Read through for comprehensive resources on the various compute engines like containers, hyper-converged computing, server virtualization, high performance computing and Linux.
Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
The glossary defines distinguished name as:
A name that uniquely identifies an object by using the relative distinguished name for the object, plus the names of container objects
and domains that contain the object. The distinguished ...
Download and unzip EmptyRecycleBin.zip.
The ReadMe.txt file contains:
Empty Recycle Bin \[version 1.00\]
Empties the Windows Recycle Bin.
Syntax: EmptyRecycleBin.exe \[/Q\]
/Q suppresses the 'Are y...
When you browse a security Web site whose CDP (Certificate Revocation List Distribution Point) cannot
be contacted, you receive:
The security certificate was issued by a company you have chosen not to trust. View the certifi...
The dsquery user command is very easy to use and
surprisingly powerful. For instance, from your Windows XP desktop, you can query your Windows 2000 SP3+ domain,
or Windows Server 2003 domain, for the distinguished name of all members of the sal...
Using the Active Directory command-line tools, in a Windows 2000 domain, or Windows Server 2003
domain, I have scripted ChgPwd.bat to change most user's passwords, and/or force them to change the password at the next logon.
The syntax for u...
Using the Active Directory command-line tools, in a Windows 2000 domain, or Windows Server 2003
domain, you can create an organizational unit, modify its' properties, or delete an organizational unit, from the command-line.
The syntax f...
Date attributes in Active Directory are stored as a large integer that represents the number of seconds elapsed since 00:00:00, January 1, 1970 (UTC).
Ritchie Lawrence has scripted DateToDays.bat, which contains:
...