[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

NTFS File Permissions
An article explaining how to give user/group ability to create, edit, rename & delete files, but not create folders.
2
Microsoft Azure 2017
LVL 12
Microsoft Azure 2017

Azure has a changed a lot since it was originally introduce by adding new services and features. Do you know everything you need to about Azure? This course will teach you about the Azure App Service, monitoring and application insights, DevOps, and Team Services.

error "you are not authorized to do message tracking"
I added myself to local domain admins group in directory, but still got the same error.

is that something do check in mtstore.nsf ??
0
I am trying to create a GPO to deploy the remote desktop connection shortcut(mstsc.exe) on all users desktops on the domain.

This is what I have:
I went into system32 and made a copy of the mstsc.exe file.
I then pasted the mstsc.exe into a share that I have on my C drive on the domain controller.
The permissions all the way through the share are everyone and domain users.
I'm starting the GPO at the root of my domain it is configured as a user policy
I am running gpudate on the DC & the client workstation.

I have included screenshots of the configuration.

I have never done this before, can someone assist me with this configuration. I will provide any additional information you may need.
Thank you.




0
Linux. I need to set up a script that I can run via cron in the middle of every night to copy / back up specific folders into another directory. I want all folders, files and permissions and attributes copied. The goal is to have a 24 hour old copy that I can restore in case a user screws up their files. Example:

/usr/home/thisuser/web_master would be copied / backed up to /usr/home/mainuser
/usr/home/thisotheruser/web_master would be copied / backed up to /usr/home/mainuser
/usr/home/andanotheruser/web_master would be copied / backed up to /usr/home/mainuser

Each night, the copy / back up would overwrite the one from 24 hours ago.

How do I set this script up, and what type of file extension should the script be?
0
I'd like to come up with some clever tagline or rhyme for having our users reboot on Thursday.  After we push security updates to endpoints, I want the users to reboot, so I'd like a clever tagline.  For example, if I wanted my users to drink more water, I could say something like, "It's Thirsty Thursday, please make sure you drink plenty of water today!"  Or if I wanted my users to attend a meeting on Tuesday, "It's Technology Tuesday, please come to our technology meeting today!"

Can someone come up with a clever idea because "Reboot Thursday" or "Restart Thursday" just doesn't have a good ring to it!
0
Buying a new Mac Mini to replace an old Pro tower. Would like to keep the os (Mac and boot camp) on the internal SSD and have the user directories on a Thunderbolt drive. I know the importance of keeping a admin account on the SSD to troubleshoot, but would like to preconfigure the user accounts to exist this way before reestoring files from the Pro. When I have tried this in the past, drive numbers seem to change causing all sorts of hell.

If this is not doable, would prefer to put some of the users bigger subdirectories (photos and videos) on the thunderbolt or a NAS device.

Any how to or best practices would be greatly appreciated.
0
We are restructuring the ownership of documents with new staff/teams being formed.

We currently have IT Applications teams (who run IT Quality Management & still running it), IT Security Governance
(new team), IT Infra Ops.

In general practice (or commonly adopted out there), which team or person owns the 4 documents below:
1. IT Application Delivery Framework :  applications PM, IT Security governance, IT Quality Managemt, or ?
2. Vendor & Contract Management Framework : applications team, IT Security governance, IT Procurement or ?
     (a mix of IT applications, infra, security vendors but most of the vendors are applications vendors)
3. Project Management Methodology : applications PM, IT Quality Management, IT Security governance or ?
4. DR Plan : We don't have a DR team;  so hv to choose betw IT Ops, applications team, IT Security governance or ?

Any authoritative references (eg: NIST, big four consulting firms papers) will be helpful.
0
HOW to migrate AD Objects through, Microsoft Active Directory Migration Tool (ADMT)
0
enable message disclaimers in Domino server side and change the desclaimer message.

I don't want to use client policy for message desclaimer..
0
what exactly is the difference between lotus notes/domino database move vs user move to another server
when should be it be used.
my agenda is to move a user from from 1 serverA to serverB so I can accumulate space on serverA.

and when deleting got a message
after a user move when trying to approve for mail file deletion,
 Both the signer and the author of this request must have Delete Document privileges in the Domino Directory.
I am a member of "local domain admins" in domino directory and this "local domain admins" group has delete document privileges on names.nsf
0
Webinar: Cyber Crime Becomes Big Business
Webinar: Cyber Crime Becomes Big Business

The rising threat of malware-as-a-service is not one to be overlooked. Malware-as-a-service is growing and easily purchased from a full-service cyber-criminal store in a “Virus Depot” fashion. Join us in our upcoming webinar as we discuss how to best defend against these attacks!

