Linux – scp transfer files (passwordless) between systems

SSH (Secure SHELL) is a network protocol that is used to login into remote servers for execution of commands and programs. It is also used to transfer files from one computer to another computer over the network using secure copy (SCP) Protocol. Let’s see how to automate, passwordless, using Public/Private keys, file transfers between systems. Read More …

Excel – Allow Certain Users to Edit Cells Range

Excel offers you an ability to assign user-level permissions to different areas on a protected spreadsheet. You can specify which users (usually local or Active Directory ones) can edit a particular range while the spreadsheet is protected. Read More …

Powershell – Find and Add DNS Record Permissions

Organizations using Active Directory for their DNS service should take advantage of Windows PowerShell to manage bulk permission changes. This Read More …

Take Full Ownership of Windows Registry Keys

The Windows Registry is where all the Windows system and software configurations are stored. In fact, most Windows tutorials you Read More …

iCacls and other Tools to set Permissions (Microsoft Windows)

Prior to Windows Vista, CACLS (Change Access Control Lists) was used to manage to complicated NTFS permissions, complement the Folder Read More …

Atlassian Confluence – How works Permissions?

Confluence permissions are not only have multiple levels (site, space, page) but they are interfering, they have effect on each Read More …

Office 365 – Export mailboxes to PST using eDiscovery (Exchange Online)

In this article, we are going to show you how to export Office 365 mailboxes to PST files using an Read More …

Not enough permissions uninstalling software (Windows)

Back in Windows Vista, Microsoft added a new security feature called User Account Control (UAC) which blocks potentially dangerous actions Read More …