With the launch of the Unicorn project, I revisited the Phoenix project. Seeing as my previous review was a mite lackluster, I decided to revisit that, too.
Thoughts on many things Posts
Improvise, adapt, overcome has for a long time been a mantra within armed forces around the world who, when faced with gruelling challenges and little or no epuipment, have improvised to face the challenge, adapted to the challenge and lastly overcome the challenge.
As has become my tradition, I would like to invite you to take a look at the year which is about to end with me, as it pertains to me, my life, and the blog.
For the fourth year running, I am writing a favorite discoveries post. This time around, I’ll highlight things that have made my life better in some way. The red thread here is information management, and each and every one of these has been featured at some point through the year.
A little while ago, I was asked about when a specific user last logged in with their active directory (AD) user account. While looking up that information was easily done, finding out how to look up the information was a mite more challenging. There are a number of ways of achieving it; including command line and Powershell commands. My preferred way of doing it is using the Attribute Editor in Active Directory Users and Computers (ADUC). Here’s how:
Among my many areas of responsibility at work, is contacting all the users found in various data breach lists that our InfoSec team get their hands on (typically, these are the same lists that eventually make their way to HIBP). Not unsurprisingly, there is a significant amount of overlap between some of these lists, and one of the things I do is to ensure that I do not contact users about passwords I’ve already talked to them about.
You may, for one reason or another, need to install Remote Server Administration Tools (RSAT) on your Windows client computer. You may want to perform administrative tasks in Active Directory Users and Computers, administer Certificates in Active Directory Certificate Services, or administer DNS or DHCP in DNS or DHCP Server Tools.
From time to time, I have found it useful to schedule the sending of emails, such as reminders to others about something, requests for updates and so on. Luckily, this is a feature which is easily available in GMail.
Change is arguably one of the riskiest behaviors within IT. Whenever we make a change, things tend to break. It is in no way coincidental that one of the foci of change management is post-change incidents, i.e. the errors introduced by the changes we make. I would go so far as to say that the only thing associated with higher risk than change is not changing.
For most users, the message headers of any given email are irrelevant; the email has arrived, and that is all there is to say about that. It does, however, have applications both in IT support and in information security. While those applications are outside the scope of this article, accessing the message header is not.