Admin Admin Podcast #026 – Office 365 Migration Part 1

This week it is only Al and Andy. We start a new series, where we discuss all thing Office 365 and the different ways to migrate to Office 365.

Links to show Notes : http://www.adminadminpodcast.co.uk/admin-admin-podcast-026-show-notes-office-365-migration-part-1/

 

Admin Admin Podcast #025 – Config management & code control

This week it is only Al and Jerry hosting. Jerry teaches us about config management & code control in Linux.

Links to show Notes : http://www.adminadminpodcast.co.uk/admin-admin-podcast-025-show-notes-config-management-code-control/

Admin Admin Podcast #023 – “top” of the Morning

We are back and on a roll! Al, Andy and Jerry tell you what we have been up to the last month since we have been away. A fun packed episode where we talk about onsite upgrades, Windows 8 tablets and backing up Linux to Amazon S3!

Links to the Show notes: http://www.adminadminpodcast.co.uk/admin-admin-podcast-023-show-notes-top-of-the-morning/

Admin Admin Podcast #021 – Get Auditing

This week we are a man down and we talk about all things auditing.

 

Admin Admin Podcast #020 – Knock off NUC’s

This week we ramble on about some more of what we have done over the last couple of weeks in the world of I.T.

  • No RDP after install SP1
https://social.technet.microsoft.com/Forums/windowsserver/en-US/f5855b60-f29c-4c90-b364-e364589e5267/svchostexetermservice-crashes-after-installation-of-kb2621440?forum=winservergen
http://support.microsoft.com/en-us/kb/958043

How to check if you need to reboot a Ubuntu box running apt-get

cat /var/run/reboot-required

if it requires a reboot it will say
*** System restart required ***

Admin Admin Podcast #019 – It’s all about the emails

This episode we went through our postbag and discussed the interesting emails we had received

Static routes in Windows 2008 R2 and above:

Shadowprotect:

Virtualization on Linux

Admin Admin Podcast #018 – Backups, Backups, Backups

This week we talk about why it’s important to have a backup plan.

Differential backups were the next step in the evolution of backup strategies. A differential backup backs up only the files that changed since the last full backup. For example, suppose you do a full backup on Sunday. On Monday you back up all the files that have changed since Sunday, on Tuesday you back up all the files that changed since Sunday.

Incremental backups also back up only the changed data, but they only back up the data that has changed since the last backup, even if that was an incremental backup, so if you only do a full backup on a Sunday, and you need to restore something on a Friday, you would likely need to restore Sunday+Mon+Tue+Wed+Thursday.

Reverse differential backups are interesting. Your most recent differential backup gets integrated into your full backup, pushing the changes out of the full. The next differential does the same. This means you can do a bang up to date restore from only the most recent backup. But you can still restore previous versions of files from the reverse diff files that were created. You need to tell your backup software to keep only a certain number of the reverse diff files, dependent upon the amount of storage you can allocate to backups.

https://www.youtube.com/TheClayfoxes/videos

Admin Admin Podcast #017 – Bits and Bobs

This week we don’t have a show topic, so instead just enjoy our ramblings about what we have been up to:

SSH / SCP / Public Private keys

Public key authentication is a key-based authentication method of authentication instead of using password authentication, which means you don’t have to give away system passwords to third parties.

Public key pair consists of two parts – a public key and private key. The private key sits on the device/server which you are connecting from (in my case the client/customers who are sending
files by FTP to my server).The public key from that client sits on my server and is assigned to users accounts who dial in to transfers their files. When the remote server connects it sends a message encrypted with the private key. My server decrypts the message with the public key to confirm the remote server is who it is saying it is and that the message which was sent was encrypted with the private key of the remote server.

The first time an SFTP client connects to an SFTP server, The SFTP server presents its SSH host key fingerprint before the Public Key authentication happens. Usually the SFTP application prompts the usages to save this fingerprint to a known host file. So that every time the SFTP clients connects to the SFTP server it compares this fingerprint with the fingerprint which the SFTP client sends. This confirms that SFTP client has connected to this SFTP server in the past and it knows to trust it.  As some SFTP clients are automated processes they can’t automatically add the host fingerprint to its own host file. The client might request a copy of the host fingerprint so they can manually add it to their known host file.

 

Admin Admin Podcast #016 – Totally Virtual

This week the hot topic is virtualization.

Admin Admin Podcast #015 – Site to Site VPNs

Our first episode for 2015 includes Office 365 and Site to Site VPNs