In this article we will go through configuration of Remote Desktop Shadowing. We will also discuss pros and cons of this approach, since it is not without the problems.
Read MoreHow to configure and debloat Microsoft Edge
Microsoft Edge is good and fast browser, but unfortunately bloated with so much stuff.
In this rather long article we are going to try and make it as clean as possible, getting rid of as many things as we can.
Read MoreHow to enable (and disable) automatic updates on Ubuntu 22.04
We will do quick tutorial on how to enable automatic security updating on Ubuntu. I like to have control on updates on most important machines, but updating takes a lot of time, and is sometimes time critical. So I like my less important machines to be automatically updated with security updates. Here is how I do it.
Read MoreImplementing Two-Tier PKI on Windows Server 2022 – Part 2
In part 1 of Two-Tier PKI implementation on Windows Server 2022 we did some introduction to PKI, you can check LAB config and offline Root CA setup. In this part we will go a bit further and work on Subordinate CA.
Read MoreImplementing Two-Tier PKI on Windows Server 2022 – Part 1
In modern environment everything is more or less dependent on certificates, we have more and more web based apps, that need some kind of certificates. On the other hand, web browsers are getting stricter and it is not easy anymore to get by with self signed certificates. Also, certificates for public certificate authorities are not appropriate for local domains. So, what should we do? We should create our own PKI infrastructure. I will try to explain how to do it in a series of articles…
Read More