Writing shell scripts leaves a lot of room to make mistakes, in ways that will cause
your scripts to break on certain input, or (if some input is untrusted) open up security
vulnerabilities. Here are some tips on how to make your shell scripts safer.
Don't
The simplest step is to avoid using shell at all. Many higher-level languages are both
easier to write the code in in the first place, and avoid some of the issues that shell
...
Windows system administration is very mouse driven and to reach
all tools you need to browse through Windows explorer.
If you are like me and prefer to log on a limited privilege account and use Runas to perform admin tasks, you can open these consoles with the .msc file names.
Here is a list of admin tools with their .msc file names.
domain.msc: AD Domains and Trusts
...
Here a few web-links to interesting web apps.
It covers stuff about password security and checking if web sites
are down, etc etc.
Down For Everyone or Just Me:
If you're getting an error when visiting a certain site, it could be down or something could be wrong on your end. To see which
...
When using virtualisation it is very common to create template VMs
that can be cloned from. This makes deployment much easier than having
to install a new VM from scratch. Unfortunately, the cloned VMs lack
any Active Directory memberships and the VMs have to be manually
added to the AD domain. For automated deployment scenarios this is
less than desirable. This recipe intends to solve that issue in a
...