Lists Installed application installed on the server
WMIC /output:c:\Users\Installapps.txt product get name,version
List the CA Servers in Active Directory
certutil -config - -ping
Just found your podcast, I started on #49, but I was yelling at my player when you were talking about crafting the router scripts.
What you need is a macro processor, have a look at pyexpander, though there are lots of others. The simpler way would be to put some unique strings into the document like $IP-ADDRESS$ and then do a global replace on these strings. Sort of manual macro processor.
Handle the identity between services. Provide authentication and access management to OpenStack.
Provides a web interface and api to manage OpenStack instances.
Provide the compute (ie hypervisor) to run the instances. This run KVM. There is scheduler and conductor to automate the created and delete of instances.
Send messages between the services using Advanced Message Queuing Protocol (AMQP). I.E a user requests a new instance in Horizon. Message is sent via rabbitMQ to NOVA-conductor where an instance is created via NOVA-scheduler and then a message is then set back to Horizon once the instance has been created
Handles the networking stack, provides networks encapsulation (VXLAN),Firewalling Loadblancing and Floating IPs.
Hold images to provide to instance to transfer them to a nova services.
Provide charageback and telemetry of the resources used in OpenStack
Provides block storage to instances. Cinder can present mountable volumes to instances
Object Storage which developer can use API to access high available storage.
Bare metal provisioning of physical hardware to provide provisioning of nova hosts using IPMI (IE ILO) also can be used to power and shutdown physical hardware depending on hardware load.
Al: THE WORD FROM GOSTEV: Do you have a plan what to do when your network gets hit by a CryptoLocker? Because it is a matter of “if” not “when”, best is to be prepared. Of course, most of you will have Veeam backups – however, before you restore those, you need to find and kill the source of malware, right? And not everyone know how to proceed here. Usually, it is dead simple: just open properties of the decryption instructions file that gets created by ransomware, and see who is the file owner – this will usually point to the infected user/machine. If that does not help because the owner is a group (or ransomware is super smart), go to Computer Management snap-in on the file server with files being encrypted, and open Shares > Open Files. One of the users will have hundreds of open files, this would be it. Now, just disable that user and their computer account until the issue is resolved, and perform the restore from the latest Veeam backup!
BBC Micro at Primary School with LOGO and Chuckie Egg
CPC 6128 with colour screen and 3” disk.
Middle School – Acorn Archimedes – First Mouse
High School –
Apple Mac Plus
Apple – Macintosh Plus + External HD + Macintosh LC – CD Rom Drive with CD Caddy.
Windows 3.11 at colloeuge
First PC – Windows 95 P1 -150mmx
Windows 95 Plus
Andy Retro Computers
Amstrad CPC 464
Amiga 500 Plus
386 + 486SX
Jerry Retro Computers
ZX81 ZX Spectrum ATARI ST 1024 386 PC – Amstrad(!) PC (386) PC (486-DX) PC (Pentium of some kind?) PC (Athlon)