#PowerShell Core for Linux
Explore tagged Tumblr posts
Text
System Administration Online Course: Master Modern IT with Gritty Tech
In today’s digitally driven world, efficient system management is critical for any business. A comprehensive System administration online course equips learners with the skills required to handle system networks, servers, security protocols, and more. Whether you’re aiming for a career upgrade or starting fresh in the tech field, and flexible learning experience For More…
Why Choose Gritty Tech for Your System Administration Online Course?
Top-Quality Education, Affordable Price
Gritty Tech stands out in the education sector for delivering high-quality learning at affordable rates. Our System administration online course is designed to provide exceptional training in core IT administration areas without overburdening your budget.
Global Tutor Network Spanning 110+ Countries
We bring together expert instructors from around the world. With a diverse team of seasoned professionals, Gritty Tech ensures your System administration online course is led by industry veterans with practical experience in managing modern infrastructure.
Flexible Payment and Satisfaction Policies
Learners can benefit from our monthly and session-wise payment models. We also offer an easy refund policy and tutor replacement options, reinforcing our commitment to student satisfaction. Our System administration online course is built around your needs.
What You Will Learn in the System Administration Online Course
Gritty Tech’s curriculum covers every key aspect needed to become a proficient system administrator. With real-world scenarios and hands-on labs, the course includes:
Linux and Windows server installation and configuration
Network architecture, monitoring, and troubleshooting
Security controls, firewalls, and user permissions
Data backup, system recovery, and storage solutions
Cloud platforms introduction and server virtualization
Task automation using scripting (Bash, PowerShell)
Managing Active Directory and DNS configurations
Each module in the System administration online course builds foundational expertise, reinforced by real-time assignments.
Who Should Take This Course
The System administration online course is ideal for:
Beginners entering the IT field
IT professionals aiming to upskill
Computer science students
Freelancers and consultants supporting IT operations
System engineers seeking certification
Career Paths After Completing the System Administration Online Course
With a solid foundation from our System administration online course, students can pursue rewarding roles such as:
System Administrator
IT Support Technician
Network Engineer
Cloud Operations Associate
DevOps Engineer
Server Security Analyst
Companies across industries depend on skilled system administrators to maintain robust and secure IT environments.
What Makes the Gritty Tech System Administration Online Course Stand Out
Experienced Tutors
Gritty Tech tutors are not just educators—they are working professionals with hands-on experience in systems management. Their real-world insights enhance the quality of your System administration online course journey.
Hands-On Projects and Labs
You will work with actual server environments and practice live configurations. These exercises provide a practical layer to your theoretical learning.
Interactive and Self-Paced
The System administration online course can be completed at your convenience. Whether you study full-time or part-time, the flexibility is built-in to support your schedule.
Certification Included
After successful completion of your System administration online course, you’ll receive a digital certificate from Gritty Tech, which you can share with potential employers or on professional platforms.
Real Student Support
From one-on-one mentoring to peer support, our System administration online course ensures you never feel isolated. Our global community provides an excellent platform for collaboration and discussion.
Related Topics Covered in the Course
The course doesn’t stop at systems. To help broaden your technical base, we integrate related training on:
Linux system administration
Windows server roles
Cloud administration fundamentals
Networking essentials
Cybersecurity basics
IT support workflows
Infrastructure monitoring tools
These modules complement the core lessons of the System administration online course, helping you become a versatile IT professional.
10 Most Asked Questions About the System Administration Online Course
What is a system administration online course?
A System administration online course teaches the principles and practices of managing IT systems and networks remotely via an interactive online format.
Who should take the system administration online course?
Anyone seeking a career in IT, especially those interested in maintaining servers, networks, and databases, should consider a System administration online course.
What will I learn in the system administration online course?
You’ll gain expertise in system configuration, network setup, user management, and IT troubleshooting through our System administration online course.
Is prior IT experience required for the system administration online course?
No prior experience is needed. The System administration online course is suitable for both beginners and intermediate learners.
How long is the system administration online course?
Most students complete the System administration online course within 6 to 10 weeks depending on their pace.
Does Gritty Tech provide certification after the course?
Yes, a verified certificate is awarded upon completing the System administration online course.
What tools are used in the system administration online course?
You’ll work with Linux, Windows Server, VMware, PowerShell, and various network monitoring tools during the System administration online course.
Can I change my tutor during the course?
Yes. We offer flexible tutor replacement options during your System administration online course.
What if I’m not satisfied with the course?
Gritty Tech provides an easy refund policy for learners who are unsatisfied with their System administration online course experience.
Can I pay in installments for the system administration online course?
Absolutely. We support monthly and session-wise payment plans to make the System administration online course more accessible.
Conclusion
Gritty Tech’s System administration online course is a comprehensive, flexible, and industry-relevant program that prepares you for success in IT systems management. With world-class tutors, real-time labs, affordable pricing, and a globally recognized certificate, you get everything you need to transform your career.
Whether you’re starting out or advancing in your IT journey, this System administration online course is your launchpad. Take the first step today and join a learning community that spans over 110 countries. Gritty Tech makes tech education not only possible—but powerful.
0 notes
Text
DeepSeek-R1-distilled 4bit量子化版をOllamaでGPU未使用の低スペックPCで動作させるための環境構築手順
前提条件 以下に、DeepSeek-R1の蒸留モデルをOllamaでGPU未使用の低スペックPCで動作させる手順を詳細に解説します。実際に検証済みの手順に基づいています。 OS: Windows 10/11 64bit または Linux(Ubuntu 22.04推奨) 最小要件: RAM: 4GB(8GB推奨) ストレージ: 2GBの空き容量 CPU: Intel Core i5(第4世代以降) / AMD Ryzen 3(第3世代以降) Ollamaのインストール # Windows(PowerShell) winget install ollama.ollama # Linux curl -fsSL <https://ollama.com/install.sh> | sh モデル準備(GGUF形式を使用) 公式リポジトリから量子化済みモデルをダウンロード: #…
0 notes
Text
TPM: A Guide to Understanding Your Computer’s Security Chip
What is Trusted Platform Module (TPM) A Trusted Platform Module (TPM) is a secure cryptoprocessor chip on your computer’s motherboard.
First Contact TPM for Windows The BitLocker drive encryption, the Virtual Smart Card features, and the Crypto Provider are among the security components of the Microsoft Windows operating system that depend on TPM-based capabilities. In fact, Trusted Platform Module 2.0 needs to be activated in ALL desktop and server variants of Windows 10 and 11. By using remote attestation in conjunction with the system’s Trusted Platform Module to allow Measured Boot, the configuration of the system is protected from undetectable threats like rootkits.
On Intel’s Windows machine, Intel can quickly verify some Trusted Platform Module details by navigating to the Security Devices area of the Device Manager screen.
TPM details by navigating to the Security Devices area of the Device Manager screen.
Now let’s engage with it. Now that a terminal window is open, let’s extract some basic system data. There are numerous powershell cmdlets available in Windows that can be used right away.
Get-Tpm retrieves the following data from the module:
Intel can also use this information to deduce some details about the underlying system: For instance, if the platform is equipped with and employing Platform Trust Technologies (PTT), “Intel” will appear in the manufacturer section here. Here, a Trusted Platform Module from the company STM is being used.
Intel must communicate with Windows Core Security features, namely the Trusted Platform Module Base Services software component and related API, in order to utilise the Trusted Platform Module from an application standpoint. Microsoft offers tools and wrappers to facilitate the integration of these processes more quickly.
Then intel will begin examining these after that.
Linux-based TPM First Contact Working with keys securely across any TPM 2.0 compatible module is made feasible by a set of standardised commands and libraries that enable the use of TPMs for key loading and storage in Linux.
At a high level, you can check if a TPM is present in the system by running the following command in the system log: dmesg | grep -i tpm.
