By making the primary NTP server flag 0x9
, we made it Client 0x08
+ SpecialInterval 0x01
and as for the second NTP time server. By making the secondary NTP peer flag 0xa
, we made it 0x08 Client
+ 0x02 UseAsFallbackOnly
. On initial sync during service startup the polling interval time is zero which will not match the special polling interval that our 0x01
flag requires. This being the case w32time
will use the Fallback server as its primary choice until the special polling interval arrives then it will use the intended primary server.
List of historical updates for Windows Server 2016. Updates are cumulative and include all previous updates.
windows windows 10 windows server 2016 securityThis system, which we revised in December 2011 based on customer feedback, is intended to help our customers decide which updates they should apply under their particular circumstances, and how rapidly they need to take action.
windows sysadmin securityRRDtool refers to Round Robin Database tool. Round robin is a technique that works with a fixed amount of data, and a pointer to the current element. Think of a circle with some dots plotted on the edge. These dots are the places where data can be stored. Draw an arrow from the center of the circle to one of the dots; this is the pointer. When the current data is read or written, the pointer moves to the next element. As we are on a circle there is neither a beginning nor an end, you can go on and on and on. After a while, all the available places will be used and the process automatically reuses old locations.
tutorial sysadmin networking rrdtoolRRDtool is a graphing utility made by Tobi Oetiker that takes data sets you collect and graphs them. RRDtool (acronym for round-robin database tool) correlates time-series data like network bandwidth, temperatures, CPU load or any other data type. Data is stored in a round-robin database (circular buffer) which allows the system storage footprint to remain constant over time. The database will always have the same amount of data points throughout its lifetime. When new data comes in the oldest data set is removed.
tutorial sysadmin rrdtoolPython's strftime directives, built automatically from the Python strftime docs.
documentation cheatsheet pythonThe idea here is to recreate the title sequence from The Naked Gun movies using randomly generated gifs which have been tagged on giphy.com as Dashcam or GoPro.
gifs b3ta funnyHTTPSWatch tracks the HTTPS support of prominent websites.
security new zealandEach AWS service can provide actions and condition context keys for use in IAM policies. Not all API actions defined by a service can be used in an IAM policy, and a service might define some permissions that don't directly correspond to an API action. Use this list to determine which actions can be used as permissions in an IAM policy.
documentation awsSmart LED controllers with integrated USB firmware. BlinkStick brings colourful notifications to your computer and wide range programming language implementations give you the power to control LEDs without the need to program a microcontroller.
automation diy hardwareThis function is a piece of PSWindowsUpdate module to manage Windows Update on a computer system running Windows. Whole module contain set of functions to check, download and install updates from PowerShell.
windows powershell securityFor Windows Server 2016 installations, a security update arrives first, followed by a quality update a couple of weeks later. Cumulative updates with new security fixes arrive on the second Tuesday of each month ("patch Tuesday"). Cumulative updates with new quality fixes arrive on the fourth Tuesday of each month. Windows Server 2016 updates first arrive as "optional" updates, but they later become "recommended" updates after two weeks.
security sysadmin windows windows server 2016Provides a web interface to CVE vulnerability data. You can browse for vendors, products and versions and view CVE entries, vulnerabilities, related to them. You can view statistics about vendors, products and versions of products, and create custom RSS feeds and widgets.
securityPermissions in Active Directory are defined by so-called security descriptors, which are stored as properties directly in the AD objects.
active directory sysadminUnder certain constrained circumstances, disabling User Account Control (UAC) on Windows Server can be an acceptable and recommended practice.
security sysadmin windowsAmazon EC2 Systems Manager is a collection of capabilities that helps you automate management tasks such as collecting system inventory, applying operating system patches, automating the creation of Amazon Machine Images (AMIs), and configuring operating systems and applications at scale. Systems Manager lets you remotely and securely manage the configuration of your managed instances. A managed instance is any Amazon EC2 instance or on-premises machine in your hybrid environment that has been configured for Systems Manager.
devops pdf awsFrom time to time you may want to delegate control of an AD security group to an unprivileged user. The group manager property is an LDAP property on the group object that contains the Distinguished Name of a given user account. The checkbox that allows the group manager to modify who is a member of this group is not an LDAP property with a boolean type, that would be too simple and not line up with the Microsoft security management methodology. It's implemented as an Access Control Entry (ACE) in the objects Discretionary Access Control Li (DACL). Think of it like the permissions when looking at the Security tab for a file. These can be manipulated programatically.
active directory windows sysadminConvert epoch to human readable date and vice versa. The Unix epoch (or Unix time or POSIX time or Unix timestamp) is the number of seconds that have elapsed since January 1, 1970 (midnight UTC/GMT), not counting leap seconds.
unix programming toolsVulgar is a constructed language (conlang) generator for fantasy fiction writing that creates unique and usable constructed languages in the click of a button. Vulgar's output models the regularities, irregularities and quirks of real world languages; phonology, grammar, and a 2000 unique word vocabulary.
interesting