Set application settings in IIS through PowerShell March 20, 2017, 2:20 p.m.

  1. Open IIS
  2. Click on the site you want to target.
  3. Open Configuration Editor
  4. Make the change
  5. Then click "Generate Script" on the top right.
sysadmin windows web

Group Policy Processing March 15, 2017, 11:46 a.m.

The local Group Policy object is always processed, followed by GPO. Site first, domain next, and OU last, including any nested OUs, from parent to child. The Block policy inheritance or No Override options can affect the presence or absence of Group Policy objects in the list of Group Policy objects to be processed, but cannot change their order. Computer policy is processed at startup and then user policy is processed when the user logs on. If user and computer policy settings specify different behavior, the computer policy will generally prevail.

active directory sysadmin

Disable Scroll Jacking March 15, 2017, 9:50 a.m.

Make scrolling bearable again by disabling scroll jacking across the web.

chrome plugin

Disable HTML5 Autoplay March 15, 2017, 9:50 a.m.

Disable HTML5 Autoplay disables HTML5 audio and video autoplaying.

chrome plugin

h264ify March 15, 2017, 9:49 a.m.

By default, YouTube streams VP8/VP9 encoded video. However, this can cause problems with less powerful machines because VP8/VP9 is not typically hardware accelerated. h264ify makes YouTube stream H.264 videos instead of VP8/VP9 videos.

chrome plugin

Don't Fuck With Paste March 15, 2017, 9:45 a.m.

Prevents the blocking of copying from & pasting into input fields

chrome plugin

RightToCopy March 15, 2017, 9:45 a.m.

Enable right clicking, selecting, and copying text on pages that prevent these features. Also, prevent clipboard text injection.

chrome plugin

Cat Facts API March 15, 2017, 9:06 a.m.

Fact: The average cat food meal is the equivalent to about five mice.

cats api

Slackmojis March 14, 2017, 9:01 a.m.

Custom Slack Emojis 🌮

emoji free

Well-known security identifiers in Windows operating systems March 9, 2017, 10:09 a.m.

A security identifier (SID) is a unique value of variable length that is used to identify a security principal or security group in Windows operating systems. Well-known SIDs are a group of SIDs that identify generic users or generic groups. Their values remain constant across all operating systems.

windows sysadmin

Japanese style Faces March 8, 2017, 1:28 p.m.

щ(゚Д゚щ)

wtf

Figure.NZ March 8, 2017, 11:06 a.m.

Figure.NZ sources data from other organisations, including corporations, public repositories, government departments and academics. We import that data into a powerful open source database, we carefully validate it and standardise it. We then make the data available in a series of standardised forms, both human and machine-readable, with rich metadata about the sources, licensing and datatypes.

api new zealand data tools

Simmonds Stewart Legal Templates March 8, 2017, 9:45 a.m.

Library of legal templates is available for use by business users, including legal services providers.

templates new zealand legal

Windows audit policy and best practices March 6, 2017, 4:43 p.m.

Windows Audit Policy is used to determine the amount of data logged by Windows security on domain controllers and other computers on the domain. These definitions were found to be most effective from both a best practice and compliance standpoint and are based on customer experience and recommendations from Microsoft.

active directory windows security

Best practice for Default Domain Policy and Default Domain Controllers Policy March 6, 2017, 4:33 p.m.

Microsoft has some good guidance on this topic, but it’s not always clearly and consistently stated. Here’s a quick Q&A that might help.

active directory windows sysadmin best practice

Create the Key Distribution Services KDS Root Key March 3, 2017, 8:10 a.m.

The domain controllers will wait up to 10 hours from time of creation to allow all domain controllers to converge their AD replication before allowing the creation of a Group Managed Service Account (gMSA). Workaround with Add-KdsRootKey –EffectiveTime ((get-date).addhours(-10)).

active directory windows

Strategies for reducing memory usage in Django migrations Feb. 25, 2017, 10:48 a.m.

This post is a collection of strategies for reducing memory usage during Django migrations.

django python

Image-to-Image Demo Feb. 24, 2017, 3:50 p.m.

The pix2pix model works by training on pairs of images such as building facade labels to building facades, and then attempts to generate the corresponding output image from any input image you give it.

programming cool

Reflections on Trusting Trust (pdf) Feb. 24, 2017, 3:28 p.m.

To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.

reading security

Active Directory Naming Contexts and Application Partitions Feb. 24, 2017, 3:09 p.m.

Think of a domain as a big data partition, which is also referred to as a naming context. Only domain controllers that are authoritative for a domain need to replicate all of the information within that domain. Information about other domains is not needed on those domain controllers. On the other hand, there is some Active Directory data that must be replicated to all domain controllers within a forest.

active directory windows