Skip to content
CR Tech

Servers, Systems, Guides

Menu
  • Dell
    • System Management
    • Dell PowerEdge RAID Controller (PERC)
    • iDrac and LifeCycle Controller Guides/Troubelshooting
    • Dell Repository Manager
  • Operating Systems
    • Microsoft Windows Server
    • Microsoft Client OS
    • Exchange Server
    • Linux
  • Scripting Guides
    • PowerShell
    • Bash
    • Python
    • JSON
  • Networking
    • Domain Name System
    • Dynamic Host Configuration Protocol
    • Active Directory
  • Cloud Computing
    • Amazon AWS
    • Azure
    • Cyber security
  • Virtualization
    • VMware
    • Hyper-V
    • Virtual Box

Tag: Cyber Security 101

Home » Cyber Security 101
Cloud Computing / Cyber security

WPScan – A Black Box WordPress Vulnerability Scanner

WordPress is all over the web; it’s the most popular and most used content management system (CMS) out there. Is your website or blog is powered by WordPress? Did you know that …

Cloud Computing / Cyber security

Deploying the Local Administrator Password Solution Part 1

In this series of three posts, I demonstrate the installation and configuration of Microsoft’s Local Administrator Password Solution (LAPS). This is the first post that covers installation of the software on management …

Cloud Computing / Cyber security

Deploying the Local Administrator Password Solution Part 2

In this series of three posts, I demonstrate the installation and configuration of Microsoft’s Local Administrator Password Solution (LAPS). This is the second post that covers configuration of Active Directory to …

Cloud Computing / Cyber security

Deploying the Local Administrator Password Solution Part 3

In this series of three posts, I demonstrate the installation and configuration of Microsoft’s Local Administrator Password Solution (LAPS). This is the third and final post that covers the group policy configuration …

Cloud Computing / Cyber security

How to install Root Certificate Authority on Windows Server 2012

This guide will have two parts. The first one will be Installation and Configuration of Root Certificate Authority and the second one will be the post configuration settings. Installation of …

Cloud Computing / Cyber security

Hack Hyper-V: how to protect your Microsoft private cloud

Cloud Computing / Cyber security

Fight back with advancements in Office 365 Advanced Threat Protection

Networking

Net Commands – Network Security Management

The NET Command is used to manage network security resources as follows: View user account password and logon requirements (also displays the machine type – Server or workstation) NET ACCOUNTS …

Cloud Computing / Cyber security

How to Track Your Stolen Laptop for Free

Using Prey, you’ll have the upper hand over thieves A laptop is a lot of things—it’s a mobile entertainment center, a portal to the web, and a way to get …

Cloud Computing / Cyber security

How the NSA is infiltrating private networks

The NSA, working with its British counterpart, the Government Communications Headquarters (GCHQ), secretly taps into the internal networks of Yahoo and Google, the two biggest Internet companies by overall data …

Posts navigation

Older posts

SYSADMIN POEM

Keys clack beneath my fingers, I frantically click at the mouse
Most the servers are down, everything in house.

I click and type away as sweat runs down my brow
Everything went down but I’m not sure yet how.

The coffee’s long been cold but I drink it anyway
I know I’ll be stuck here until the break of day.

The phone is ringing off the hook, but I ignore its rattle.
The users are all angry, like an untamed herd of cattle.

I pray to the IT gods to have pity on my soul
Let this restore work, let the data all be whole.

-ccraddocks

NETWORK SYSADMIN POEM

Three small words make a difference and can make or break

And just a few seconds is all that it takes

Often forgotten they've caused broken hearts

So here's a reminder:

copy run start-unknown

August 2025
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

RECENT POSTS

  • Simplify Your Entra ID Governance with Azure Group Expiration
  • Testing out Cross-Region Azure Load Balancer
  • How to Reduce your Azure Storage Accounts Spend
  • How to Configure an Azure Storage Account with an Application Gateway and Custom Domain
  • Active Directory Replication Summary to your Email

KNOWLEDGE ARTICLES

  • Dell Hardware/Software
  • Enterprise Operating Systems
  • Scripting Guides
  • Networking

GET IN TOUCH WITH US

Copyright © 2025 CR Tech – OnePress theme by FameThemes