Configuring Network Interfaces in Linux
For us Windows guys, managing Linux systems can be a pain in the butt. Some simple things, like setting or changing network configurations are performed a little differently on Linux systems. Don't let the command line intimidate you, Windows guys! Here are a few ways to manage network settings fo...
VBScript: Dump AD Users to Excel
This handy little script will dump out your Active Directory users to an Excel spreadsheet. Simply run it with an account that has the necessary permissions to query AD, and it will do the rest, including notify you with a dialog box when it is done.
Pay Attention to your IT Guy
Recently, myself and a team of people performed a migration of a database from old and dying hardware to shiny new hotness. Some of the questions I got, well ...
Remove Ghosted NIC from a Windows VM
After performing a V2V, P2V or a clone operation in which the VHD/VHDX file is copied to a new VM, a new NIC is installed in the virtual machine. This is evidenced by the need to once again set the IP configuration of the NIC.
Create a VM Checkpoint in SCVMM
In a virtualized environment, we have the ability to create point-in-time snapshots, or checkpoints in Microsoft parlance, of virtual machines. This gives the ability to immediately roll back any changes after the checkpoint operation was performed. This is especially useful when debugging an application, or performing migrations and upgrades to applications.
WTF? Job Spam.
Any tech professional worth their salt is in the habit of updating their resume every once in awhile. I myself have a quarterly cycle; every three months, I update my info. Unfortunately, this generates a fresh round of spam from questionable headhunters.
Automated Log Archiving with WinRAR and Robocopy
In my day job, one of the things I do is maintenance of a farm of servers. All these boxes have local logging, which is picked up by Splunk. However, I still need to clean up those log files. Here is how I automated the process.