TinyJPG – Compress JPEG images intelligently July 4, 2018, 12:28 p.m.

TinyJPG reduces the file size of JPEG images. Every uploaded image is analyzed to apply the best possible JPEG encoding. Based on the content of your image an optimal strategy is chosen.

api free webdev tools

Should I leave now? We look at Auckland Traffic Data June 28, 2018, 9:04 a.m.

There is a linear relationship between the time you want to leave and how busy the traffic will be at the time. If you normally leave your house at 7am and you are planning to leave at 7.30am, this will add another 10 minutes to your total travel time. So, every half an hour is equivalent to 10 minutes additional travel time when getting into the city in the morning hours, and leaving the city in the afternoon.

auckland data

Post-Graduate AD Studies | Ask the Directory Services Team May 31, 2018, 5:31 p.m.

List of links to core documentation for all major AD components.

active directory windows

Report and Edit AD Site Links From PowerShell May 24, 2018, 10:30 a.m.

Optimising AD inter-site transport settings.

active directory powershell

A list of dumb (and not so dumb) things to check May 6, 2018, 8:09 p.m.

When you are debugging a problem for hours and hours, you suddenly realise, "I bet it's something really dumb!" It often is. Therefore, we present: a list of dumb (and not so dumb) things to check

troubleshooting

Simple Trouble Shooting Application Now Fixes Everything May 6, 2018, 8:09 p.m.

A massive checklist for trouble-shooting regular problems.

troubleshooting

Non-functional requirement - Wikipedia May 6, 2018, 8:08 p.m.

In systems engineering and requirements engineering, a non-functional requirement is a requirement that specifies criteria that can be used to judge the operation of a system, rather than specific behaviours. They are contrasted with functional requirements that define specific behaviour or functions.

troubleshooting

DNS requirements for installing Active Directory April 16, 2018, 2:44 p.m.

When you install Active Directory on a member server, the member server is promoted to a domain controller. Active Directory uses DNS as the location mechanism for domain controllers, enabling computers on the network to obtain IP addresses of domain controllers.

During the installation of Active Directory, the service (SRV) and address (A) resource records are dynamically registered in DNS, which are necessary for the successful functionality of the domain controller locator (Locator) mechanism.

active directory dns

How DNS Support for Active Directory Works: Active Directory April 16, 2018, 2:44 p.m.

Active Directory uses DNS as its domain controller location mechanism and leverages the namespace design of DNS in the design of Active Directory domain names. As a result, DNS is positioned within the discoverability and logical structure components of Active Directory technology components.

active directory dns

An introduction to services, runlevels, and rc.d scripts April 13, 2018, 8:28 a.m.

A symlink, /etc/rc2.d/S91apache2, points to /etc/init.d/apache2. This tells init to start Apache 2 in runlevel 2, but only after other services with lower S numbers.

When the system is shut down, there is another symlink in the /etc/rc0.d and /etc/rc6.d directories (halt and reboot, respectively) that starts with a K instead of an S, which tells init to shut down the process.

linux

CentOS Wiki - IPTables April 12, 2018, 8:46 a.m.

Iptables places rules into predefined chains - INPUT, OUTPUT and FORWARD - that are checked against any network traffic relevant to those chains and a decision is made about what to do with each packet based upon the outcome of those rules. These actions are referred to as targets, of which the two most common predefined targets are DROP and ACCEPT.

  • INPUT - All packets destined for the host computer.
  • OUTPUT - All packets originating from the host computer.
  • FORWARD - All packets neither destined for nor originating from the host computer, but passing through (routed by) the host computer. This chain is used if you are using your computer as a router.
linux networking

LDAP Tool Box Self Service Password April 12, 2018, 8:43 a.m.

Self Service Password is a PHP application that allows users to change their password in an LDAP directory.

active directory ldap free tools

Repeated characters when typing in VMware remote console April 12, 2018, 8:41 a.m.

If you are using a wide-area or low-bandwidth connection, the time delay over the network may be long enough to cause the virtual machine to start auto-repeat. To reduce these effects, increase the time threshold necessary for auto-repeat in the remote console by setting keyboard.typematicMinDelay = "2000000" in the virtual machine's configuration (.vmx) file.

vmware

Active Directory FSMO Roles Explained April 4, 2018, 10:51 a.m.

Because Active Directory is a multi-master database, changes can be processed at any given domain controller (DC), regardless of whether the DC is connected or disconnected from the network. A limited number of operations are not permitted to occur at different places at the same time and must be the responsibility of only one domain controller in a domain or forest. All domain controllers are capable of performing these single master operations. The domain controller that actually performs a single-master operation is the domain controller that currently holds the operation’s token, also known as the “role holder”.The operation's token, and thus the role, can be transferred easily to another domain controller without a reboot. Because the role is not bound to a single DC, it is referred to as a Flexible Single Master Operation (FSMO) role.

active directory windows

Determine the tombstone lifetime for the forest April 4, 2018, 10:40 a.m.

The tombstone lifetime in an Active Directory forest determines how long a deleted object (called a “tombstone”) is retained in Active Directory Domain Services. The tombstone lifetime is determined by the value of the tombstoneLifetime attribute on the Directory Service object in the configuration directory partition. You can use this procedure to determine the tombstone lifetime for the forest.

active directory windows

Active Directory Replication Overview & USN Rollback: What It Is & How It Happens April 4, 2018, 10:37 a.m.

Typically when a USN goes backwards, it is due to a supported restore from backup. When this process occurs, the invocation ID changes. Since all replica partners track replication based on DC GUID, Invocation ID, and USNs, a supported restore method keeps the previous invocation ID as “retired” and effectively ignores it. The new database Invocation ID & associated USN are used to get AD changes from the DC… except when the USN rolls back with NO change in Invocation ID. This means that when a DC is in a state of USN Rollback, AD updates can be performed on that DC with none of the changes replicated to its replication partners.

active directory windows

Service overview and network port requirements for Windows March 28, 2018, 2:08 p.m.

A roadmap of ports and protocols and services that are required by Microsoft client and server operating systems, server-based applications and their subcomponents to function in a segmented network.

network security windows

Being Exposed to Light During Sleep is Linked to Depression March 8, 2018, 12:05 p.m.

The researchers measured nighttime light levels in the bedrooms of 863 elderly Japanese adults by placing ceiling-facing light meters at the heads of everyone’s beds for two nights, to approximate as accurately as possible the light they would see while going to sleep. People who saw more than five lux of light at night were much more likely to develop symptoms of depression than those who slept in a completely dark room.

reading science

Tracerpt | Microsoft Docs March 2, 2018, 5:11 p.m.

Processes event trace logs or real-time data from instrumented event trace providers and allows you to generate trace analysis reports and CSV (comma-delimited) files for the events generated.

windows

wevtutil | Microsoft Docs March 2, 2018, 5:11 p.m.

Enables you to retrieve information about event logs and publishers. You can also use this command to install and uninstall event manifests, to run queries, and to export, archive, and clear logs.

windows