Found this interesting read on VMFS Extents and some of the (negative) myths that have arisen over the years:
https://blogs.vmware.com/vsphere/2012/02/vmfs-extents-are-they-bad-or-simply-misunderstood.html
Or: How IT rack cabling should be done...:
http://www.buzzfeed.com/lukebailey/satisfying-cables#.lrA32V2pV
Using ADUC, it can be quite a hassle to find and/or unlock AD accounts. Powershell solves this by providing some neat commands for a system administrator to use.
To list all locked out AD accounts:
Search-ADAccount -LockedOut
To get more info about these accounts, you can do a Full-List:
Search-ADAccount -LockedOut | FL
Furthermore, you can pipe the output to quickly unlock some/all AD accounts:
Search-ADAccount -LockedOut | Unlock-ADAccount
A very good guide on how to configure your Aerohive wireless network to use RADIUS authentication to authenticate users against a Windows Active Directory, and setting network access (VLAN) based on their group membership:
Sometimes, being an Administrator just isn't enough. In that case, try being the SYSTEM account... You can run processes as the local SYSTEM account quite easily with PsExec (64-bit).
Use it as follows:
psexec -i -s cmd.exe
The command above would run a command prompt as the SYSTEM account. You can replace cmd.exe with something else, although from a command prompt, you can basically run anything else, all as the SYSTEM account.
« ‹ | March 2024 | › » | ||||
Sun | Mon | Tue | Wed | Thu | Fri | Sat |
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 |