Quantcast
Channel: cyberfellabtc
Browsing all 92 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Using Linux commands on WIndows

Download and install GNUWin32 from here and the CoreUtils package here and Grep here that should do it.  There are more packages available though here Once installed, add the path to the bin directory...

View Article



Image may be NSFW.
Clik here to view.

Finding SIDs that haven’t changed after SetACL

This post follows on from a previous post sidmaps and setacl describing how you can use SetACL with a SID map generated using dsquery to translate sidHistory attributes to primarySIDs for migrated...

View Article

Image may be NSFW.
Clik here to view.

Installing Dropbox on ElementaryOS (Freya)

ElementaryOS is the closest thing to Mac OS-X in terms of consistency and minimalism of it’s desktop environment interface.  Unlike other Linux distro’s it’s released when the developers think it’s...

View Article

Image may be NSFW.
Clik here to view.

Share all subfolders as individual hidden shares

Continuing on from my previous post about setting permissions on all migrated users home directories here… Re-permissioning Users Home Directories Re-permission each users subdirectory so only their...

View Article

Image may be NSFW.
Clik here to view.

Zone configuration on Cisco MDS

This post covers the commands used to display zone configuration, activate/deactivate zones, create/delete aliases for fibre attached devices, create/delete zones and create/delete zonesets and copying...

View Article


Image may be NSFW.
Clik here to view.

ISL configuration on Cisco MDS

Assign hostname to switch switchname <hostname> Create Inter-Site Links (join two switches together to share zones) conf t trunk protocol enable #to enable trunking protocol conf t no trunk...

View Article

Image may be NSFW.
Clik here to view.

Dell BIOS updates w/o Windows

If like me, you have a Dell laptop running linux and you want to bring your firmware up to date, you’ll realise that the executables downloadable from Dell’s support site require Windows OS to run.  Or...

View Article

Image may be NSFW.
Clik here to view.

Powershell and the NTFSSecurity Module

The powershell NTFSSecurity module provides cmdlets to export and import security.  Unlike icacls which sticks to using sddl format (for a 10 fold increase in speed exporting security for large...

View Article


Image may be NSFW.
Clik here to view.

Find ACL’s that don’t match parent with AccessEnum

When data begins its life, the permissions are invariably set at one of the top two or three levels, Some examples of some types of data you wouldn’t want everyone to get their hands on in a given...

View Article


Image may be NSFW.
Clik here to view.

Robocopy leaves some NTFS permissions behind?

And so does emcopy and icacls /save & /restore doesn’t work either… Googling doesn’t help – every solution that promises to work, doesn’t. Solution? ALWAYS USE THE /B SWITCH! Sorry for shouting,...

View Article

Image may be NSFW.
Clik here to view.

Deleting Windows data where the path length exceeds 260 characters

After migrating Windows data, it can be a royal pain cleaning up the source data using del *.* /s /q /f, especially when the path length exceeds 260 (or thereabouts) characters.  You can manually...

View Article

Image may be NSFW.
Clik here to view.

Adding a blocklist to Transmission torrent client on Linux

When using a torrent client on Windows such as utorrent, it’s not a bad idea to run peer block to protect your computer from inbound connections from a maintained list of known ip addresses. Linux...

View Article

Image may be NSFW.
Clik here to view.

Cisco MDS Cheat Sheet

A more complete set of commands for use on MDS switches, with a useful set of commands at the top for exporting useful information (by logging session output of PuTTY terminal) Export useful...

View Article


Image may be NSFW.
Clik here to view.

Solaris Zones Essentials

Solaris Zones (aka Containers) are Solaris virtual machines (Non-Global Zones) running on an underlying Solaris host (The Global Zone), i.e. -NON-GLOBAL ZONE-       -Can be a “Spars Root”, “Whole...

View Article

Image may be NSFW.
Clik here to view.

RecoverPoint Journal LUN sizing

The Journal size is a question of the required protection window (a Business requirement) and the incoming write rate of the production application.  Whilst the Recovery Point Objective might be known,...

View Article


Image may be NSFW.
Clik here to view.

Install hevc codec for .mkv video on Linux Mint

Given how complete Linux Mint is out of the box, I’m surprised to have experienced this problem even after installing all extra codecs from the repositories after initial installation. Upon attempting...

View Article

Image may be NSFW.
Clik here to view.

Inject Everyone/Full Control ACE into NTFS Folder

Download SetACL.exe from here Open a command line as Adminstrator (right click cmd.exe, run as admin) setacl -on “C:\Private No Entry” -ot file -actn ace -ace “n:Everyone;p:full” -rec cont_obj...

View Article


Image may be NSFW.
Clik here to view.

What groups am I a member of?

Need to know what groups you’re a member of in Active Directory, but don’t have access to AD Users and Groups management snap-in?  Try this command.  It may help to run cmd.exe as Administrator if that...

View Article

Image may be NSFW.
Clik here to view.

Protect your Linux system by jailing your web browser

Your Linux system is inherently less vulnerable to attack than Microsoft Windows for a number of reasons. You’re less of a target to virus attack by being in the minority (Only 2.18% of people run...

View Article

Image may be NSFW.
Clik here to view.

How to cable up VNX SP Ports (Dual Fabric topology)

So your VNX has two SP’s and you have two fabric switches.  You already know you have to connect each SP to each fabric for resilience, but you’re still a bit confused.  Fear not.  Use this as a guide....

View Article
Browsing all 92 articles
Browse latest View live




Latest Images