd Access Restrictions

Fighting spam, aren’t we all… To stem the tide of unwanted junk mail look no further than the built-in access restrictions in Postfix.

If you find yourself the postmaster-in-chief, the last think you want is having to rely on your users to weed through spam and […]

Hyper-V Replica in Windows Server 2012 R2

the top 8 improvements done to Hyper-V Replica in Windows Server 2012 R2. We will be diving deep into each of these features in the coming weeks through blog posts and TechNet articles.

Seamless Upgrade

You can upgrade from Windows Server 2012 to Windows Server 2012 R2 without having to re-IR your protected VMs. With […]

Requirements for Active Directory Recycle Bin

Requirements for Active Directory Recycle Bin

Active Directory Domain Services environment

Do the following before you enable Active Directory Recycle Bin in an Active Directory Domain Services (AD DS) environment: • Run Adprep to update your Active Directory schema with the necessary Active Directory Recycle Bin attributes. Membership in the Schema Admins group is the […]

System Center 2012 R2

System Center 2012 R2 adds some new capabilities and changes to Operations Manager. These include: •Fabric Monitoring: Closer integration with Virtual Machine Manager. The Virtual Machine Manager R2 management pack introduces cloud monitoring of virtual layers for private cloud environments. The Fabric Health Dashboard provides a detailed overview of the health of your private clouds […]

wbadmin , ntdsutil

wbadmin: Enables you to back up and restore your operating system, volumes, files, folders, and applications from a command prompt.

ntdsutil: Ntdsutil.exe is a command-line tool that provides management facilities for Active Directory Domain Services (AD DS) and Active Directory Lightweight Directory Services (AD LDS). You can use the ntdsutil commands to perform database […]

Cluster-Aware Updating Overview

CAU is an automated feature that enables you to update clustered servers with little or no loss of availability during the update process. During an Updating Run, CAU transparently performs the following tasks: • Puts each node of the cluster into node maintenance mode • Moves the clustered roles off the node • Installs the […]

Deploy an Active Directory-Detached Cluster

To deploy an Active Directory-detached cluster, you must use Windows PowerShell. You cannot use Failover Cluster Manager. To create the failover cluster, start Windows PowerShell as an administrator, and then use the New-Cluster cmdlet with the –AdministrativeAccessPoint parameter set to a value of DNS.

In Windows Server 2012 R2, you can deploy a failover cluster […]