The command below allows you to get the folder sizes of a specific mailbox:
Get-MailboxFolderStatistics <user name> | Select Name,FolderSize,ItemsinFolder
Friday, 16 October 2015
Friday, 9 October 2015
IT Security: DNS Sinkhole
A DNS sinkhole, also known as a sinkhole server, internet sinkhole, or BlackholeDNS is a DNS server that gives out false information, to prevent the use of the domain names it represents.
A sinkhole is a standard DNS server that has been configured to hand out non-routeable addresses for all domains in the sinkhole, so that every computer that uses it will fail to get access to the real website. The higher up the DNS server is, the more computers it will block. Some of the larger botnets have been made unusable by TLD sinkholes that span the entire Internet. DNS Sinkholes are effective at detecting and blocking malicious traffic, and used to combat bots and other unwanted traffic.
A sinkhole does not need to be a large DNS server, it only needs to be in the DNS lookup chain. The local hosts file on a Windows, Unix or Linux computer is checked before DNS servers, and can also be used to block sites in the same way.
Sinkholes can be used both constructively and destructively, depending on the target.
One use is to stop botnets, by interrupting the DNS names the botnet is programmed to use for coordination. The most common use of a hosts file-based sinkhole is to block ad serving sites.
A sinkhole is a standard DNS server that has been configured to hand out non-routeable addresses for all domains in the sinkhole, so that every computer that uses it will fail to get access to the real website. The higher up the DNS server is, the more computers it will block. Some of the larger botnets have been made unusable by TLD sinkholes that span the entire Internet. DNS Sinkholes are effective at detecting and blocking malicious traffic, and used to combat bots and other unwanted traffic.
A sinkhole does not need to be a large DNS server, it only needs to be in the DNS lookup chain. The local hosts file on a Windows, Unix or Linux computer is checked before DNS servers, and can also be used to block sites in the same way.
Sinkholes can be used both constructively and destructively, depending on the target.
One use is to stop botnets, by interrupting the DNS names the botnet is programmed to use for coordination. The most common use of a hosts file-based sinkhole is to block ad serving sites.
Microsoft: Unable to Delete Desktop Icon or Keep Coming Back
<< Error Message >>
Are you sure you want to Delete the icon/file/folder from your desktop/folder/drive?
To restore it later, Go to Display in Control Panel.
<< Solution >>
1. Open command prompt
2. Run the following commands:
@echo off
taskkill /F /IM explorer.exe
attrib -h "%userprofile%\Local Settings\Application Data\IconCache.db"
del "%userprofile%\Local Settings\Application Data\IconCache.db"
start explorer.exe
cls
echo Icon cache cleared!
pause
Are you sure you want to Delete the icon/file/folder from your desktop/folder/drive?
To restore it later, Go to Display in Control Panel.
<< Solution >>
1. Open command prompt
2. Run the following commands:
@echo off
taskkill /F /IM explorer.exe
attrib -h "%userprofile%\Local Settings\Application Data\IconCache.db"
del "%userprofile%\Local Settings\Application Data\IconCache.db"
start explorer.exe
cls
echo Icon cache cleared!
pause
* Note: The steps above are to rebuild the Windows icon cache.
Wednesday, 7 October 2015
Microsoft: View Date and Time of the Emails Moved to Deleted Items
If you know the approximate date when you deleted an item, add the Modified column to the Deleted Items folder view. Here's how:
a. On the View tab, in the Current View group, click View Settings.
b. Click Columns.
c. In the drop down list under Select available columns from, select Date/Time fields.
d. Select Modified and then click Add. If you want, you can change the order that the columns appear.
e. When you're finished, click OK.
Then you can sort by the Modified column to group items deleted on a specific date. This is a good way to find messages from a deleted folder because they would all have the same modified date.
a. On the View tab, in the Current View group, click View Settings.
b. Click Columns.
c. In the drop down list under Select available columns from, select Date/Time fields.
d. Select Modified and then click Add. If you want, you can change the order that the columns appear.
e. When you're finished, click OK.
Then you can sort by the Modified column to group items deleted on a specific date. This is a good way to find messages from a deleted folder because they would all have the same modified date.
Casper: Configuring Supported Ciphers for Tomcat HTTPS Connections
<< Error Messsage >>
"Server has a weak ephemeral Diffie-Hellman public key" or ERR_SSL_WEAK_EPHEMERAL_DH_KEY
<< Solution >>
1. Open the server.xml file in a text editor
The server.xml file is located in:
- Mac: /Library/JSS/Tomcat/conf/server.xml
- Linux: /usr/local/jss/tomcat/conf/server.xml
- Windows: C:\Program Files\JSS\Tomcat\conf\server.xml
* Note: It is recommended that you create a backup of the server.xml file before replacing the existing ciphers.
2. Search for the ciphers attribute in the Connector element for port="8443"
3. Replace the existing ciphers with the ciphers listed below. If the ciphers attribute is not present, add it to the Connector element
ciphers="TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"
* Note: In addition, if you are running Java 1.6 or a JDS instance in your environment, you must also include the following cipher:
TLS_RSA_WITH_AES_128_CBC_SHA
5. Save and close the server.xml file
6. Restart Tomcat
Tuesday, 6 October 2015
Microsoft: Remove an Email from All Mailboxes by Subject
To remove an email from all the mailboxes by subject, please follow the steps below:
1. Open Exchange Management Shell
2. Type in the commands below:
Add-RoleGroupMember "Discovery Management" -Member "User Name"
* Note: Replace the User Name with the person whom you want to give access to search and delete
3. Add the user in Mailbox Import Export Role by running the commands below in Exchange Management Shell:
New-Managementroleassignment –Role "Mailbox Import Export" –User "User Name"
* Note: Replace the User Name with the person whom you want to give access to search and delete
4. Close and reopen the Exchange Mangement Shell so that the new commands will start working
5. Type in the commands below to search and delete a specific email:
Get-MailBox -resultsize unlimited | Search-Mailbox -SearchQuery "Subject:'virus'" -DeleteContent
* Note: Replace the virus with the subject of the email you would like to search and delete
6. Type in A to search and delete from all the mailboxes
1. Open Exchange Management Shell
2. Type in the commands below:
Add-RoleGroupMember "Discovery Management" -Member "User Name"
* Note: Replace the User Name with the person whom you want to give access to search and delete
3. Add the user in Mailbox Import Export Role by running the commands below in Exchange Management Shell:
New-Managementroleassignment –Role "Mailbox Import Export" –User "User Name"
* Note: Replace the User Name with the person whom you want to give access to search and delete
4. Close and reopen the Exchange Mangement Shell so that the new commands will start working
5. Type in the commands below to search and delete a specific email:
Get-MailBox -resultsize unlimited | Search-Mailbox -SearchQuery "Subject:'virus'" -DeleteContent
* Note: Replace the virus with the subject of the email you would like to search and delete
6. Type in A to search and delete from all the mailboxes
Thursday, 1 October 2015
Microsoft: Cannot Connect to Remote Computer from Windows 2008 R2 to Windows 7
You are not allowed to use Server Manager to connect to a Windows 7 client computer. Please see the Remote Management with Server Manager.
Alternatively, you may connect with Computer Management.
Subscribe to:
Posts (Atom)