This article is about the backup and recovery of Group Policy Objects (GPOs) in the Active Directory domain environment. If the GPO files in SYSVOL are modified, corrupted, or deleted, GPO backups allow you to revert to a previous version of the policy.
Continue reading “Backup and Restore Group Policy Objects (GPOs) in Active Directory”
Author: admin
In order to safely run third-party services in Windows, you can use a user account that doesn’t have local administrator permissions. To do this, you must change the local security policy settings to allow the user to log on as a service.
Continue reading “Run a Windows Service with a Non-Admin User Account”
The built-in WindowsAdministrator
account has unlimited rights on the computer and, if compromised, gives the attacker complete control over the system. In this article, we will look at some basic techniques that can help secure Windows’s built-in Administrator account.
Continue reading “Securing the Built-in Administrator Account in Windows”
The ntpdate command is a simple client for synchronizing the local system clock with a remote NTP server. It allows you to verify that your host has the correct time and, if necessary, synchronize the time with the NTP source. Although the ntpdate tool is deprecated, it is often used in simple cases where it is necessary to check the accuracy of the time on a Linux host or to manually synchronize the time once.
Continue reading “Synchronizing Time with NTP Using Ntpdate in Linux”
You can use self-signed certificates for internal use or testing of HTTPS web services. This means you don’t need to buy a certificate from a commercial CA or generate a free Let’s Encrypt certificate. This article describes how to use the OpenSSL
tool to issue a self-signed certificate in Linux, bind it to the Nginx web server and add it to the trusted certificate list on the user’s computer.
Continue reading “Creating a Self-Signed Certificate in Linux with OpenSSL”
If you specified an incorrect hostname when you installed the Proxmox VE node, you can change it.
Continue reading “How to Change the Hostname of a Proxmox VE Node”
By default, the Proxmox VE hypervisor uses commercial (enterprise) repositories to obtain updates. These updates are only available with a paid subscription. If you try to get an APT update from a commercial repo without a subscription, you will get a package source error. You must switch to pve-no-subscription repositories to receive updates without a Proxmox VE subscription.
Continue reading “Enable Free (No-Subscription) Repositories in Proxmox VE”
Bash shell scripts in Linux are used in plaintext. Obfuscation allows you to hide a Bash script’s source code by compiling it into a binary. On Linux, you can use the shc tool to compile bash scripts. This tool can convert bash script code into C language and compile it. The output will be a binary file that can be run on almost any other Linux machine.
Continue reading “Linux: Compiling a Bash Script into Binary”
To track changes to the Linux file system and report changes to apps, the inotify kernel subsystem can be used. For example, when a file or directory is created, modified, read, or deleted, inotify allows a specific action (command, script) to be executed.
Continue reading “Monitor File or Directory Changes in Linux with Systemd”
When the Linux operating system is installed on a computer, a unique machine identifier is automatically generated and saved in the /etc/machine-id file. This is similar to the Computer Security Identifier (Machine SID) in Windows.
Continue reading “How to Reset the Machine-ID of a Linux VM”