Sharepoint – Unlock and Delete a locked Library

Sometimes, some of the libraries and lists in SharePoint, both online and on-premises, might get locked for deletion, meaning you cannot delete them by any means, this is particularly through for Record libraries. Let’s see how to unlock and/or delete a locked library on a Sharepoint site. Read More …

Powershell – How to use Transcripts to keep history of commands and output

The primary tool for logging Powershell activity has been the Start-Transcript cmdlet. Simply enter this cmdlet followed by a path and filename for the log file that you want to create. PowerShell will populate the log file with every subsequent command that is entered. Read More …

Nginx – Enable HTTP/2

Hypertext Transfer Protocol Version 2 (HTTP/2) is the latest version of the HTTP protocol, published as an IETF standard in RFC 7540 in 2015. The focus of the protocol is on performance; specifically, end-user perceived latency, network and server resource usage. Read More …

CentOS / RHEL 7 / Debian – Disable IPv6

If network troubleshooting leads you to believe there’s an issue with IPv6, you may need to shut down that protocol on your Linux machines. Since some hardware doesn’t take advantage of IPv6 (and most admins are still working with IPv4), a temporary and easy solution is to disable IPv6. Read More …

Enabling DNS Registration Refresh Interval

On Active Directory domains is very important that clients set automatically their own DNS names on authoritative DNS servers for Read More …

Enable WinRM with Group Policy for PowerShell Remoting

PowerShell Remoting really can makes a routine work a lot easier, but it requires quite a bit of work to get all the remote computers ready to take the remoting calls, such as automatically start Windows Remote Management service. Read More …

Enabling Powershell Remoting

To enable Powershell remoting, you need run the following cmdlet: Enable-PSRemoting In workgroup environments, enable classic mode authentication for network Read More …

Configuring Let’s Encrypt TLS Certificates

Let’s Encrypt® has revolutionized the way to obtain, install and use TLS/SSL certificates for websites and other services. With its Read More …

Windows Server 2016 – Create and Enable Clustered Shared Volumes (CSV)

CSV (Cluster Shared Volumes) is a feature in Windows Server family in which shared disks are concurrently accessible to all nodes within a failover cluster. The feature was first introduced in Windows Server 2008 R2 as a way to simplify storage with clustered Hyper-V virtual machines (VMs), but this is not limited to Hyper-V applications. Read More …

Windows Server 2016 – Disable Internet Explorer Enhanced Security Configuration

In most Windows Server systems, Enhanced Security Configuration (IE ESC) is designed to protect a server from dangerous websites capable to infect system with malware. When this mode is enabled (it is by default) you will need to add each website you want to see to the Trusted Sites Zone to open all its content in IE. Read More …