Here is a step-by-step guide to several fundamental Linux system interactions: Required conditions: Install a TPM 2.0 chip on the target machine. Install TPM 2.0 software. These packages differ per Linux distribution.The tpm2-tools and tpm2-tss packages are popular. Initialise TPM: Initialise the TPM before using it. Initialise the TPM with tpm2 startup. Establish an Application Key: Create a key that is unique to your application and that you wish to keep in the TPM.You can use a software library like OpenSSL or a Trusted Platform Module library like tpm2-tools to generate this key.
The following is one method of generating an RSA keypair: RSA algorithm -out appkey.pem -openssl genpkey
Fill the TPM with the Key: To load your application-specific key into the TPM, use the TPM 2.0 tools. For this, you’ll usually use the tpm2 load command: tpm2 load -C appkey.pub -r appkey.priv -u context.out This command saves the context of the key in the context.out file and loads it into the TPM. This context is necessary for using the key later on. Apply the resident key (TPM): You can use this commands or libraries such as tpm2-tss to execute cryptographic operations on the TPM-resident key when your programme needs to access it. To sign data using the TPM key, for instance, run the following commands: tpm2 sign -c context.out -g sha256 -m data.txt -s signature.bin Using the TPM-resident key, this command signs the data and stores the signature in signature.bin. Unload the Key (Optional): You can use the tpm2 flushcontext command to unload the TPM-resident key if you no longer require it: tpm2 flushcontext -c context.out. This releases the key’s associated TPM resources. Shutdown and Cleanup (Optional): You can use the tpm2 shutdown command to terminate the Trusted Platform Module once your programme has finished utilising it. Analysing TPM 2.0 thoroughly Advancements in Computer Security Trusted Platform Module (TPM) 2.0 hardware boosts computer security. It protects your system and encryption keys as a secure cryptoprocessor. Essential Features: Cryptographic Key Management: TPM 2.0 securely produces, stores, and utilises keys.Data encryption, digital signatures, and secure communication require these keys. TPM 2.0’s hardware isolation makes key theft and tampering much harder than with software-based systems.
Platform Integrity Validation: Trusted Platform Module 2.0 monitors firmware and other critical software. It looks for any unauthorised changes that might point to malware or efforts at tampering. TPM 2.0 can protect your data by stopping the system from booting if something suspect is found.
Platform Attestation: The firmware and software of your system can be reported on using Trusted Platform Module 2.0. Other security measures or reliable organisations can use these reports, known as attestations, to confirm the integrity of the system. This is useful for secure boot environments and for assessing a system’s health prior to allowing access to resources that are sensitive.
Benefits of TPM 2.0: BitLocker Drive TPM 2.0 securely holds encryption keys, strengthening encryption and other functions. This makes data access tougher for unauthorised parties, even if they reach your device.
Enhanced Platform Security: Your system will boot with authentic, unaltered firmware and software thanks to the platform integrity checks. This lessens the chance that malware will compromise your system remotely.
More Robust User Authentication: Trusted Platform Module 2.0 can be paired with Windows Hello and other comparable technologies to provide more reliable two-factor authentication. By requiring a physical factor in addition to a password, like a fingerprint or facial recognition, this strengthens security. TPM 2.0, Win11:
Microsoft says Windows 11 needs Trusted Platform Module 2.0. This shows how crucial hardware-based security capabilities are becoming in the battle against more complex assaults. The good news is that TPM 2.0 functionality is probably pre-installed on the majority of PCs made in the last few years. It may, however, be inactive by default in the BIOS settings.
Beyond the Fundamentals: Flexibility: TPM 2.0 takes a “library” approach, in contrast to its predecessor. This implies that Trusted Platform Module 2.0 features can be selected by manufacturers based on what best meets their device and security requirements. Wider acceptance across multiple platforms from laptops to embedded systems is made possible by this versatility.
Future-Proofing: Expansion is a key design principle of TPM 2.0. As security risks evolve, it supports the installation of new functions and algorithms. This guarantees that Trusted Platform Module 2.0 will continue to be applicable and useful when new security threats arise.
Read more on Govindhtech.com
#TrustedPlatformModule#tpm#intel#windows10#windows11#windows#microsoft#technology#technews#news#govindhtech
0 notes
Text
Recensione del Fodenn Mini PC F10: Performance Potenti e Design Compatto

Recensione del Fodenn Mini PC F10: Performance Potenti e Design Compatto
Il Fodenn Mini PC F10 è una soluzione compatta e potente per le esigenze di computing di oggi. Con un design che sposa eleganza e funzionalità, questo mini PC offre prestazioni all'avanguardia grazie al processore Intel di 12a generazione Alder Lake-N95.
Performance Potenti e Affidabili: Il cuore di questo mini PC è il processore Intel Alder Lake-N95, con 4 core e 4 thread e una cache intelligente da 6 MB, capace di raggiungere una frequenza massima di 3,4 GHz. Questo assicura una fluidità nelle operazioni e una reattività senza precedenti, con un incremento delle prestazioni fino al 20% rispetto ai processori precedenti.
Espansione della Memoria e dello Spazio di Archiviazione: Dotato di 16GB di RAM DDR4 e un veloce SSD M.2 SATA da 512GB, il Fodenn F10 offre la potenza e lo spazio necessari per gestire le attività più impegnative. Inoltre, è possibile espandere lo spazio di archiviazione fino a 2TB aggiungendo un HDD da 2,5" (non incluso), garantendo così un'elevata capacità di archiviazione per file, documenti e applicazioni.
Visualizzazione in 4K su Due Schermi: Con la grafica condivisa Intel UHD Graphics e due porte HDMI, il Fodenn F10 supporta la visualizzazione in 4K su due schermi contemporaneamente, offrendo un'esperienza visiva eccezionale per l'home office, lo studio o l'intrattenimento.
Connessioni Veloci e Stabili: Dotato di connessioni Wi-Fi dual-band 2.4G e 5.0G, Bluetooth 4.2 e Gigabit Ethernet, il F10 assicura trasferimenti dati rapidi e connessioni stabili per un'esperienza senza interruzioni. È inoltre compatibile con una vasta gamma di dispositivi di input e output, come mouse, tastiere, cuffie e monitor.
Porte Ricche e Versatili: Con 2 porte USB 2.0, 2 porte USB 3.0, 1 porta Gigabit Ethernet e ingressi per audio, il Fodenn F10 offre una vasta gamma di opzioni di connessione per soddisfare le esigenze quotidiane. È possibile collegare facilmente più dispositivi contemporaneamente, rendendo questo mini PC estremamente versatile e funzionale.
Conclusioni: Il Fodenn Mini PC F10 offre prestazioni eccezionali in un formato compatto e elegante. Con il suo processore Intel di ultima generazione, ampio spazio di archiviazione e connettività avanzata, è la scelta ideale per coloro che cercano un mini PC potente e affidabile per le proprie esigenze di computing. Acquista ora tramite il nostro link di affiliazione Amazon per un'esperienza di shopping conveniente e sicura. Acquista qui.
