Automaticlly Extracting Downloaded Torrents

As every average geek, I too download torrents (containing only legal, copyright-free material, of course), and most of the time the torrents contain multi-file archives that contain the really juicy data.
A lot of times I return home and find some new torrent has completed downloading, but I have to ...

more ...

Remotely Viewing Machine Certificates With Minimal Permissions

We've started remotely monitoring our certificate stores on critical servers, and wanted the monitoring software to be able to remotely connect to our servers' personal certificate stores.
I quickly found a script to enumerate all certificates in a specific store on a remote computer:

function Get-Cert( $computer=$env:computername ...
more ...

Determining Size of all Tables in a Database

Just a quick SQL script to get the rowcount and size data of every table in the current database:

CREATE TABLE #sizeof (
 name varchar (70),
 [rows] int,
 reserved varchar(20),
 data varchar(20),
 index_size varchar(20),
 unused varchar(20),
)

DELCARE @name varchar(70)
DECLARE cur CURSOR FOR select name from ...
more ...

Creating proxied http requests with PowerShell

I'm working on some sort of HTTP proxy (maybe more details about it later), and to test it I've created a short PowerShell script.
Note it also performs basic authentication voluntarily (without waiting for a server challenge) by injecting an Authorization header, because I was testing something extra ...

more ...

Active Directory's Object Specific ACEs and PowerShell

I recently checked the option of handing out AD permissions through PowerShell scripts, and I found out that setting object-specific ACEs is not trivial scriptwise.
Active Directory ACE (access control entries) are different from your regular ACEs (for example, NTFS), because they can be used to grant permissions only on ...

more ...

Making sure your Audit Collection Server is collecting

A few days ago I wanted to make sure that my ACS (Audit Collection Server) is collecting events from all of my DCs.
For those unfamiliar with ACS, it's an additional component to SCOM (System Center Configuration Manager) that allows you to collect events from the security log of ...

more ...

Monitoring SharePoint 2010 on SCOM - Minimal Permissions

I've recently started monitoring my new SharePoint 2010 farms on SCOM, and found the management pack's documentation to be rather lacking in setup instructions, and the required permissions for SCOM's account on the farm were rather shocking:

  • Local admin on all SharePoint servers
  • Local admin on all ...
more ...

"The module ... owssvr.dll could not be loaded due to a configuration problem"

Recently, one of my teammates installed ArcGis Server 9.3 on our fresh SharePoint 2010 box, causing all sites to respond with 503 Service Unavailable. A quick inspection showed that the application pools have stopped themselves, and the Windows application event log was spammed with:

Event ID: 2282
Source: Microsoft-Windows-IIS-W3SVC-WP ...
more ...

Solving and preventing "Topology Discovery failed, error 0x80040a02"

Recently our Exchange 2003 environment broke down when we demoted our last ancient DCs. We panicked and re-promoted them, but no avail. The Exchange servers won't finish loading (they'd get stuck on "Applying computer settings", while actually waiting for the Microsoft Exchange System Attendant service to finish starting ...

more ...

Showing "Mail" icon in control panel through Group Policy

I recently had to lock down a Windows 2008R2 remote desktop server (terminal server)
One of the requirements was to show only some control panel items, a setting that can be achieved using the Group Policy setting "Show only specified Control Panel items" (under Policies > Administrative Templates > Control Panel), but ...

more ...