Robocopy Example to Sync Altered Files/Folders
The following command will copy all contents from drive D: to drive E: If the process is interrupted, the same command makes sure to pick up where the earlier process left off, meaning already copied files won't be transferred again. /COPYALL: copies all files, folders
/E: includes empty folders as ... Read More
/E: includes empty folders as ... Read More
UNIX type systems use the octal file permission model, that is limited in terms of setting access permissions for specific users and groups. By default there are only three attributes to be set on files and directories: for the owner, ... Read More
Exchange - like most of the other email systems - limits the maximum size of incoming and outgoing messages. There are three layers where these limits can be set: system-wide, on the send- and receive connectors and on individual mailboxes ... Read More
Huge Logs Sometimes the Exchange server runs out of space. As it happens often, the transaction log files use up all the free space, causing the transport service to stop as there is no more room to write messages to ... Read More
Quick Cleanup List When disk is almost full there here is a quick list I usually go through to recover some free space:
- Delete files from c:\windows\temp
- Download and run TreeSize to see what uses up ... Read More
Custom commands John needs to access Exchange PowerShell a lot. He's tired of logging in the actual Exchange server all the time, he prefers to use his local computer to run cmdlets and manage mailboxes. He created a script, called ... Read More
Installation In Exchange Online DKIM is a built-in service, but on an on-prem Exchange 2019 deployment we need a 3rd party application to add this functionality to our Exchange infrastructure. In this guide we use Stefan Profanter's excellent dkim-exchange application ... Read More
Spam messages have become a huge issue. They are both annoying, flooding our mailboxes with unneeded content and they are a security risk too, as many of them contain links to malicious websites or even viruses. To fight spamming SPF, ... Read More
You have a new Exchange installation. You've just clicked on the Setup Finished window, lean back in your chair and sip on your steamy coffee, saying to yourself: great, now I have a mail server, I could start setting up ... Read More
Our local diner, AlwaysHot Café hired us to build a mail server. They have a small network that consists of a switch and a firewall with a single static public IP. After discussing our options we decided to go with ... Read More
We established in part1 why the key exchange takes place, if you missed that part click HERE to check it out. Basically the client and the server agree on a key that they can use to encrypt the rest of ... Read More
Math in PowerShell is very simple and straightforward, the basic operators work as they usually do in any programming or scripting language: 1 + 1, 64 - 16, 4 * 32, 1024 / 128, etc. However, many times I faced ... Read More
The task for today is to join a Microsoft Active Directory domain with our CentOS box. We use the sssd package to accomplish this, first we start with a basic CentOS installation, we go through the initial setup, then the ... Read More
Our goal is to make our website protected, configuring the HTTPS service on it to ensure encrypted traffic between the client and our server. We utilize Let’s Encrypt’s certbot, that will create and automatically renew the publicly signed SSL certificates ... Read More
So what are Virtual Hosts and what are they for? John has a web server, connected to the internet with a single IP address. He has a website, called JohnBlog.com which is pointing to this web server. He ... Read More
Before You Begin Our job is really easy this time as we already have the process of installing Apache, MySQL and PHP on Debian based machines, as it is really similar to the process on RHEL based boxes. For the ... Read More
I’ve recently encountered a situation where a smaller company needed a VPN server, using SSTP, so they tried to set up an SSL certificate for their service to encrypt their client VPN tunnels with. It was a Windows server, and ... Read More