Skip to content
CR Tech

Servers, Systems, Guides

Menu
  • Dell
    • System Management
    • Dell PowerEdge RAID Controller (PERC)
    • iDrac and LifeCycle Controller Guides/Troubelshooting
    • Dell Repository Manager
  • Operating Systems
    • Microsoft Windows Server
    • Microsoft Client OS
    • Exchange Server
    • Linux
  • Scripting Guides
    • PowerShell
    • Bash
    • Python
    • JSON
  • Networking
    • Domain Name System
    • Dynamic Host Configuration Protocol
    • Active Directory
  • Cloud Computing
    • Amazon AWS
    • Azure
    • Cyber security
  • Virtualization
    • VMware
    • Hyper-V
    • Virtual Box

Category: Cyber security

Home » Cloud Computing » Cyber security
Cloud Computing / Cyber security

WPScan – A Black Box WordPress Vulnerability Scanner

WordPress is all over the web; it’s the most popular and most used content management system (CMS) out there. Is your website or blog is powered by WordPress? Did you know that …

Cloud Computing / Cyber security

Deploying the Local Administrator Password Solution Part 1

In this series of three posts, I demonstrate the installation and configuration of Microsoft’s Local Administrator Password Solution (LAPS). This is the first post that covers installation of the software on management …

Cloud Computing / Cyber security

Deploying the Local Administrator Password Solution Part 2

In this series of three posts, I demonstrate the installation and configuration of Microsoft’s Local Administrator Password Solution (LAPS). This is the second post that covers configuration of Active Directory to …

Cloud Computing / Cyber security

Deploying the Local Administrator Password Solution Part 3

In this series of three posts, I demonstrate the installation and configuration of Microsoft’s Local Administrator Password Solution (LAPS). This is the third and final post that covers the group policy configuration …

Cloud Computing / Cyber security

How to install Root Certificate Authority on Windows Server 2012

This guide will have two parts. The first one will be Installation and Configuration of Root Certificate Authority and the second one will be the post configuration settings. Installation of …

Cloud Computing / Cyber security

Hack Hyper-V: how to protect your Microsoft private cloud

Cloud Computing / Cyber security

Fight back with advancements in Office 365 Advanced Threat Protection

Cloud Computing / Cyber security

How to Track Your Stolen Laptop for Free

Using Prey, you’ll have the upper hand over thieves A laptop is a lot of things—it’s a mobile entertainment center, a portal to the web, and a way to get …

Cloud Computing / Cyber security

How the NSA is infiltrating private networks

The NSA, working with its British counterpart, the Government Communications Headquarters (GCHQ), secretly taps into the internal networks of Yahoo and Google, the two biggest Internet companies by overall data …

Cloud Computing / Cyber security

How To Securely Web Browse via an SSH Tunnel

Introduction These days, you can find a hot spot pretty much anywhere, allowing you free access to roam the Internet without much of a problem. But this isn’t exactly a …

Posts navigation

Older posts

SYSADMIN POEM

Keys clack beneath my fingers, I frantically click at the mouse
Most the servers are down, everything in house.

I click and type away as sweat runs down my brow
Everything went down but I’m not sure yet how.

The coffee’s long been cold but I drink it anyway
I know I’ll be stuck here until the break of day.

The phone is ringing off the hook, but I ignore its rattle.
The users are all angry, like an untamed herd of cattle.

I pray to the IT gods to have pity on my soul
Let this restore work, let the data all be whole.

-ccraddocks

NETWORK SYSADMIN POEM

Three small words make a difference and can make or break

And just a few seconds is all that it takes

Often forgotten they've caused broken hearts

So here's a reminder:

copy run start-unknown

July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Apr    

RECENT POSTS

  • Simplify Your Entra ID Governance with Azure Group Expiration
  • Testing out Cross-Region Azure Load Balancer
  • How to Reduce your Azure Storage Accounts Spend
  • How to Configure an Azure Storage Account with an Application Gateway and Custom Domain
  • Active Directory Replication Summary to your Email

KNOWLEDGE ARTICLES

  • Dell Hardware/Software
  • Enterprise Operating Systems
  • Scripting Guides
  • Networking

GET IN TOUCH WITH US

Copyright © 2025 CR Tech – OnePress theme by FameThemes