Articoli recenti
Multa Apple UE: Regole App Store sullo Streaming Musicale, Ricorso in arrivo
Linux supera il 4% di quota di mercato per la prima volta, secondo Statcounter
Apple presenta i nuovi MacBook Air da 13 e 15 pollici con processore M3
Microsoft aggiorna script PowerShell per risolvere errore 0x80070643 causato dagli aggiornamenti KB5034441/KB5034440 di WinRE
Microsoft aggiorna KB5034441/KB5034440: Risoluzione dell’errore 0x80070643
Snake Info Stealer: Nuovo Malware Python per Rubare Informazioni Diffuso Attraverso Messaggi su Facebook
Recensione del Samsung 990 EVO SSD: Prestazioni Potenziate e Risparmio Energetico
Recensione del Tablet Android 13 Pazhonz: Prestazioni Potenziate e Versatilità per Tutte le Esigenze
0 notes
Text
Get the Last Password Change Date Using PowerShell in Microsoft 365
Table of Contents One of the key components of security is managing passwords. Password management is a critical aspect of maintaining security in the digital realm. In this comprehensive guide, we will discuss various methods for checking the last password change date in Microsoft 365.There are three methods for checking the last password change date in Microsoft 365: Using the Entra admin centerUsing Microsoft Graph PowerShell SDKUsing Microsoft Graph API Using the Entra admin center 1. Visit the Entra admin center then login using an administrative account.2. Navigate to Users | All users | Manage view | Edit columns. 3. Select the option Last password change date time from the list. Now the last password change date time is shown. Using the Microsoft Graph PowerShell SDK The second way is using Microsoft Graph PowerShell SDK. This method requires you to install some PowerShell modules on your machine. But, if you're familiar with the other Microsoft modules such as MSOL, ExchangeOnlineManagement, AzureAD...this is a good option.1. Install the required Microsoft Graph PowerShell SDK module by opening PowerShell as administrator then run the following command: Install-Module -Name Microsoft.Graph.Users -Scope CurrentUser 2. Getting the user’s information requires a certain level of permissions to be granted to the Microsoft Graph Command Line Tools application. So, in this case, we need to connect to Graph PowerShell with the following scopes: Connect-MgGraph -Scopes "User.Read.All" To get the last password change date for a particular user, use this Microsoft Graph PowerShell script: # Get the user information $properties = @('DisplayName','UserPrincipalName','AccountEnabled','lastPasswordChangeDateTime') $userId = '[email protected]' $result = Get-MgUser -UserId $userId -Property $properties # Get the user's last password change date and time $result | Select-Object $properties Similarly, to get the last password change date timestamp of all users, use the following PowerShell script: $properties = @('DisplayName','UserPrincipalName','AccountEnabled','lastPasswordChangeDateTime') Get-MgUser -All -Property $properties | Select-Object $properties This information can be very helpful for administrators who need to monitor user accounts and ensure their passwords are secure. To export the last password change date for all users to a CSV file, here is the PowerShell script: # Set the properties to retrieve $properties = @( "id", "displayName", "userprincipalname", "lastPasswordChangeDateTime", "mail", "jobtitle", "department" ) # Retrieve the password change date timestamp of all users $result = Get-MgUser -All -Property $Properties | Select-Object $properties $result | Format-Table # Export to CSV # $result | Export-Csv -Path "C:TempPasswordChangeTimeStamp.csv" -NoTypeInformation Using Microsoft Graph REST API Alternatively, we can use the Microsoft Graph Rest API to export the last time password change of all users in a Microsoft 365 tenant. When using this method:We don't need to install any modules of the Microsoft Graph PowerShell SDK (~ 80 modules).We can do it from any computer with Microsoft PowerShell or PowerShell Core installed (Linux and macOS are supported with PowerShell 7+ installed).Use the native PowerShell cmdlet Invoke-RestMethod to make a request.Instead of using an account for authentication and authorization, we use the app-only access (access without a user).Important: Before you begin, make sure you've created an app registration in Microsoft entra admin center and collect some required information such as clientId, tenantId and the clientSecret.Once the app has been created, replace your app's information (clientId, tenantId and the clientSecret) into the below code. Steps in the script:Get access token ($token) with app registration client secret.Create the request header ($headers) for API call.Create requests to the Microsoft Graph resource ($userEndpoint) with pagination to get all data.Build the report ($result) from API call response.Output options to console, graphical grid view or export to CSV file. # Define variables $clientId = "xxxxxxxxxxxxxxxxxxxx" $clientSecret = "xxxxxxxxxxxxxxxxxxxx" $tenantId = "xxxxxxxxxxxxxxxxxxxx" # Get OAuth token $tokenEndpoint = "https://login.microsoftonline.com/$tenantId/oauth2/v2.0/token" $body = @ client_id = $clientId client_secret = $clientSecret grant_type = "client_credentials" scope = "https://graph.microsoft.com/.default" $response = Invoke-RestMethod -Method Post -Uri $tokenEndpoint -Body $body # Extract access token $accessToken = $response.access_token # Create the request header for API call $headers = @ "Authorization" = "Bearer $accessToken" "Content-Type" = "application/json" $userEndpoint = "https://graph.microsoft.com/v1.0/users?`$select=DisplayName,UserPrincipalName,AccountEnabled,lastPasswordChangeDateTime&`$top=100" #Perform pagination if next page link (odata.nextlink) returned $result = @() while ($null -ne $userEndpoint) $response = Invoke-RestMethod -Method GET -Uri $userEndpoint -Headers $headers $users = $response.value ForEach($user in $users) $Result += New-Object PSObject -property $([ordered]@ DisplayName = $user.displayName UserPrincipalName = $user.userPrincipalName AccountEnabled = $user.AccountEnabled lastPasswordChangeDateTime = $user.lastPasswordChangeDateTime ) $userEndpoint = $response.'@odata.nextlink' # Output options to console, graphical grid view or export to CSV file. $result | Format-Table # $result | Out-GridView # $result | Export-CSV "C:Result.csv" -NoTypeInformation -Encoding UTF8
0 notes
Text
Let me guess, "PowerShell" is .NET Framework and "PowerShell 7" is .NET Core/.NET, isn't it?
On Windows I've been using "right click -> open with powershell", and I haven't looked into which one runs when I do that, but I'll pay attention next time I'm at work.
At home I'm on Linux Mint, and using PowerShell on Linux is probably gonna be weird, but I'm gonna see how it goes.
@powershell-official Any recommendations for resources, tutorials, introductions to PowerShell?
4 notes
·
View notes
Link
#.NET#.NETCore#ASP.NET#ASP.NETCore#Microsoft#OpenSource#PowerShell#PowerShellCore#TypeScript#VisualStudioCode
2 notes
·
View notes
Text
SSH Shell

Price: KiTTY is free to use. KiTTY is an SSH client that is based on PuTTY’s 0.71 version.
The Secure Shell extension works with non-Google HTTP-to-SSH proxies via proxy hooks, and third-party application nassh-relay can use those hooks to enable the Secure Shell extension to establish an SSH connection over XMLHttpRequest or WebSocket transport.
Ssh Shell For Mac
Ssh Shell Mac
Ssh Shell Script Example
Ssh Shell For Windows
SSH.NET is a Secure Shell (SSH-2) library for.NET, optimized for parallelism. This project was inspired by Sharp.SSH library which was ported from java and it seems like was not supported for quite some time. This library is a complete rewrite, without any third party dependencies, using parallelism to achieve the best.
This is quite a common task for Linux system administrators, when it is needed to execute some command or a local Bash script from a one Linux workstation or a server on another remote Linux machine over SSH.
In this article you will find the examples of how to execute a remote command, multiple commands or a Bash script over SSH between remote Linux hosts and get back the output (result).
This information will be especially useful for ones, who want to create a Bash script that will be hosted locally on a one Linux machine but would be executed remotely on the other hosts over SSH.
Cool Tip: Connect to a remote SSH server without typing a password! Configure a passwordless authentication! Only 3 easy steps! Read more →
SSH: Execute Remote Command
Execute a remote command on a host over SSH:
Examples
Get the uptime of the remote server:
Reboot the remote server:
SSH: Run Multiple Remote Commands
Ssh Shell For Mac
In the most cases it is not enough to send only one remote command over SSH.
Much more often it is required to send multiple commands on a remote server, for example, to collect some data for inventory and get back the result.
There are a lot of different ways of how it can be done, but i will show the most popular of them.
