Set up a SFTP Chroot Jail on Ubuntu
If you want to lock user’s they want to upload, download and edit files from a web root directory, so…
Active Directory Certificate Mapping – Implicit vs. Explicit
In Active Directory you can use certificate mapping to bind an identity to a X.509 certificate, which then can be…
Set up a Key Recovery Server for the Microsoft certification authority (CA)
In this post I want tho show how to setup a key recovery server for your internal Windows CA (AD…
Configure certificate auto-enrollment
In this post I want to show how to configure certificate auto-enrollment. This topic is well documented from Microsoft. I…
Set up a RADIUS Server on Windows Server 2019 for 802.1X Wireless Connections
In this post I will show how to set up a RADIUS server on Windows Server 2019 to provide 802.1X…
Bypass Exchange Room Mailbox Delegation for specific Users
You can enable in Exchange delegation for booking requests against room mailboxes as follows. In this case each time a…
Using HTTP Strict Transport Security (HSTS) with Apache2
Securing the connection to a website by using a HTTP 301 Moved Permanently response status, to notify the user’s browser…
Numbering the IPv4 and IPv6 WAN Link between ISP and Customer
In this post I want to show the different alternatives Internet Service Provider (ISP) can use to numbering their IPv4 and…
pfSense Boot Loop after Power Outage
A few weeks ago I installed pfSense 2.5.2 on a kettop Mi4005L Mini PC. This Mini PC uses an Aptio…
Apache HTTP Server and .htaccess
In this post I want to summarize some information about securing your Apache websites. This topic is well documented from…