When a domain controller has been offline for more than the specified tombstone lifetime, it is considered bad and will no longer replicate properly with the other controllers.
When this happens, new users, groups, and other objects will not be synchronized anymore on this server. It can cause issues with emails sent to these new users. If the email server can still check for the user in the AD against the bad server, emails won’t be delivered since it thinks that the user does not exist.
Continue reading “Forcing Replication of AD Partitions after Tombstone Lifetime Exceeded”
Recently, I’ve been on a mission to tighten my company’s security presence, such as disabling SSL 3.0 and TLS 1.0 on all systems that don’t rely on the protocols and replacing self-signed certificates on management consoles with CA trusted certificates.
Continue reading “Loading a Signed Certificate on a Cisco WLC”
In a previous article, I mentioned storing important backups in the cloud. I’m generally cautious when it comes to storing private information on other people’s infrastructure. Although cloud providers can have pretty good standards in terms of security and privacy, I need a way to encrypt my data
Continue reading “Cloud Encryption using Cryptomator”
Looks like according to Laptop Mag, Apple is no longer the top rated laptop brand. In fact, Apple dropped five ranks from 1st place to 6th place behind Lenovo, Asus, Dell, HP, and Acer. Continue reading “Best & Worst Laptop Brands 2017”
Although this article may be a little late, this is a useful guide to keep on hand if servicing computers with Windows 7. I’ll update this article on details for Windows 8-10 once I have some free time to mess around with the Windows 10 installation media. Continue reading “Injecting Drivers into Windows Install Media”
I had the pleasure to build a PC for my brother this week. This is his first real PC and I wanted to be as loaded as possible for the budget. I also wanted to be sure this would last him many years to come. Continue reading “Matt’s PC”
Having a solid backup plan is as easy as 3-2-1. The best practice for having your important data be as safe as possible is to follow the 3-2-1 backup rule. Continue reading “The 3-2-1 Backup Strategy”