Run multiple command on a remote host over SSH:
– or –
– or –
Cool Tip: SSH login is too slow? This can be fixed easily! Get rid of delay during authentication! Read more →
Examples
Get the uptime and the disk usage:
Get the memory usage and the load average:
Show the kernel version, number of CPUs and the total RAM:
SSH: Run Bash Script on Remote Server
The equally common situation, when there is some Bash script on a Linux machine and it needs to connect from it over SSH to another Linux machine and run this script there.
The idea is to connect to a remote Linux server over SSH, let the script do the required operations and return back to local, without need not to upload this script to a remote server.
Certainly this can be done and moreover quite easily.
Cool Tip: Want to ROCK? Start a GUI (graphical) application on a remote Linux workstation over SSH! Read more →
Example
Execute the local script.sh on the remote server:
-->
Secure Shell (SSH) allows you to remotely administer and configure your Windows IoT Core device
Using the Windows 10 OpenSSH client
Important
The Windows OpenSSH client requires that your SSH client host OS is Windows 10 version 1803(17134). Also, the Windows 10 IoT Core device must be running RS5 Windows Insider Preview release 17723 or greater.
The OpenSSH Client was added to Windows 10 in 1803 (build 17134) as an optional feature. To install the client, you can search for Manage Optional Features in Windows 10 settings. If the OpenSSH Client is not listed in the list of installed features, then choose Add a feature.
Next select OpenSSH Client in the list and click Install.
Ssh Shell Mac
To login with a username and password use the following command:
Where host is either the IP address of the Windows IoT Core device or the device name.
The first time you connect you see a message like the following:
Type yes and press enter.
If you need to login as DefaultAccount rather than as administrator, you will need to generate a key and use the key to login. From the desktop that you intend to connect to your IoT Device from, open a PowerShell window and change to your personal data folder (e.g cd ~)
Register the key with ssh-agent (optional, for single sign-on experience). Note that ssh-add must be performed from a folder that is ACL'd to you as the signed-in user (BuiltinAdministrators and the NT_AUTHORITYSystem user are also ok). By default cd ~ from PowerShell should be sufficient as shown below.
Tip
If you receive a message that the ssh-agent service is disabled you can enable it with sc.exe config ssh-agent start=auto
To enable single sign, append the public key to the Windows IoT Core device authorized_keys file. Or if you only have one key you copy the public key file to the remote authorized_keys file.
If the key is not registered with ssh-agent, it must be specified on the command line to login:
If the private key is registered with ssh-agent, then you only need to specify DefaultAccount@host:
The first time you connect you see a message like the following:
Type yes and press enter.
You should now be connected as DefaultAccount
To use single sign-on with the administrator account, append your public key to c:dataProgramDatasshadministrators_authorized_keys on the Windows IoT Core device.
You will also need to set the ACL for administrators_authorized_keys to match the ACL of ssh_host_dsa_key in the same directory.
To set the ACL using PowerShell
Note
If you see a REMOTE HOST IDENTIFICATION CHANGED message after making changes to the Windows 10 IoT Core device, then edit C:Users<username>.sshknown_hosts and remove the host that has changed.

See also: Win32-OpenSSH
Using PuTTY
Download an SSH client
In order to connect to your device using SSH, you'll first need to download an SSH client, such as PuTTY.
Ssh Shell Script Example
Connect to your device
In order to connect to your device, you need to first get the IP address of the device. After booting your Windows IoT Core device, an IP address will be shown on the screen attached to the device:
Now launch PuTTY and enter the IP address in the Host Name text box and make sure the SSH radio button is selected. Then click Open.
If you're connecting to your device for the first time from your computer, you may see the following security alert. Just click Yes to continue.
If the connection was successful, you should see login as: on the screen, prompting you to login. Enter Administrator and press enter. Then enter the default password p@ssw0rd as the password and press enter.
If you were able to login successfully, you should see something like this:
Update account password
It is highly recommended that you update the default password for the Administrator account.
Ssh Shell For Windows
To do this, enter the following command in the PuTTY console, replacing [new password] with a strong password:
Configure your Windows IoT Core device
To be able to deploy applications from Visual Studio 2017, you will need to make sure the Visual Studio Remote Debugger is running on your Windows IoT Core device. The remote debugger should launch automatically at machine boot time. To double check, use the tlist command to list all the running processes from PowerShell. There should be two instances of msvsmon.exe running on the device.
It is possible for the Visual Studio Remote Debugger to time out after long periods of inactivity. If Visual Studio cannot connect to your Windows IoT Core device, try rebooting the device.
If you want, you can also rename your device. To change the 'computer name', use the setcomputername utility:
You will need to reboot the device for the change to take effect. You can use the shutdown command as follows:
Commonly used utilities
See the Command Line Utils page for a list of commands and utilities you can use with SSH.

1 note
·
View note
Text
Plot twist you have WINE or .NET or worse powershell core installed in Linux ¯\_(ツ)_/¯

#linux#centos#ubuntu#debian#sysadmin#IT#devlife#devhumor#programmers humor#infosec#security#windows10#microsoft
18 notes
·
View notes
Text
Sqlite For Mac Os X
Sqlite For Mac Os X El Capitan
Sqlite Viewer Mac
Sqlite Mac Os X Install
If you are looking for an SQLite Editor in the public domain under Creative Commons license or GPL (General Public License) i.e. for free commercial or non-commercial use. Then here is a shortlist of the SQLite Editor that is available on the web for free download.
SQLite is famous for its great feature zero-configuration, which means no complex setup or administration is needed. This chapter will take you through the process of setting up SQLite on Windows, Linux and Mac OS X. Install SQLite on Windows. Step 1 − Go to SQLite download page, and download precompiled binaries from Windows section. Core Data is an object graph and persistence framework provided by Apple in the macOS and iOS operating systems.It was introduced in Mac OS X 10.4 Tiger and iOS with iPhone SDK 3.0. It allows data organized by the relational entity–attribute model to be serialized into XML, binary, or SQLite stores. The data can be manipulated using higher level objects representing entities. Requirements: Free, ideally open source Browse schema, data. Run queries Bonus if updated in near real time when the file is. SQLite viewer for Mac OS X. Ask Question Asked 5 years, 10 months ago. Active 4 years, 3 months ago. Viewed 504 times 3. I need to inspect an SQLite file on Mac. Since I develop on Windows, Linux and OS X, it helps to have the same tools available on each. I also tried SQLite Admin (Windows, so irrelevant to the question anyway) for a while, but it seems unmaintained these days, and has the most annoying hotkeys of any application I've ever used - Ctrl-S clears the current query, with no hope of undo.
These software work on macOS, Windows, Linux and most of the Unix Operating systems.
SQLite is the server. The SQLite library reads and writes directly to and from the database files on disk. SQLite is used by Mac OS X software such as NetNewsWire and SpamSieve. When you download SQLite and build it on a stock Mac OS X system, the sqlite tool has a.
1. SQLiteStudio
Link : http://sqlitestudio.pl/
SQLiteStudio Database manager has the following features :
A small single executable Binary file, so there is need to install or uninstall.
Open source and free - Released under GPLv2 licence.
Good UI with SQLite3 and SQLite2 features.
Supports Windows 9x/2k/XP/2003/Vista/7, Linux, MacOS X, Solaris, FreeBSD and other Unix Systems.
Language support : English, Polish, Spanish, German, Russian, Japanese, Italian, Dutch, Chinese,
Exporting Options : SQL statements, CSV, HTML, XML, PDF, JSON, dBase
Importing Options : CSV, dBase, custom text files, regular expressions
UTF-8 support

2. Sqlite Expert
Link : http://www.sqliteexpert.com/download.html
SQLite Expert though not under public domain, but its free for commercial use and is available in two flavours.
a. Personal Edition
Sqlite For Mac Os X El Capitan
It is free for personal and commercial use but, covers only basic SQLite features.