I cannot run updates on server 2012 R2 - It says windows updates cannot check for updates, because some settings on this PC are controlled by your system administrator.
0
Quick question.  What level is the ISO 27001 Lead Auditor certification considered.  Beginner,  Intermediate or Advanced?
0
How to find an unauthorized connection  in samba domain?
I have a samba 4.X domain on ubuntu 16.04. Is there software for Intrusion detection?
0
I am asking for recommendation on MSP and/or RMM platforms solutions or software--please provide your recommendations based on your personal experience and why you recommend it over any others--thanks.
0
Hi! I have Windows 10 professional installed on a laptop. I used admin account to install a software on the laptop, and want to let people use it under standard account (without admin permission). However, when I login with standard account and double click the executable, I am always asked for admin user name and password, such that a standard account wouldn't able to execute it.

I made the following attempt, but didn't work: change the file folder of the installed software to give the specific standard user full control, and find the related folder in registry then give full control to the specified user.

I notice that there is third party tool like this that may make it work: http://www.robotronic.de/runasspcEn.html 
However, I am wondering: is there native way in Windows 10 to allow standard user to run this application?

Thank you!
0
One of my clients brought up a question regarding becoming properly NIST 800-171 certified.

He had heard that in order to use cloud services one of the points of concern was ensuring that they were all hosted in datacenters in the US and not abroad. Apparently Office 365 Business has some parameters that allow you to ensure this is the case.

1) Anyone remember or know of this requirement?
2) And is there a way to specify in Office 365 to ensure its US based?

Thanks.
0
Dear Experts

We are solution implementer like crm application and even server hosting for those companies who require us to host and maintain servers. Recently few of clients are mentioning about soc2 compliance. Can you please help me understand with respect to solution implementation point of view what does soc2 compliance means and how does it help our business, thanks in advance.
0
Does anyone has any data for acceptable acoustic decibel inside the server room, and in the regular office?
0
I would like to resurrect an old question since it is about four years old. I am looking for a good network system inventory tool that doesn't break the bank. I really like the PDQ inventory tool however the $500 /year price mark makes it difficult for a small 20 user firm like us. I could probably swallow half that.
I have looked into the original post at: https://www.experts-exchange.com/questions/28570579/Best-and-Free-tool-for-Network-PC's-hardware-software-inventory.html
and the Spiceworks doesn't seem to work for us for some reason.
Are there any other suggestions that are newer products?
0
HTML5 and CSS3 Fundamentals
LVL 12
HTML5 and CSS3 Fundamentals

Build a website from the ground up by first learning the fundamentals of HTML5 and CSS3, the two popular programming languages used to present content online. HTML deals with fonts, colors, graphics, and hyperlinks, while CSS describes how HTML elements are to be displayed.

Can someone recommend noise cancelling headphones for the server room?  Should be compatible with Android USB-C.  
I used aviation-grade noise cancelling headphones long time ago.  Forgot the model.  And that was a landline in my cage.  
Thanks.
0
Hi guys, non-technical question here.
 Does anyone have any format or an example for the new hire justification.  Instead of asking management "hey can I hire someone to help me, I am working 12 hrs per day"
Maybe someone has previous example or a set format showing the following things or similar:

1) Justify why you need help.
2) Explain your current situation, hours and work load
3) Tell how a new hire/resource will benefit the company, for example, improved revenue by 5%, completion of projects 25% faster, improved customer satisfaction rating, etc.
4) Justify the cost and how the proceeds will offset that person.
5) Show the long term strategy of this person and how this person fits into the organization
6) Show your new role on you being the manager and how this will free up your time for more strategic goals
7) Finally, show how this new hire aligns with company strategy and direction and how your department will be able to meet or exceed those goals.

Appreciate any help/advice.
0
Hi Experts,
the print screen key stopped working on my pc.
any suggestion?
preferably something that does not require restarting my pc...
thanks in advance.
fyi- I'm connected remotely thru gotomypc, however pass special keys to host is checked off.
0
In ubuntu 16:
it's added a wrong file in /etc/sudores.d/ folder.
I can't do sudo form any user. I can't do any thing.
How can I remove this file from folder sudores.d.
can I remove file if I login in as recover mode?

HELP
0
Can you see if reasonable to have 2-post rack this way?  Attached.  Any other pros/cons please?  Designing server room/lab.

 rm33
0
Hi Experts,

I have been approached by a group of 8 companies to provide for them an information exchange portal. Here they would store files, documents and posts, organized by category and sub category, and a bulletin board with latest news and events posted by the users.

The companies indicated that SharePoint wont’t work because the each have their own domain, and they need this solution to be independent from any of them. They also want to restrict each company to 3 users, and if another company wants to join, the admin of 3 other companies need to approve.

My question is - would this be a development project (I'm a PHP developer); or a sourcing project, where there is something pre-made that can be adjusted? What would a  bull park cost be for this?

Thank you.
0

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.