Design Document Revisions
I started this course late because I’m completing an incomplete from Fall 2019. Since the start of my semester, less than a week ago, I’ve… Read More »Design Document Revisions
Senior IT Support Manager at UNT CAS and has been a professional in IT for over 20 years. He love his family, likes his motorcycle, and figures IT out!
I started this course late because I’m completing an incomplete from Fall 2019. Since the start of my semester, less than a week ago, I’ve… Read More »Design Document Revisions
There are many ways to skin a cat, and with PowerShell, that’s no exception. I’m going to show you three ways that I’m familiar with to skin check if a file exists.
This post just serves as quick notes for dissemination amongst my colleagues. We recently allowed the Windows 10 1809 update via WSUS – needless to say, we were a bit hesitant to release round two of this update. So, we waited until after the phased rollout began on January 16. Anyway, per the norm, I went to download RSAT and realized that there wasn’t a download available for 1809.
Run quser.exe and return a proper PowerShell Object. I discussed this on my blog to enhance a StackOverflow answer. I ended up making this into… Read More »Quser Object
Like most sysadmins that manage a lot of computers, I have a need for startup scripts. Also, I deploy those startup scripts to the computer via GPO. However, I prefer to download those scripts to the machine and run them locally. This allows them to run even if the computer isn’t currently connected to the network, like a laptop that’s off-site.
I wanted a quick way to get a list of user sessions on our VDI servers. My exact goal was to get a list of users that were a day away from being forced off the system and sending them an email.
I was wanting to setup my server with bonded network interface cards (NICs). Since it took me a while to get the bond working, I thought I do some notes to self here; added benefit of sharing with you all.
I’ve been a long time fan of Google Authenticator because Multi-Factor Authentication (MFA) is a must in today’s easily compromised society. Unfortunately, Google Authenticator has been a struggle for many people, and I’m glad that I recently discovered Authy.
Bitcoin (BTC) is a form of digital currency, created and held electronically. No one controls it. Bitcoins aren’t printed, like dollars or euros – they’re produced by people, and increasingly businesses, running computers all around the world, using software that solves mathematical problems.
Looping through objects can be a pain, until you know what you’re doing. First thing you need to do is determine what kind of object you’re dealing with