Customizing the Windows Installer Media
How do you consistently deploy Windows unattended in an environment without network or server infrastructure?
How do you consistently deploy Windows unattended in an environment without network or server infrastructure?
Rdiff-backup is a robust and well-documented tool for performing reverse differential backups. It is particularly well suited for using Linux and SSH to perform incremental backups of remote Linux systems. This onezeroone.dev script automates the use of rdiff-backup to perform incremental backups of one or more remote Linux systems over SSH to a dedicated local volume. It will: For documentation […]
Uninstalling an AppxPackage will remove it from the current user’s start menu and applications list, but it will continue to appear for other users unless the AppxProvisionedPackage is also removed. Use ozo-remove-appx-packages in an Administrative PowerShell to loop through a list of AppxPackages and (a) remove each package for the current user and (b) remove corresponding AppxProvisionedPackage (when found). Relevant […]
This script interrogates the registry to determine if the user-defined subkey exists. If the key does not exist, it will be created. It will then create or update values according to a user-defined array containing lists of value names, values, and types: Obtain this script by cloning or downloading from GitHub where it is licensed under the GPL 2.0. Relevant […]
Overview Emulate an ARM processor on Intel using CentOS 7 and Qemu. Prerequisite Packages Qemu Cross-compilation Acquire Resources Create a working directory in your unprivileged user home directory and clone the raspbian kernel source: Also get the Raspbian toolchain: Download a current version of Raspbian from downloads.raspberrypi.org and unpack. This example uses Raspbian Lite 2020-02-14: Inspect the Raspbian Image The […]
The linux kernel includes a capable hybrid Type I/II Hypervisor referred to as the Kernel Virtualization Modules (KVM) which forms the basis for enterprise-class virtualization solutions such as Red Hat Enterprise Virtualization. While it may lack some of the features of other commercial and non-commercial solutions like VMWare, Hyper-V or Virtualbox, KVM offers support for a plethora of guest operating systems and […]
Whether you are deploying, evaluating, testing, and/or developing a web-based application; experimenting with Apache configuration; learning about web-based security technologies; or any of many other possible scenarios, you may find yourself needing to secure a web site with a TLS certificate (commonly referred to as an SSL certificate). Securing a web server with TLS is a multi-step process. The general […]
Loading