Backup and Restore Group Policy Objects (GPOs) in Active Directory

This article is about the backup and recovery of Group Policy Objects (GPOs) in the Active Directory domain environment. If the GPO files in SYSVOL are modified, corrupted, or deleted, GPO backups allow you to revert to a previous version of the policy.
Continue reading “Backup and Restore Group Policy Objects (GPOs) in Active Directory”

Run a Windows Service with a Non-Admin User Account

In order to safely run third-party services in Windows, you can use a user account that doesn’t have local administrator permissions. To do this, you must change the local security policy settings to allow the user to log on as a service.

Continue reading “Run a Windows Service with a Non-Admin User Account”

Securing the Built-in Administrator Account in Windows

The built-in WindowsAdministrator account has unlimited rights on the computer and, if compromised, gives the attacker complete control over the system. In this article, we will look at some basic techniques that can help secure Windows’s built-in Administrator account.

Continue reading “Securing the Built-in Administrator Account in Windows”

Synchronizing Time with NTP Using Ntpdate in Linux

The ntpdate command is a simple client for synchronizing the local system clock with a remote NTP server. It allows you to verify that your host has the correct time and, if necessary, synchronize the time with the NTP source. Although the ntpdate tool is deprecated, it is often used in simple cases where it is necessary to check the accuracy of the time on a Linux host or to manually synchronize the time once.

Continue reading “Synchronizing Time with NTP Using Ntpdate in Linux”

Creating a Self-Signed Certificate in Linux with OpenSSL

You can use self-signed certificates for internal use or testing of HTTPS web services. This means you don’t need to buy a certificate from a commercial CA or generate a free Let’s Encrypt certificate. This article describes how to use the OpenSSL tool to issue a self-signed certificate in Linux, bind it to the Nginx web server and add it to the trusted certificate list on the user’s computer.

Continue reading “Creating a Self-Signed Certificate in Linux with OpenSSL”

Enable Free (No-Subscription) Repositories in Proxmox VE

By default, the Proxmox VE hypervisor uses commercial (enterprise) repositories to obtain updates. These updates are only available with a paid subscription. If you try to get an APT update from a commercial repo without a subscription, you will get a package source error. You must switch to pve-no-subscription repositories to receive updates without a Proxmox VE subscription.

Continue reading “Enable Free (No-Subscription) Repositories in Proxmox VE”

Linux: Compiling a Bash Script into Binary

Bash shell scripts in Linux are used in plaintext. Obfuscation allows you to hide a Bash script’s source code by compiling it into a binary. On Linux, you can use the shc tool to compile bash scripts. This tool can convert bash script code into C language and compile it. The output will be a binary file that can be run on almost any other Linux machine.

Continue reading “Linux: Compiling a Bash Script into Binary”

Monitor File or Directory Changes in Linux with Systemd

To track changes to the Linux file system and report changes to apps, the inotify kernel subsystem can be used. For example, when a file or directory is created, modified, read, or deleted, inotify allows a specific action (command, script) to be executed.

Continue reading “Monitor File or Directory Changes in Linux with Systemd”