Category: system engineering
-
Activating Windows against a KMS license server
A quick guide on how to activate Windows against a KMS server
-
Converting Windows evalutation to a standard instance
Let’s say, for example, that you downloaded an evaluation of Windows from the Microsoft site, and after evaluating it for a period of time, you decide that you’re satisfied with the product and want to make it a permanent feature in your environment. It might be a pain to have to reinstall a non-evalation copy…
-
Disabling the user list on the RHEL/Centos login screen
Manage how Gnome displays the login screen
-
Using tcpdump to capture a flow for review in Wireshark
Use tcpdump to capture a packet flow for review and analysis in Wireshark
-
Unlocking the Telstra Smart Modem 2
Just dropping this here for now: https://www.techpowerup.com/forums/threads/guide-unlocking-and-modding-telstra-routers-technicolor-hardware.296503/
-
Installing Insomnia on Fedora
A quick fix to resolve a segmentation fault issue and get Insomnia working on Fedora
-
SSH client config
The SSH client is capable of leveraging configured and runtime settings to influence its operation and behaviour. This may include creation and use of keys, host specific settings and enabling client capabilities. This is by no means intended to be a comprehensive guide of all things SSH config related, but merely a list of lessons…
-
Apache LDAP authentication
How do you configure the Apache HTTPD service to support LDAP authentication? I don’t know, but the links within might offer some suggestion
-
OpenAPI Specification
The OpenAPI Specification (OAS) defines a standard, programming language-agnostic interface description for HTTP APIs, which allows both humans and computers to discover and understand the capabilities of a service without requiring access to source code, additional documentation, or inspection of network traffic
-
Ghosting LVM disks
When it comes to using Ghost (Symantec Ghost 11.5) to create an image of a device that dual-boots both Windows and Linux, there are some ‘tricks’ that you need to be aware of in order to create an image set that can be distributed to other devices, or at least restored to the original device.…