Are remote PowerShell connections encrypted / secured in some form the way that SSH is?
leeand00's questions
So my understanding of it is like this, there are two types of backups, and they are Image Backups and Data / User File backups...
- Image Backups (System Backups / System State /Disaster Recovery Backups)
- The Creation Process
- Can be created with
Clonezilla
orntfsclone
orwbadmin
with System State backup using a vhd of xvhd. - Then if the Data / User File Backups are included in it, they can be removed by mounting the Image Backup, and removing the Data / User Files from it to save on space (see this)
- Can be created with
- What it Includes / Excludes
- Excludes the Data / User File Back
- Includes installed programs and OS system files.
- On Windows, you'll probably also want to remove any temp files from the image such as:
pagefile.sys
hiberfil.sys
swapfile.sys
- When?
- It's best to make this after you have the machine setup the way that you want with the programs already installed on it, and after updates are installed, you'll want to back it up again...this isn't always possible, but it's likely the best time to do this.
- The Creation Process
- Data / User File Backups (User File Backups)
- The Creation Process
- Usually a full backup is created and then incrementals or differentials after that (and of course use a strategy like GFS)
- When?
- Run more frequently than image backups, these backups are scheduled and run when few people are using the system...
- What it Includes / Excludes
- Only includes the data /user files, and it does not include any of the system files and program files like the Image Backup.
- The Creation Process
Then when you need to do disaster recovery, you restore the Image Backup first, and then when it's been recovered you add back in the Data / User File Backups to the system.
Is my understanding of this correct? Is there anything I missed?
I just realized there's a difference between these two after I had to change a privilege to change permissions on a folder (and then set them back again).
P.S. If this is a stupid question, I apologize I'm still figuring alot of these things out.
Sometimes I'll run a command like this, and I'll get back some easy to read, easy to interpret text:
PS D:\test> (get-acl test.txt).Access | Select FileSystemRights
FileSystemRights
----------------
Modify, Synchronize
...and other times I'll get back a number:
PS D:\test> (get-acl test2.txt).Access | Select FileSystemRights
FileSystemRights
----------------
268435456
What is the number, and what does it mean ?
How does one query an ldap attribute for a blank value? The equivalent of str1==null
in programming?
I tried the following but it didn't work:
(&(objectCategory=computer)(whenCreated>=20160101000000.0Z)(description=))
(&(objectCategory=computer)(whenCreated>=20160101000000.0Z)(description=''))
I'm reading two (link1, link2) articles on LDAP and they make mention of Relative Distinguished Name (RDN), Distinguished Name (DN) and CN which is supposed to be the same thing as an RDN.
I understand an RDN to be a key in a key-values pair for a node in an LDAP directed graph, but the author doesn't say much about what these terms mean...
I've received the error several times on Windows 7 Workstations and Laptops where it loses trust with the domain controller, and I know how to fix it, but why does it do that?
Sometimes over slow connections we switch to an older version of the protocol. I'd like to be able to check and see which version is being used, I only know how to set the version ala:
sc.exe config lanmanworkstation depend= bowser/mrxsmb10/nsi
sc.exe config mrxsmb20 start= disabled
How does one check the version of the protocol being used without using Powershell?
I've read that Containerization is cheaper than virtualization; I know that containerization uses less resources than virtualization since there's only one OS involved and no virtualized hardware.
But do I need a CPU that supports virtualization to run containerization such as Docker, or since it runs an app using the OS's libraries in a container, can I just run it on a CPU without virtualization?
I copied two trees, a source and a destination, that I copied with robocopy like this:
robocopy /MIR C:\Windows\System32\tasks\ C:\temp\robocopyTasks\out\
robocopy /E /Copy:S /IS /IT C:\Windows\System32\tasks\ C:\temp\robocopyTasks\out\
Then I compared the permission using icacls output the permissions on both, and the only difference seems to be that the original files contain a long string of characters which I've seen before; and I know it represents a user or a group in the system but I don't remember what it is called. The strings look like this:
S-X-X-XX-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXX
They can be matched with this regex in VIM:
/S-\d-\d-\d\{2\}-\d\{10\}-\d\{10\}\-\d\{9\}\-\d\{4\}/
When you right-click a program and hold down the shift key, an extra option is displayed "Run As Different User"
Conversely, my boss says that if you click "Run as Administrator" you have more power than if you login as a domain account. So what's the difference between these two options?
We have multiple ESXi servers managed by a vCenter; is there a way to get a list of all the snapshots in all the VMs?
A Windows DNS server can have extra data specified in it's DNS entry to alert certain machines of the location of specific types of servers...for instance an entry might have a some of this data that specifies:
- To a machine to be ghosted where the Fog server is
- Specify to an Allworx Handset where the Allworx server is,
- Or specify to a Windows KMS workstation with a generic key where the KMS server is.
I'm using powershell to get a list of services from several computers to see which ones use the administrator to run.
So far I have:
Get-wmiobject win32_service | Select -Property startName, Name, systemname
But it seems to me that this would only cover 32-bit services. How do I get a complete list of services from the Get-wmiobject
command in powershell?
We setup Windows users accounts with redirected profiles here at work, and in the past we have just logged in to the account to test them out. However, recently there has been a change in company policy that as the system administrator I am not allowed to log in to a user's account without the user being present (digitally or physically); even if it's a blank and new account.
How can I test that their account is being correctly redirected without logging into it?
Is it possible to give users the permissions in a Windows Server 2008 R2 domain to install Adobe Reader and Flash Updates on their Windows 7 machines? Or are they just stuck with calling on the administrator to install them all the time?
"For this, you need to obtain an IPv6 address from your ISP. Technically this could be a
/128
prefix (exactly one IPv6 address), but according to regulation it needs to be at least a/64
prefix."
from the OpenWRT Wiki
To what regulations are they referring? (So that if I need to defend myself when the time comes, I'll be able to point to something)
Possible Duplicate:
Switch to IPv6 and get rid of NAT? Are you kidding?
I'm thinking about the way that in IPv4 most of the time you have a single point to configure a firewall on, mainly your router, but if everybody has a Globally Accessible IP Address, doesn't that mean that each computer user is basically responsible for managing their own firewall?
(I mean I'll admit the same is true when using a public wifi access point, but still...)
I'm reading about how to configure IPv6 on Ubuntu, I've gotten to the section about Reading IPv6 Addresses and though the first two examples make sense to me, the last one escapes my grasp a bit, as it's been a few years since my last networking class:
How does one convert the third form into the long form?
Here is the example I am having trouble with:
- third form: - 2002::10:0.0.1
- long form: - 2002:0000:0000:0000:0000:0000:0a00:0001
- canonicalform: - 2002::a00:1
I understand hex so far as instead of ending up with the number ten when you count beyond nine you end up with A, B, C, D, E, and F before incrementing the digit in the next column.
Can you please show me how this works using math, not just some online JavaScript converter?
Thank you!