• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
OpenTechTips

OpenTechTips

Comprehensive IT Guides for Pros and Enthusiasts

MENUMENU
  • HOME
  • ALL TOPICS
    • Exchange
    • InfoSec
    • Linux
    • Networking
    • Scripting
      • PowerShell
    • SSL
    • Tools
    • Virtualization
    • Web
    • Windows
  • ABOUT
  • SUBSCRIBE

Home

Home

How to Wipe a Hard Drive in Windows 11 | Cmd Tools

February 9, 2026 Zsolt Agoston
Secure wipe a whole disk using built-in Windows 11 tools ... Read More
Home

How to Delete Exchange TRANSACTION LOG Files

April 23, 2020
Home
Huge Logs Sometimes the Exchange server runs out of space. As it happens often, the transaction log files use up all the free space, causing the transport service to stop as there is no more room to write messages to ... Read More
Home

LOW Disk Space – Detailed Windows Cleanup Steps

April 21, 2020
Home
Quick Cleanup List When disk is almost full there here is a quick list I usually go through to recover some free space:
  1. Delete files from c:\windows\temp
  2. Download and run TreeSize to see what uses up ... Read More
Home

How to Create and Use Custom Powershell Commads

April 20, 2020
Home
Custom commands John needs to access Exchange PowerShell a lot. He's tired of logging in the actual Exchange server all the time, he prefers to use his local computer to run cmdlets and manage mailboxes. He created a script, called ... Read More
Home

How to Configure DKIM on Exchange 2019 – The Simple Way

April 19, 2020
Home
Installation In Exchange Online DKIM is a built-in service, but on an on-prem Exchange 2019 deployment we need a 3rd party application to add this functionality to our Exchange infrastructure. In this guide we use Stefan Profanter's excellent dkim-exchange application ... Read More
Home

Understanding SPF, DKIM and DMARC

April 18, 2020
Home
Spam messages have become a huge issue. They are both annoying, flooding our mailboxes with unneeded content and they are a security risk too, as many of them contain links to malicious websites or even viruses. To fight spamming SPF, ... Read More
Home

Accessing Microsoft Exchange: the GUI vs Shell

April 16, 2020
Home
You have a new Exchange installation. You've just clicked on the Setup Finished window, lean back in your chair and sip on your steamy coffee, saying to yourself: great, now I have a mail server, I could start setting up ... Read More
Home

How to Install a new Microsoft Exchange 2019 Server – Step by Step

April 15, 2020
Home
Our local diner, AlwaysHot Café hired us to build a mail server. They have a small network that consists of a switch and a firewall with a single static public IP. After discussing our options we decided to go with ... Read More
Home

Following the SSL Key Exchange with WireShark

April 14, 2020
Home
We established in part1 why the key exchange takes place, if you missed that part click HERE to check it out. Basically the client and the server agree on a key that they can use to encrypt the rest of ... Read More
Home

Math: X To The Power of Y in PowerShell

April 13, 2020
Home
Math in PowerShell is very simple and straightforward, the basic operators work as they usually do in any programming or scripting language: 1 + 1, 64 - 16, 4 * 32, 1024 / 128, etc. However, many times I faced ... Read More
Home

Join RHEL or CentOS 8 to an Active Directory Domain using SSSD

April 12, 2020
Home
The task for today is to join a Microsoft Active Directory domain with our CentOS box. We use the sssd package to accomplish this, first we start with a basic CentOS installation, we go through the initial setup, then the ... Read More
Home

How to Setup HTTPS on a CentOS 8 Server

April 11, 2020
Home
Our goal is to make our website protected, configuring the HTTPS service on it to ensure encrypted traffic between the client and our server. We utilize Let’s Encrypt’s certbot, that will create and automatically renew the publicly signed SSL certificates ... Read More
Home

How to Set Up Multiple Apache Virtual Hosts on CentOS 8

April 10, 2020
Home
    So what are Virtual Hosts and what are they for? John has a web server, connected to the internet with a single IP address. He has a website, called JohnBlog.com which is pointing to this web server. He ... Read More
Home

How to build a basic webserver on CentOS with Apache, MySQL and PHP

April 9, 2020
Home
Before You Begin Our job is really easy this time as we already have the process of installing Apache, MySQL and PHP on Debian based machines, as it is really similar to the process on RHEL based boxes. For the ... Read More
Home

TLS/SSL – Does my public CA have my private key??? – part2

April 8, 2020
Home
I’ve recently encountered a situation where a smaller company needed a VPN server, using SSTP, so they tried to set up an SSL certificate for their service to encrypt their client VPN tunnels with. It was a Windows server, and ... Read More
Home

TLS/SSL – Basics: How public-private Keys Work – part1

April 7, 2020
Home
What is PKI and why do we need it? PKI stands for Public Key Infrastructure, that utilizes public and private key asymmetric encryption to create an encrypted channel between two parties through a public medium. Let’s see what we mean ... Read More
Home

Upload Max Filesize in php.ini

April 6, 2020
Home
Modify the Limits If you get the following error message, saying the max upload filesize in php.ini is too small, you simply need to edit the php.ini file, increasing the required values as seen below. Note that both 1 ... Read More
  • ‹
  • 1
  • …
  • 10
  • 11
  • 12
  • 13
  • ›
Home

Primary Sidebar

Tools

  • Terms of Use
  • Disclaimer
  • Privacy Policy
Manage your privacy

To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.

Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}