After years of being a Chrome guy I’m finally frustrated enough to give Firefox another shot.
A masters level Windows troubleshooting seminar by Mark Russinovich.
Most websites use email as a method of verification. If your email account is compromised, an attacker can easily reset your password on many other websites. By taking control of my domain name at GoDaddy, my attacker was able to control my email.
Adam’s rant on Gawker was spot on. Funny how Lena supports Gawker media with them attacking her just two weeks ago.
Just finished a dense chapter on DNS configuration and now onto Active Directory.
Your ability to remember acronyms is directly proportional to how well you do in IT.
The Unix command tail is the number one binary I wish I had in Windows by default. Powershell’s Get-Content -file c:\log.log -Wait just isn’t the same.