But its a freeware and does not have an expiration date.
b. Professional Edition
It is for $59 (onetime fee, with free lifetime updates )
It covers In-depth SQLite features.
But its a freeware and does not have an expiration date.
Features :
Visual SQL Query Builder : with auto formatting, sql parsing, analysis and syntax highlighting features.
Powerful restructure capabilities : Restructure any complex table without losing data.
Import and Export data : CSV files, SQL script or SQLite. Export data to Excel via clipboard.
Data editing : using powerful in-place editors
Image editor : JPEG, PNG, BMP, GIF and ICO image formats.
Full Unicode Support.
Support for encrypted databases.
Lua and Pascal scripting support.
3. Database Browser for SQLite
Link : http://sqlitebrowser.org/
Database Browser for SQLite is a high quality, visual, open source tool to create, design, and edit database files compatible with SQLite.
Database Browser for SQLite is bi-licensed under the Mozilla Public License Version 2, as well as the GNU General Public License Version 3 or later.
You can modify or redistribute it under the conditions of these licenses.
Features :
You can Create, define, modify and delete tables
You can Create, define and delete indexes
You can Browse, edit, add and delete records
You can Search records
You can Import and export records as
You can Import and export tables from/to text, CSV, SQL dump files
You can Issue SQL queries and inspect the results
You can See Log of all SQL commands issued by the application
4. SQLite Manager for Firefox Browser
Link : https://addons.mozilla.org/en-US/firefox/addon/sqlite-manager/
This is an addon plugin for Firefox Browser,
Features :
Manage any SQLite database on your computer.
An intuitive hierarchical tree showing database objects.
Helpful dialogs to manage tables, indexes, views and triggers.
You can browse and search the tables, as well as add, edit, delete and duplicate the records.
Facility to execute any sql query.
The views can be searched too.
A dropdown menu helps with the SQL syntax thus making writing SQL easier.
Easy access to common operations through menu, toolbars, buttons and context-menu.
Export tables/views/database in csv/xml/sql format. Import from csv/xml/sql (both UTF-8 and UTF-16).
Possible to execute multiple sql statements in Execute tab.
You can save the queries.
Support for ADS on Windows
Sqlite Viewer Mac
More Posts related to Mac-OS-X,
More Posts:
Sqlite Mac Os X Install
Facebook Thanks for stopping by! We hope to see you again soon. - Facebook
Android EditText Cursor Colour appears to be white - Android
Disable EditText Cursor Android - Android
Connection Failed: 1130 PHP MySQL Error - MySQL
SharePoint Managed Metadata Hidden Taxonomy List - TaxonomyHiddenList - SharePoint
Execute .bin and .run file Ubuntu Linux - Linux
Possible outages message Google Webmaster tool - Google
Android : Remove ListView Separator/divider programmatically or using xml property - Android
Unable to edit file in Notepad++ - NotepadPlusPlus
SharePoint PowerShell Merge-SPLogFile filter by time using StartTime EndTime - SharePoint
SQLite Error: unknown command or invalid arguments: open. Enter .help for help - Android
JBoss stuck loading JBAS015899: AS 7.1.1.Final Brontes starting - Java
Android Wifi WPA2/WPA Connects and Disconnects issue - Android
Android Toolbar example with appcompat_v7 21 - Android
ERROR x86 emulation currently requires hardware acceleration. Intel HAXM is not installed on this machine - Android
1 note
·
View note
Photo
hydralisk98′s web projects tracker:
Core principles=
Fail faster
‘Learn, Tweak, Make’ loop
This is meant to be a quick reference for tracking progress made over my various projects, organized by their “ultimate target” goal:
(START)
(Website)=
Install Firefox
Install Chrome
Install Microsoft newest browser
Install Lynx
Learn about contemporary web browsers
Install a very basic text editor
Install Notepad++
Install Nano
Install Powershell
Install Bash
Install Git
Learn HTML
Elements and attributes
Commenting (single line comment, multi-line comment)
Head (title, meta, charset, language, link, style, description, keywords, author, viewport, script, base, url-encode, )
Hyperlinks (local, external, link titles, relative filepaths, absolute filepaths)
Headings (h1-h6, horizontal rules)
Paragraphs (pre, line breaks)
Text formatting (bold, italic, deleted, inserted, subscript, superscript, marked)
Quotations (quote, blockquote, abbreviations, address, cite, bidirectional override)
Entities & symbols (&entity_name, &entity_number,  , useful HTML character entities, diacritical marks, mathematical symbols, greek letters, currency symbols, )
Id (bookmarks)
Classes (select elements, multiple classes, different tags can share same class, )
Blocks & Inlines (div, span)
Computercode (kbd, samp, code, var)
Lists (ordered, unordered, description lists, control list counting, nesting)
Tables (colspan, rowspan, caption, colgroup, thead, tbody, tfoot, th)
Images (src, alt, width, height, animated, link, map, area, usenmap, , picture, picture for format support)
old fashioned audio
old fashioned video
Iframes (URL src, name, target)
Forms (input types, action, method, GET, POST, name, fieldset, accept-charset, autocomplete, enctype, novalidate, target, form elements, input attributes)
URL encode (scheme, prefix, domain, port, path, filename, ascii-encodings)
Learn about oldest web browsers onwards
Learn early HTML versions (doctypes & permitted elements for each version)
Make a 90s-like web page compatible with as much early web formats as possible, earliest web browsers’ compatibility is best here
Learn how to teach HTML5 features to most if not all older browsers
Install Adobe XD
Register a account at Figma
Learn Adobe XD basics
Learn Figma basics
Install Microsoft’s VS Code
Install my Microsoft’s VS Code favorite extensions
Learn HTML5
Semantic elements
Layouts
Graphics (SVG, canvas)
Track
Audio
Video
Embed
APIs (geolocation, drag and drop, local storage, application cache, web workers, server-sent events, )
HTMLShiv for teaching older browsers HTML5
HTML5 style guide and coding conventions (doctype, clean tidy well-formed code, lower case element names, close all html elements, close empty html elements, quote attribute values, image attributes, space and equal signs, avoid long code lines, blank lines, indentation, keep html, keep head, keep body, meta data, viewport, comments, stylesheets, loading JS into html, accessing HTML elements with JS, use lowercase file names, file extensions, index/default)
Learn CSS
Selections
Colors
Fonts
Positioning
Box model
Grid
Flexbox
Custom properties
Transitions
Animate
Make a simple modern static site
Learn responsive design
Viewport
Media queries
Fluid widths
rem units over px
Mobile first
Learn SASS
Variables
Nesting
Conditionals
Functions
Learn about CSS frameworks
Learn Bootstrap
Learn Tailwind CSS
Learn JS
Fundamentals
Document Object Model / DOM
JavaScript Object Notation / JSON
Fetch API
Modern JS (ES6+)
Learn Git
Learn Browser Dev Tools
Learn your VS Code extensions
Learn Emmet
Learn NPM
Learn Yarn
Learn Axios
Learn Webpack
Learn Parcel
Learn basic deployment
Domain registration (Namecheap)
Managed hosting (InMotion, Hostgator, Bluehost)
Static hosting (Nertlify, Github Pages)
SSL certificate
FTP
SFTP
SSH
CLI
Make a fancy front end website about
Make a few Tumblr themes
===You are now a basic front end developer!
Learn about XML dialects
Learn XML
Learn about JS frameworks
Learn jQuery
Learn React
Contex API with Hooks
NEXT
Learn Vue.js
Vuex
NUXT
Learn Svelte
NUXT (Vue)
Learn Gatsby
Learn Gridsome
Learn Typescript
Make a epic front end website about
===You are now a front-end wizard!
