March 2022



  • VNC secure tunneling using Windows PuttY ssh client

    Category :

    Objective: Getting secure (and fast) connection from Windows environment to remote VNC server behind router/firewall  with ssh server installed. Achieved results: Secure connection to remote desktop using open source VNC or Tight VNC software (that is normally doesn’t encrypt traffic other than password). As a “side-effect”, shorter response times achieved due to ssh efficient traffic…

    Read more


  • Cannot attach a file to a mail through outlook web

    Category : ,

    If you cannot add attachments to your outlook web email (OWA) , check these tips: 1. This issue occurs because the attachment exceeds the message size limit. The default maximum message size for an attachment is 10 megabytes (MB). 2. One of the most common ways of transmitting computer viruses is through file attachments. To…

    Read more


  • Howto Sign PS Scripts in AD environment

    Category : ,

    PowerShell supports a concept called “execution policies” in order to help deliver a more secure command line administration experience.  Execution policies define the restrictions under which PowerShell loads files for execution and configuration.  The four execution policies are Restricted, AllSigned, RemoteSigned, and Unrestricted. The Restricted execution policy does not permit any scripts to run. The AllSigned and RemoteSigned…

    Read more


  • Howto Linux Modules

    Category : , ,

    How it works… Kernel modules are the drivers that your system’s hardware needs to communicate with the kernel and operating system (also, they are needed to load and enable filesystems). They are loaded dynamically, which means that only the drivers or modules are loaded at runtime, which reflects your own custom specific hardware. To begin,…

    Read more


  • Event ID: 2042 exceeded the tombstone lifetime. Replication has been stopped with this source

    Category :

    Tombstone lifetime When you delete an object from the Active Directory (AD) database, it’s marked as a tombstone object instead of being fully removed. By default, each tombstone object remains in the database for 180 days. Once this tombstone’s lifetime value is exceeded, the tombstone object is automatically deleted by the garbage collection process. Administrators…

    Read more


  • set hint.agp.0.disabled=1

    Category : ,

    The device.hints file is read in by the boot loader(8) when the system is about to start, and its contents are passed to the kernel. It contains various variables to control the boot behavior of the kernel. These variables are typically “device hints”, but can include any kernel tun- able values. The file contains one…

    Read more


  • [sssd[krb5_child[18654]: Disk quota exceeded

    Category : ,

    Linux Kernel Keyring Quota exceeded SSSD is the System Security Services Daemo and is responsible for managing user, group and login data. We still use UCS libpam-ldapand libnss-ldap,they all require a working network and are therefore not offline-capable, which is mandatory for a notebook. SSSD has a modular structure and, in addition to user and group data from the LDAP, can…

    Read more