Zabbix can harnas the powers of WMI (Windows Management Instrumentation) to query the Windows system for data. In Zabbix you use wmi.getall for this. Here is a small introduction to query the number of running w3wp.exe processes per IIS application pool in Zabbix.
How-to disable Joomla’s built-in contact forms component and its ability to send a copy to the sender, directly in your MySQL database using phpMyAdmin.
If XCloner Logger option is enabled, it will store a log file inside the … Read More
Learn how to enable HSTS (HTTP Strict Transport Security) in Linux Apache .htaccess
Jamshed Damkewala writes on devblogs.microsoft.com: Starting in December 2020, we will be delivering .NET … Read More
How to install OpenSSH Server in Windows Server Core using PowerShell. In this tutorial, you’ll learn how to install Microsoft SSH Server in Windows Server 2022
Emulate ternary or conditional operator in PowerShell 5. It takes three operands: a condition followed by a question mark (?), then an expression to execute if the condition is truthy followed by a colon (:), and finally the expression to execute if the condition is falsy. This operator is frequently used as an alternative to an if…else statement.
No more need for Windows Server IIS? Want to remove IIS completely from Windows Server using PowerShell? Here is how. As a bonus, you’ll learn to create a backup first.
When WSUS downloads are slow. WSUS uses BITS for downloading updates, and it does so in background mode. Unfortunately, this utilizes remaining bandwidth of the server instead of its full capacity. To speed up WSUS downloads, you can configure BITS in WSUS to use foreground .
Securing privileged access is a critical first step to establishing security assurances for business assets in a modern organization. The security of most or all business assets in an IT organization depends on the integrity of the privileged accounts used to administer, manage, and develop. Cyber-attackers often target these accounts and other elements of privileged access to gain access to data and systems using credential theft attacks
This post helps you in setting up an not-so-standard (but fun) development environment for your static site created in Hugo. This was how to install and configure Hugo for static site development in WSL on Windows 11/10.
How to find all symbolic links, junction points and hard links in a folder in Windows Server quickly? Use dir /al /s /b, or LinkType in PowerShell
In recent days, there are a number of reports about broken Yoast SEO database … Read More
Often when a WordPress site is compromised, the website owner doesn’t notice anything strange at first. First a lot of users are created, and it’s only later when posts filled with spam are created or existing pages/posts edited. In the time between compromise and creation of spam posts, a website owner might notice an increased number of users. If he has the means to. And that’s what this little plugin does.
On a daily bases, new vulnerabilities are found in WordPress plugins. And when you … Read More