Learn Node.js
Express
Nest.js
Koa
Learn Python
Django
Flask
Learn GoLang
Revel
Learn PHP
Laravel
Slim
Symfony
Learn Ruby
Ruby on Rails
Sinatra
Learn SQL
PostgreSQL
MySQL
Learn ORM
Learn ODM
Learn NoSQL
MongoDB
RethinkDB
CouchDB
Learn a cloud database
Firebase, Azure Cloud DB, AWS
Learn a lightweight & cache variant
Redis
SQLlite
NeDB
Learn GraphQL
Learn about CMSes
Learn Wordpress
Learn Drupal
Learn Keystone
Learn Enduro
Learn Contentful
Learn Sanity
Learn Jekyll
Learn about DevOps
Learn NGINX
Learn Apache
Learn Linode
Learn Heroku
Learn Azure
Learn Docker
Learn testing
Learn load balancing
===You are now a good full stack developer
Learn about mobile development
Learn Dart
Learn Flutter
Learn React Native
Learn Nativescript
Learn Ionic
Learn progressive web apps
Learn Electron
Learn JAMstack
Learn serverless architecture
Learn API-first design
Learn data science
Learn machine learning
Learn deep learning
Learn speech recognition
Learn web assembly
===You are now a epic full stack developer
Make a web browser
Make a web server
===You are now a legendary full stack developer
[...]
(Computer system)=
Learn to execute and test your code in a command line interface
Learn to use breakpoints and debuggers
Learn Bash
Learn fish
Learn Zsh
Learn Vim
Learn nano
Learn Notepad++
Learn VS Code
Learn Brackets
Learn Atom
Learn Geany
Learn Neovim
Learn Python
Learn Java?
Learn R
Learn Swift?
Learn Go-lang?
Learn Common Lisp
Learn Clojure (& ClojureScript)
Learn Scheme
Learn C++
Learn C
Learn B
Learn Mesa
Learn Brainfuck
Learn Assembly
Learn Machine Code
Learn how to manage I/O
Make a keypad
Make a keyboard
Make a mouse
Make a light pen
Make a small LCD display
Make a small LED display
Make a teleprinter terminal
Make a medium raster CRT display
Make a small vector CRT display
Make larger LED displays
Make a few CRT displays
Learn how to manage computer memory
Make datasettes
Make a datasette deck
Make floppy disks
Make a floppy drive
Learn how to control data
Learn binary base
Learn hexadecimal base
Learn octal base
Learn registers
Learn timing information
Learn assembly common mnemonics
Learn arithmetic operations
Learn logic operations (AND, OR, XOR, NOT, NAND, NOR, NXOR, IMPLY)
Learn masking
Learn assembly language basics
Learn stack construct’s operations
Learn calling conventions
Learn to use Application Binary Interface or ABI
Learn to make your own ABIs
Learn to use memory maps
Learn to make memory maps
Make a clock
Make a front panel
Make a calculator
Learn about existing instruction sets (Intel, ARM, RISC-V, PIC, AVR, SPARC, MIPS, Intersil 6120, Z80...)
Design a instruction set
Compose a assembler
Compose a disassembler
Compose a emulator
Write a B-derivative programming language (somewhat similar to C)
Write a IPL-derivative programming language (somewhat similar to Lisp and Scheme)
Write a general markup language (like GML, SGML, HTML, XML...)
Write a Turing tarpit (like Brainfuck)
Write a scripting language (like Bash)
Write a database system (like VisiCalc or SQL)
Write a CLI shell (basic operating system like Unix or CP/M)
Write a single-user GUI operating system (like Xerox Star’s Pilot)
Write a multi-user GUI operating system (like Linux)
Write various software utilities for my various OSes
Write various games for my various OSes
Write various niche applications for my various OSes
Implement a awesome model in very large scale integration, like the Commodore CBM-II
Implement a epic model in integrated circuits, like the DEC PDP-15
Implement a modest model in transistor-transistor logic, similar to the DEC PDP-12
Implement a simple model in diode-transistor logic, like the original DEC PDP-8
Implement a simpler model in later vacuum tubes, like the IBM 700 series
Implement simplest model in early vacuum tubes, like the EDSAC
[...]
(Conlang)=
Choose sounds
Choose phonotactics
[...]
(Animation ‘movie’)=
[...]
(Exploration top-down ’racing game’)=
[...]
(Video dictionary)=
[...]
(Grand strategy game)=
[...]
(Telex system)=
[...]
(Pen&paper tabletop game)=
[...]
(Search engine)=
[...]
(Microlearning system)=
[...]
(Alternate planet)=
[...]
(END)
4 notes
·
View notes
Text
Microsoft Releases PowerShell Core for Linux as a Snap Package - #Ankaa
Microsoft Releases PowerShell Core for Linux as a Snap Package Microsoft’s love for Linux continues… Microsoft has released its command-line shell and scripting language PowerShell Core for Linux operating system as a Snap package, making it easier for Linux users to install Microsoft PowerShell on their system. Yes, you heard me right. Microsoft has ... https://ankaa-pmo.com/microsoft-releases-powershell-core-for-linux-as-a-snap-package/ #Linux #Linux_Snap_Package #Linux_Software #Microsoft_PowerShell_Core #Powershell #PowerShell_Core #PowerShell_Core_For_Linux #Snap_Package #Ubuntu
#Linux#Linux Snap Package#Linux Software#Microsoft PowerShell Core#powershell#PowerShell Core#PowerShell Core for Linux#Snap Package#Ubuntu#Actualités#Sécurité de l'information et du SI#Sécurité de l’information#Sécurité du système d’information
0 notes
Text
Bryan Strauch is an Information Technology specialist in Morrisville, NC
Resume: Bryan Strauch
[email protected] 919.820.0552(cell)
Skills Summary
VMWare: vCenter/vSphere, ESXi, Site Recovery Manager (disaster recovery), Update Manager (patching), vRealize, vCenter Operations Manager, auto deploy, security hardening, install, configure, operate, monitor, optimize multiple enterprise virtualization environments
Compute: Cisco UCS and other major bladecenter brands - design, rack, configure, operate, upgrade, patch, secure multiple enterprise compute environments.
Storage: EMC, Dell, Hitachi, NetApp, and other major brands - connect, zone, configure, present, monitor, optimize, patch, secure, migrate multiple enterprise storage environments.
Windows/Linux: Windows Server 2003-2016, templates, install, configure, maintain, optimize, troubleshoot, security harden, monitor, all varieties of Windows Server related issues in large enterprise environments. RedHat Enterprise Linux and Ubuntu Operating Systems including heavy command line administration and scripting.
