Using Linux commands on WIndows
Download and install GNUWin32 from here and the CoreUtils package here and Grep here that should do it. There are more packages available though here Once installed, add the path to the bin directory...
View ArticleFinding SIDs that haven’t changed after SetACL
This post follows on from a previous post sidmaps and setacl describing how you can use SetACL with a SID map generated using dsquery to translate sidHistory attributes to primarySIDs for migrated...
View ArticleInstalling Dropbox on ElementaryOS (Freya)
ElementaryOS is the closest thing to Mac OS-X in terms of consistency and minimalism of it’s desktop environment interface. Unlike other Linux distro’s it’s released when the developers think it’s...
View ArticleShare all subfolders as individual hidden shares
Continuing on from my previous post about setting permissions on all migrated users home directories here… Re-permissioning Users Home Directories Re-permission each users subdirectory so only their...
View ArticleZone configuration on Cisco MDS
This post covers the commands used to display zone configuration, activate/deactivate zones, create/delete aliases for fibre attached devices, create/delete zones and create/delete zonesets and copying...
View ArticleISL configuration on Cisco MDS
Assign hostname to switch switchname <hostname> Create Inter-Site Links (join two switches together to share zones) conf t trunk protocol enable #to enable trunking protocol conf t no trunk...
View ArticleDell BIOS updates w/o Windows
If like me, you have a Dell laptop running linux and you want to bring your firmware up to date, you’ll realise that the executables downloadable from Dell’s support site require Windows OS to run. Or...
View ArticlePowershell and the NTFSSecurity Module
The powershell NTFSSecurity module provides cmdlets to export and import security. Unlike icacls which sticks to using sddl format (for a 10 fold increase in speed exporting security for large...
View ArticleFind ACL’s that don’t match parent with AccessEnum
When data begins its life, the permissions are invariably set at one of the top two or three levels, Some examples of some types of data you wouldn’t want everyone to get their hands on in a given...
View ArticleRobocopy leaves some NTFS permissions behind?
And so does emcopy and icacls /save & /restore doesn’t work either… Googling doesn’t help – every solution that promises to work, doesn’t. Solution? ALWAYS USE THE /B SWITCH! Sorry for shouting,...
View ArticleDeleting Windows data where the path length exceeds 260 characters
After migrating Windows data, it can be a royal pain cleaning up the source data using del *.* /s /q /f, especially when the path length exceeds 260 (or thereabouts) characters. You can manually...
View ArticleAdding a blocklist to Transmission torrent client on Linux
When using a torrent client on Windows such as utorrent, it’s not a bad idea to run peer block to protect your computer from inbound connections from a maintained list of known ip addresses. Linux...
View ArticleCisco MDS Cheat Sheet
A more complete set of commands for use on MDS switches, with a useful set of commands at the top for exporting useful information (by logging session output of PuTTY terminal) Export useful...
View ArticleSolaris Zones Essentials
Solaris Zones (aka Containers) are Solaris virtual machines (Non-Global Zones) running on an underlying Solaris host (The Global Zone), i.e. -NON-GLOBAL ZONE- -Can be a “Spars Root”, “Whole...
View ArticleRecoverPoint Journal LUN sizing
The Journal size is a question of the required protection window (a Business requirement) and the incoming write rate of the production application. Whilst the Recovery Point Objective might be known,...
View ArticleInstall hevc codec for .mkv video on Linux Mint
Given how complete Linux Mint is out of the box, I’m surprised to have experienced this problem even after installing all extra codecs from the repositories after initial installation. Upon attempting...
View ArticleInject Everyone/Full Control ACE into NTFS Folder
Download SetACL.exe from here Open a command line as Adminstrator (right click cmd.exe, run as admin) setacl -on “C:\Private No Entry” -ot file -actn ace -ace “n:Everyone;p:full” -rec cont_obj...
View ArticleWhat groups am I a member of?
Need to know what groups you’re a member of in Active Directory, but don’t have access to AD Users and Groups management snap-in? Try this command. It may help to run cmd.exe as Administrator if that...
View ArticleProtect your Linux system by jailing your web browser
Your Linux system is inherently less vulnerable to attack than Microsoft Windows for a number of reasons. You’re less of a target to virus attack by being in the minority (Only 2.18% of people run...
View ArticleHow to cable up VNX SP Ports (Dual Fabric topology)
So your VNX has two SP’s and you have two fabric switches. You already know you have to connect each SP to each fabric for resilience, but you’re still a bit confused. Fear not. Use this as a guide....
View Article