Press "Enter" to skip to content

Using Portainer to Deploy Guacamole Docker- Web-based Remote Access Gateway

john 0

Apache Guacamole is a clientless remote desktop gateway. It has been called clientless gateway because no plugins or client software are required. The utility offers a HTML5 interface that is used to start remote sessions. There is no other special client software need to be installed as long as you have a browser. The following popular protocols are supported, VNC,…

Using Group Policy to Deploy Software Packages (MSI, MST, EXE)

john 0

Group Policy is a feature of Windows Server using which admins can install software on all user computers. It can be done remotely without manual intervention. GPO is short for Group Policy. It becomes so popular among companies because it can make deployment clear and easy due to the technology of group policy.  1. Deploy Windows MSI or MST package…

Using NXLog to Collect Windows Event Logs

john 0

There are a lot of syslog collectors for Windows, but when it comes to stability and features, NXlog has the best chances to fulfill all the requirements. Windows EventLog allows multi-line messages, so this text is a lot more readable and nicely formatted by spaces, tabs and line-breaks as can be seen in Event Viewer. Because syslog only reads/writes single-line…

Windows Server Configuration Tips and Tricks

johnyan 0

Building a lab to test some Windows services , AD, DNS, DHCP, ADCS, etc. in my VMware ESXi 6 environment, to get it running smoothly and reduce some headache, I used following tricks to make my life easier. Most of work has to be done by Group Policy Management Editor. If you are running in a domain environment, create this…

Common Used Excel Formulas

john 0

一、数字处理 1、取绝对值 =ABS(数字) 2、取整 =INT(数字) 3、四舍五入 =ROUND(数字,小数位数) 二、判断公式 1、把公式产生的错误值显示为空 公式:C2 =IFERROR(A2/B2,””) 说明:如果是错误值则显示为空,否则正常显示。

Understanding Ping Command

johnyan 0

The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination computer and waiting for a response. How many of those responses are returned, and how long it takes for them to return, are the two major pieces of information that the ping command provides. ping /?

Deploy Symantec EndPoint Encryption 11.2.1 and Configure SEE to Encrypt Client Machines

johnyan 0

Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). I had a chance to install it in my lab environment for a testing. This post is kind of recording all…