Networking: Layer 2/3 support (routing/switching), installation/maintenance of new network and SAN switches, including zoning SAN, VLAN, copper/fiber work, and other related tasks around core data center networking
Scripting/Programming: SQL, Powershell, PowerCLI, Perl, Bash/Korne shell scripting
Training/Documentation: Technical documentation, Visio diagramming, cut/punch sheets, implementation documentations, training documentations, and on site customer training of new deployments
Security: Alienvault, SIEM, penetration testing, reporting, auditing, mitigation, deployments
Disaster Recovery: Hot/warm/cold DR sites, SAN/NAS/vmware replication, recovery, testing
Other: Best practice health checks, future proofing, performance analysis/optimizations
Professional Work History
Senior Systems/Network Engineer; Security Engineer
September 2017 - Present
d-wise technologies
Morrisville, NC
Sole security engineer - designed, deployed, maintained, operated security SIEM and penetration testing, auditing, and mitigation reports, Alienvault, etc
responsibility for all the systems that comprise the organizations infrastructure and hosted environments
main point of contact for all high level technical requests for both corporate and hosted environments
Implement/maintain disaster recovery (DR) & business continuity plans
Management of network backbone including router, firewall, switch configuration, etc
Managing virtual environments (hosted servers, virtual machines and resources)
Internal and external storage management (cloud, iSCSI, NAS)
Create and support policies and procedures in line with best practices
Server/Network security management
Senior Storage and Virtualization Engineer; Datacenter Implementations Engineer; Data Analyst; Software Solutions Developer
October 2014 - September 2017
OSCEdge / Open SAN Consulting (Contractor)
US Army, US Navy, US Air Force installations across the United States (Multiple Locations)
Contract - Hurlburt Field, US Air Force:
Designed, racked, implemented, and configured new Cisco UCS blade center solution
Connected and zoned new NetApp storage solution to blades through old and new fabric switches
Implemented new network and SAN fabric switches
Network: Nexus C5672 switches
SAN Fabric: MDS9148S
Decommissioned old blade center environment, decommissioned old network and storage switches, decommissioned old SAN solution
Integrated new blades into VMWare environment and migrated entire virtual environment
Assessed and mitigated best practice concerns across entire environment
Upgraded entire environment (firmware and software versions)
Security hardened entire environment to Department of Defense STIG standards and security reporting
Created Visio diagrams and documentation for existing and new infrastructure pieces
Trained on site operational staff on new/existing equipment
Cable management and labeling of all new and existing solutions
Implemented VMWare auto deploy for rapid deployment of new VMWare hosts
Contract - NavAir, US Navy:
Upgraded and expanded an existing Cisco UCS environment
Cable management and labeling of all new and existing solutions
Created Visio diagrams and documentation for existing and new infrastructure pieces
Full health check of entire environment (blades, VMWare, storage, network)
Upgraded entire environment (firmware and software versions)
Assessed and mitigated best practice concerns across entire environment
Trained on site operational staff on new/existing equipment
Contract - Fort Bragg NEC, US Army:
Designed and implemented a virtualization solution for the US ARMY.
This technology refresh is designed to support the US ARMY's data center consolidation effort, by virtualizing and migrating hundreds of servers.
Designed, racked, implemented, and configured new Cisco UCS blade center solution
Implemented SAN fabric switches
SAN Fabric: Brocade Fabric Switches
Connected and zoned new EMC storage solution to blades
Specific technologies chosen for this solution include: VMware vSphere 5 for all server virtualization, Cisco UCS as the compute platform and EMC VNX for storage.
Decommissioned old SAN solution (HP)
Integrated new blades into VMWare environment and migrated entire environment
Physical to Virtual (P2V) conversions and migrations
Migration from legacy server hardware into virtual environment
Disaster Recovery solution implemented as a remote hot site.
VMware SRM and EMC Recoverpoint have been deployed to support this effort.
The enterprise backup solution is EMC Data Domain and Symantec NetBackup
Assessed and mitigated best practice concerns across entire environment
Upgraded entire environment (firmware and software versions)
Security hardened entire environment to Department of Defense STIG standards and security reporting
Created Visio diagrams and documentation for existing and new infrastructure pieces
Trained on site operational staff on new equipment
Cable management and labeling of all new solutions
Contract - 7th Signal Command, US Army:
Visited 71 different army bases collecting and analyzing compute, network, storage, metadata.
The data collected, analyzed, and reported will assist the US Army in determining the best solutions for data archiving and right sizing hardware for the primary and backup data centers.
Dynamically respond to business needs by developing and executing software solutions to solve mission reportable requirements on several business intelligence fronts
Design, architect, author, implement in house, patch, maintain, document, and support complex dynamic data analytics engine (T-SQL) to input, parse, and deliver reportable metrics from data collected as defined by mission requirements
From scratch in house BI engine development, 5000+ SQL lines (T-SQL)
Design, architect, author, implement to field, patch, maintain, document, and support large scale software tools for environmental data extraction to meet mission requirements
Large focus of data extraction tool creation in PowerShell (Windows, Active Directory) and PowerCLI (VMWare)
From scratch in house BI extraction tool development, 2000+ PowerShell/PowerCLI lines
Custom software development to extract data from other systems including storage systems (SANs), as required
Perl, awk, sed, and other languages/OSs, as required by operational environment
Amazon AWS Cloud (GovCloud), IBM SoftLayer Cloud, VMWare services, MS SQL engines
Full range of Microsoft Business Intelligence Tools used: SQL Server Analytics, Reporting, and Integration Services (SSAS, SSRS, SSIS)
Visual Studio operation, integration, and software design for functional reporting to SSRS frontend
Contract - US Army Reserves, US Army:
Operated and maintained Hitachi storage environment, to include:
Hitachi Universal Storage (HUS-VM enterprise)
Hitachi AMS 2xxx (modular)
Hitachi storage virtualization
Hitachi tuning manager, dynamic tiering manager, dynamic pool manager, storage navigator, storage navigator modular, command suite
EMC Data Domains
Storage and Virtualization Engineer, Engineering Team
February 2012 – October 2014
Network Enterprise Center, Fort Bragg, NC
NCI Information Systems, Inc. (Contractor)
Systems Engineer directly responsible for the design, engineering, maintenance, optimization, and automation of multiple VMWare virtual system infrastructures on Cisco/HP blades and EMC storage products.
Provide support, integration, operation, and maintenance of various system management products, services and capabilities on both the unclassified and classified network
Coordinate with major commands, vendors, and consultants for critical support required at installation level to include trouble tickets, conference calls, request for information, etc
Ensure compliance with Army Regulations, Policies and Best Business Practices (BBP) and industry standards / best practices
Technical documentation and Visio diagramming
Products Supported:
EMC VNX 7500, VNX 5500, and VNXe 3000 Series
EMC FAST VP technology in Unisphere
Cisco 51xx Blade Servers
Cisco 6120 Fabric Interconnects
EMC RecoverPoint
VMWare 5.x enterprise
VMWare Site Recovery Manager 5.x
VMWare Update Manager 5.x
VMWare vMA, vCops, and PowerCLI scripting/automation
HP Bladesystem c7000 Series
Windows Server 2003, 2008, 2012
Red Hat Enterprise and Ubuntu Server
Harnett County Schools, Lillington, NC
Sr. Network/Systems Administrator, August 2008 – June 2011
Systems Administrator, September 2005 – August 2008
Top tier technical contact for a 20,000 student, 2,500 staff, 12,000 device environment District / network / datacenter level design, implementation, and maintenance of physical and virtual servers, routers, switches, and network appliances
Administered around 50 physical and virtual servers, including Netware 5.x/6.x, Netware OES, Windows Server 2000, 2003, 2008, Ubuntu/Linux, SUSE, and Apple OSX 10.4-10.6
Installed, configured, maintained, and monitored around 175 HP Procurve switches/routers Maintained web and database/SQL servers (Apache, Tomcat, IIS and MSSQL, MySQL) Monitored all network resources (servers, switches, routers, key workstations) using various monitoring applications (Solarwinds, Nagios, Cacti) to ensure 100% availability/efficiency Administered workstation group policies and user accounts via directory services
Deployed and managed applications at the network/server level
Authored and implemented scripting (batch, Unix) to perform needed tasks
Monitored server and network logs for anomalies and corrected as needed
Daily proactive maintenance and reactive assignments based on educational needs and priorities Administered district level Firewall/IPS/VPN, packet shapers, spam filters, and antivirus systems Administered district email server and accounts
