Skip to content
TeckLyfe

TeckLyfe

We're your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To's.

  • Home
  • InfoSec
    • Server Hardening
    • Attacks
    • Malware
    • Pentest
    • Phishing
    • Ransomware
    • Virus
    • Zero-Day
  • SysAdmin
    • Cisco
    • Linux
    • Mac
    • Windows
  • Tech
    • Apps
    • Gadgets
    • Gaming
    • Internet
    • Mobile
      • Smartphone
    • OS
    • Tech Tips
  • Follow Us
    • Facebook
    • X aka Twitter
    • LinkedIn
    • YouTube
    • Reddit
    • RSS Feed

Category: System Administration

  • Home
  • System Administration
  • Page 16
How To Reset Active Directory User Password Expiration Date 1
Windows System Administration

How To Reset Active Directory User Password Expiration Date

Active Directory account passwords are usually set to expire (for example: every 90 days) in most organizations. Configuring an AD account with PasswordNeverExpires is not recommended due to security. There

November 4, 2016May 18, 2017
Continue Reading...
Fix Ubuntu TimeDateCTL NTP Sync No 2
Linux System Administration

Fix Ubuntu TimeDateCTL NTP Sync No

I recently came across an issue where an Ubuntu 14.04 LTS server wasn’t syncing the time so the jitter and drifting of the time wasn’t correcting itself. This caused issues

October 31, 2016November 7, 2016
Continue Reading...
How To Change Your DNS On Windows, Mac, or Linux 3
Technology Linux Mac Windows

How To Change Your DNS On Windows, Mac, or Linux

A DNS server resolves website URLs into their IP addresses, which is how the internet functions. Without DNS, we would be typing in IP addresses into our browsers instead of

October 21, 2016April 6, 2017
Continue Reading...
View All CPU Cores in Task Manager (Windows Server 2012 / Windows 10 ) 4
Windows System Administration

View All CPU Cores in Task Manager (Windows Server 2012 / Windows 10 )

Windows Server 2012 and Windows 10 came with a lot of changes to the task manager and in some cases the default views have been simplified further than power users

October 21, 2016
Continue Reading...
How To Patch Linux Kernel Zero Day DirtyCow Vulnerability CVE-2016-5195 5
Linux Security System Administration Zero-Day

How To Patch Linux Kernel Zero Day DirtyCow Vulnerability CVE-2016-5195

A zero-day local privilege escalation vulnerability has been found in the Linux kernel that has existed since 2005, being called DirtyCow. This bug affects a large number of popular Linux

October 21, 2016
Continue Reading...
How To Backup, Restore, and Import Group Policy Objects 6
Windows System Administration

How To Backup, Restore, and Import Group Policy Objects

As a Systems Administrator, you’ve probably worked with Group Policy before, especially if you’re in a Microsoft Windows environment. Group Policy allows you to push out settings to multiple computers

October 20, 2016
Continue Reading...
HTTP/2, HTTPS, Let’s Encrypt, NGINX and WordPress Hardening 7
Server Hardening Security System Administration

HTTP/2, HTTPS, Let’s Encrypt, NGINX and WordPress Hardening

If you’re running a WordPress site on a Linux server running NGINX, then you might be interested in setting up a free SSL (HTTPS) certificate using Let’s Encrypt. The internet

October 15, 2016January 16, 2017
Continue Reading...
Get A Report Of Active Directory User Accounts Whose Passwords Never Expire 8
Windows System Administration

Get A Report Of Active Directory User Accounts Whose Passwords Never Expire

As a Systems Administrator, it is always a good security measure to audit your Active Directory accounts on a regular basis. Tools like Netwrix can help automate this process by

October 10, 2016October 16, 2016
Continue Reading...
How To Stop macOS Sierra From Remembering Your SSH Key Passphrase 9
Mac System Administration

How To Stop macOS Sierra From Remembering Your SSH Key Passphrase

If you’re a systems administrator and you’ve recently upgraded to Apple’s macOS Sierra, you may have noticed that macOS now stores your SSH key passphrase by default, without even giving

October 7, 2016October 16, 2016
Continue Reading...
How To Reinitialize The Offline Cache in Windows 7, 8, 8.1, 10 10
Windows Tech Tips

How To Reinitialize The Offline Cache in Windows 7, 8, 8.1, 10

Sometimes you just have too many conflicts when synchronizing your offline files in Windows that you have to start over. In my case, I upgraded the file server to a

October 7, 2016October 16, 2016
Continue Reading...

Posts pagination

Previous 1 … 15 16 17 … 19 Next
  • About Us
  • Privacy Policy
  • Advertise With Us
  • Contact Us
We’re your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To’s.

Founded in 2000, TeckLyfe is based in Chicago, IL. Reproduction without explicit permission is prohibited.

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
© 2000-2025 - TeckLyfe.com - All Rights Reserved. Reproduction without explicit permission is prohibited.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}