… Kim Cameron has linked and quoted my previous post on browser identification based on its characteristics available in public. There is EFF project which focus on checking how unique Your browser is against others based on public information. As it turned out Kim's browser has even higher score (19.29) in this test then my … Continue reading "Sorry Kim …"
Just to calm down my friends reading this blog … no, I haven’t developed personal relationship with my browser, however as many of us I’ve personalized it and I feel comfortable with it right now. All the plugins, configuration etc. It is our daily used tool now so probably all of us have done something … Continue reading "Is Your browser cheating on You??"
FIM 2010 is still being cooked in Redmond area but in the meantime we got brand new ILM 2007 Service Pack 1 package which just was published on Downloads web site. ILM 2007 SP1 is cumulative hotfix package but also it brings support for provisioning objects with Exchange 2010. This is nice progress if … Continue reading "ILM 2007 SP1 … Exchange 2010 support"
Where is a question there is an answer (at least in most cases). This time question was “How to check schema extension introduces to a forest?” and it was asked on ActiveDir.org. There was even more than one answer … apparently some consultants are watching this list :). So how we can capture what was … Continue reading "Spot the difference"
It is common knowledge that in AD environment client (like workstation) will always (at least it should) try to connect to most optimal domain controller. Optimal from network and AD infrastructure configuration standpoint. This process is based on DNS queries and information stored in AD configuration and in perfect case should lead to situation when … Continue reading "Where is my DC?"
In topic of ADFS Laura said once “If your ADFS is broken, it’s PKI. If it’s not PKI, you’ve got a typo. If it’s not a typo, it’s PKI”. Very true … in different aspects of PKI. Because of Christmas break I have a bit more free time than usual, still taking under consideration free … Continue reading "ADFS v2 RC and IIS certificates"
Kerberos in Windows Operating System is around for about 10 years and it is still causing problems and for many people it is like black magic voodoo. In most cases organizations and people in it are not aware that it is now working until it problem will occur on a surface with some application not … Continue reading "Kerberos and non-standard port number"
One of my friends PFE has asked me a question regarding userPassword attribute in directory which was related to some behavior he was observing in customer environment. We had a little chat about it and then I thought that maybe other has such questions as well so … here’s a topic for a blog. Behavior … Continue reading "userPassword"
Some time ago, when Windows 2008 was released I had some spare time (where are those days) and I wanted to master some of my .NET coding skills. What is better than find an idea to use them … and that’s how 1Identity Snapshot Recovery Tool was created. Snapshot Recovery Tool is command line tool … Continue reading "Snapshot recovery tool strikes back"
Snapshot Recover Tool Snapshot Recovery tool is command line interface tool which simplifies process of Active Directory deleted objects reanimation and populating these objects with data from Active Directory snapshot mounted in active instance. This tool can be also used to populate existing (not deleted) object with data from Active Directory snapshot without performing actual … Continue reading "Snapshot Recover Tool"