Consulted with heads of all major departments (finance, payroll, testing, HR, child nutrition, transportation, maintenance, and the rest of the central staff) to address emergent and upcoming needs within their departments and resolve any critical issues in a timely and smooth manner Ensure data integrity and security throughout servers, network, and desktops
Monitored and corrected all data backup procedures/equipment for district and school level data
Project based work through all phases from design/concept through maintenance
Consulted with outside contractors, consultants, and vendors to integrate and maintain various information technologies in an educational environment, including bid contracts
Designed and implemented an in-house cloud computing infrastructure utilizing a HP Lefthand SAN solution, VMWare’s ESXi, and the existing Dell server infrastructure to take full advantage of existing technologies and to stretch the budget as well as provide redundancies
End user desktop and peripherals support, training, and consultation
Supported Superintendents, Directors, all central office staff/departments, school administration offices (Principals and staff) and classroom teachers and supplementary staff
Addressed escalations from other technical staff on complex and/or critical issues
Utilized work order tracking and reporting systems to track issues and problem trends
Attend technical conferences, including NCET, to further my exposure to new technologies
Worked in a highly independent environment and prioritized district needs and workload daily Coordinated with other network admin, our director, and technical staff to ensure smooth operations, implement long term goals and projects, and address critical needs
Performed various other tasks as assigned by the Director of Media and Technology and
Superintendents
Products Supported
Microsoft XP/Vista/7 and Server 2000/2003/2008, OSX Server 10.x, Unix/Linux
Sonicwall NSA E8500 Firewall/Content filter/GatewayAV/VPN/UTM Packeteer 7500 packet shaping / traffic management / network prioritization
180 HP Procurve L2/L3 switches and HP Procurve Management Software
Netware 6.x, Netware OES, SUSE Linux, eDirectory, Zenworks 7, Zenworks 10/11
HP Lefthand SAN, VMWare Server / ESXi / VSphere datacenter virtualization
Solarwinds Engineer Toolset 9/10 for Proactive/Reactive network flow monitoring
Barracuda archiving/SPAM filter/backup appliance, Groupwise 7/8 email server
Education
Bachelor of Science, Computer Science
Minor: Mathematics
UNC School System, Fayetteville State University, May 2004
GPA: 3
High Level Topics (300+):
Data Communication and Computer Networks
Software Tools
Programming Languages
Theory of Computation
Compiler Design Theory
Artificial Intelligence
Computer Architecture and Parallel Processing I
Computer Architecture and Parallel Processing II
Principles of Operating Systems
Principles of Database Design
Computer Graphics I
Computer Graphics II
Social, Ethical, and Professional Issues in Computer Science
Certifications/Licenses:
VMWare VCP 5 (Datacenter)
Windows Server 2008/2012
Windows 7/8
Security+, CompTIA
ITILv3, EXIN
Certified Novell Administrator, Novell
Apple Certified Systems Administrator, Apple
Network+ and A+ Certified Professional, CompTIA
Emergency Medical Technician, NC (P514819)
Training:
Hitachi HUS VM
Hitachi HCP
IBM SoftLayer
VMWare VCP (datacenter)
VMWare VCAP (datacenter)
EMC VNX in VMWare
VMWare VDI (virtual desktops)
Amazon Web Services (AWS)
Emergency Medical Technician - Basic, 2019
EMT - Paramedic (pending)
1 note
·
View note
Text
Windows Terminal Preview 1910 released

Windows Terminal Preview 1910 released.
Updated UI
The Terminal now has even better tabs! The WinUI TabView used in the Terminal has been updated to version 2.2. This version has better color contrast, rounded corners on the dropdown, and tab separators. Also, when too many tabs fill the screen, you can now scroll through them with buttons!
Dynamic Profiles
Windows Terminal now automatically detects any Windows Subsystem for Linux (WSL) distribution installed on your machine along with PowerShell Core. If you install any of these after this update of the Terminal, they will appear in your profiles.json file!

NOTE: If you don’t want a profile to appear in your dropdown, you can set "hidden" to true in your profiles.json file. "hidden": true
Cascading Settings
The Terminal now has an improved settings model! It ships with a defaults.json file with all of the default settings included. If you’d like to see what’s included in the default settings file, you can hold down the Alt key and click on the settings button in the dropdown menu. This file is an auto-generated file and changes made to the file are ignored and overwritten. Your own profiles.json file is where you can add as many custom settings as you’d like. If you add a new profile, scheme, key binding, or global setting in your profiles.json, it’ll be treated as an added setting. If you create a new profile whose GUID matches an existing one, then your new profile will override the old one. If there is a default key binding included in the defaults.json file that you would like to free up, you can set that key binding to null in your profiles.json. { "command": null, "keys": }
New Launch Settings
You can now set the Terminal to launch as maximized or set its initial position! Setting the Terminal to launch as maximized can be done by adding the global setting "launchMode". This setting accepts either "default" or "maximized". "launchMode": "maximized" If you’d like to set the Terminal’s initial position, you can add "initialPosition" as a global setting. This property accepts a string with the X and Y coordinates separated by a comma. For example, if you’d like the Terminal to launch at the top left of your primary screen, you’d add the following to your profiles.json: "initialPosition": "0,0" NOTE: If you’re using multiple monitors and would like to set the Terminal to launch to the left or above your primary monitor, you will have to use negative coordinates.
Bug Fixes
You can now double-click on the tab bar to maximize the window!One of the main bugs causing newline issues with copy and paste has been fixed!HTML copy doesn’t leave the clipboard open anymore!You can now use font names longer than 32 characters!There is no longer text corruption when running two tabs at the same time!General stability improvements (less crashes)! Read the full article
1 note
·
View note
Text
IS Microsoft azure certification worth it?
Microsoft has leveraged its constantly-expanding worldwide network of data centers to create Azure, a cloud platform for building, deploying, and managing services and applications, anywhere. Azure lets you add cloud capabilities to your existing network through its platform as a service (PaaS) model, or entrust Microsoft with all of your computing and network needs with Infrastructure as a Service (IaaS). Either option provides secure, reliable access to your cloud hosted data — one built on Microsoft’s proven architecture. Azure provides an ever expanding array of products and services designed to meet all your needs through one convenient, easy to manage platform. Below are just some of the capabilities Microsoft offers through Azure and tips for determining if the Microsoft cloud is the right choice for your organization.

The Skills You Need to Learn Azure
Azure is known for being user-friendly, but it’s helpful to understand some related technologies before you dive head-first into a new platform. Here are some skills that will help you learn Azure:
Cloud computing: You should understand how core services like networking, databases, servers and software function in the cloud. Previous experience working with another cloud platform like Amazon Web Services (AWS) or Google Cloud will give you skills that transition to Azure.
Microsoft knowledge: Experience using products like Office 365 and PowerShell will help you understand how these services integrate with Azure.
Programming: If you plan on developing applications in Azure, knowledge of open-source frameworks like ASP.NET and programming languages like SQL Server, HTML5 and JavaScript will help you get ahead.
How to Learn Azure
These resources will help you learn the foundations of Microsoft Azure and prepare you to apply Azure skills in your profession.
LEARNING-AS-A-SERVICE
You can’t master Azure and cloud administration in just a few days. You need ongoing training, tools and resources to guide you through every new cloud obstacle and update.
1 Scale storage without spending a fortune
2 Enable remote access while protecting business data
3 Confidently protect your cloud business
4 Handle unexpected cloud challenges
And much more
MCSA: LINUX ON AZURE
This associate-level certification shows you have the knowledge to architect, implement and maintain complex cloud-enabled Linux solutions that use Azure open-source capabilities. It also shows you have Linux system administration skills.
§ Qualifications: Foundational IT skills
§ Suggested Preparation Course: Implementing Microsoft AzureInfrastructure Solutions
2 notes
·
View notes
Text
Windows Terminal Preview v1.17 disponível para download
A Microsoft anunciou esta semana a disponibilização do Windows Terminal Preview v1.17 (v1.17.1023), a app que permite aos utilizadores aceder num só local à PowerShell Core, PowerShell, Command Prompt, Windows Subsystem for Linux e Azure Cloud Shell. O Windows Terminal tem suporte para Separadores, Temas, Emojis e renderização de texto acelerada via GPU. (more…) “”
View On WordPress
#CMD#Microsoft#Powershell#Windows 10#Windows 11#Windows Subsystem for Linux#Windows Terminal Preview v1.17
0 notes