20 Best Binary Options Trading Course Online

Forex Signals Reddit: top providers review (part 1)

Forex Signals Reddit: top providers review (part 1)

Forex Signals - TOP Best Services. Checked!

To invest in the financial markets, we must acquire good tools that help us carry out our operations in the best possible way. In this sense, we always talk about the importance of brokers, however, signal systems must also be taken into account.
The platforms that offer signals to invest in forex provide us with alerts that will help us in a significant way to be able to carry out successful operations.
For this reason, we are going to tell you about the importance of these alerts in relation to the trading we carry out, because, without a doubt, this type of system will provide us with very good information to invest at the right time and in the best assets in the different markets. financial
Within this context, we will focus on Forex signals, since it is the most important market in the world, since in it, multiple transactions are carried out on a daily basis, hence the importance of having an alert system that offers us all the necessary data to invest in currencies.
Also, as we all already know, cryptocurrencies have become a very popular alternative to investing in traditional currencies. Therefore, some trading services/tools have emerged that help us to carry out successful operations in this particular market.
In the following points, we will detail everything you need to know to start operating in the financial markets using trading signals: what are signals, how do they work, because they are a very powerful help, etc. Let's go there!

What are Forex Trading Signals?

https://preview.redd.it/vjdnt1qrpny51.jpg?width=640&format=pjpg&auto=webp&s=bc541fc996701e5b4dd940abed610b59456a5625
Before explaining the importance of Forex signals, let's start by making a small note so that we know what exactly these alerts are.
Thus, we will know that the signals on the currency market are received by traders to know all the information that concerns Forex, both for assets and for the market itself.
These alerts allow us to know the movements that occur in the Forex market and the changes that occur in the different currency pairs. But the great advantage that this type of system gives us is that they provide us with the necessary information, to know when is the right time to carry out our investments.
In other words, through these signals, we will know the opportunities that are presented in the market and we will be able to carry out operations that can become quite profitable.
Profitability is precisely another of the fundamental aspects that must be taken into account when we talk about Forex signals since the vast majority of these alerts offer fairly reliable data on assets. Similarly, these signals can also provide us with recommendations or advice to make our operations more successful.

»Purpose: predict movements to carry out Profitable Operations

In short, Forex signal systems aim to predict the behavior that the different assets that are in the market will present and this is achieved thanks to new technologies, the creation of specialized software, and of course, the work of financial experts.
In addition, it must also be borne in mind that the reliability of these alerts largely lies in the fact that they are prepared by financial professionals. So they turn out to be a perfect tool so that our investments can bring us a greater number of benefits.

The best signal services today

We are going to tell you about the 3 main alert system services that we currently have on the market. There are many more, but I can assure these are not scams and are reliable. Of course, not 100% of trades will be a winner, so please make sure you apply proper money management and risk management system.

1. 1000pipbuilder (top choice)

Fast track your success and follow the high-performance Forex signals from 1000pip Builder. These Forex signals are rated 5 stars on Investing.com, so you can follow every signal with confidence. All signals are sent by a professional trader with over 10 years investment experience. This is a unique opportunity to see with your own eyes how a professional Forex trader trades the markets.
The 1000pip Builder Membership is ordinarily a signal service for Forex trading. You will get all the facts you need to successfully comply with the trading signals, set your stop loss and take earnings as well as additional techniques and techniques!
You will get easy to use trading indicators for Forex Trades, including your entry, stop loss and take profit. Overall, the earnings target per months is 350 Pips, depending on your funding this can be a high profit per month! (In fact, there is by no means a guarantee, but the past months had been all between 600 – 1000 Pips).
>>>Know more about 1000pipbuilder
Your 1000pip builder membership gives you all in hand you want to start trading Forex with success. Read the directions and wait for the first signals. You can trade them inside your demo account first, so you can take a look at the performance before you make investments real money!
Features:
  • Free Trial
  • Forex signals sent by email and SMS
  • Entry price, take profit and stop loss provided
  • Suitable for all time zones (signals sent over 24 hours)
  • MyFXBook verified performance
  • 10 years of investment experience
  • Target 300-400 pips per month
Pricing:
https://preview.redd.it/zjc10xx6ony51.png?width=668&format=png&auto=webp&s=9b0eac95f8b584dc0cdb62503e851d7036c0232b
VISIT 1000ipbuilder here

2. DDMarkets

Digital Derivatives Markets (DDMarkets) have been providing trade alert offerings since May 2014 - fully documenting their change ideas in an open and transparent manner.
September 2020 performance report for DD Markets.
Their manner is simple: carry out extensive research, share their evaluation and then deliver a trading sign when triggered. Once issued, daily updates on the trade are despatched to members via email.
It's essential to note that DDMarkets do not tolerate floating in an open drawdown in an effort to earnings at any cost - a common method used by less professional providers to 'fudge' performance statistics.
Verified Statistics: Not independently verified.
Price: plans from $74.40 per month.
Year Founded: 2014
Suitable for Beginners: Yes, (includes handy to follow trade analysis)
VISIT
-------

3. JKonFX

If you are looking or a forex signal service with a reliable (and profitable) music record you can't go previous Joel Kruger and the team at JKonFX.
Trading performance file for JKonFX.
Joel has delivered a reputable +59.18% journal performance for 2016, imparting real-time technical and fundamental insights, in an extremely obvious manner, to their 30,000+ subscriber base. Considered a low-frequency trader, alerts are only a small phase of the overall JKonFX subscription. If you're searching for hundreds of signals, you may want to consider other options.
Verified Statistics: Not independently verified.
Price: plans from $30 per month.
Year Founded: 2014
Suitable for Beginners: Yes, (includes convenient to follow videos updates).
VISIT

The importance of signals to invest in Forex

Once we have known what Forex signals are, we must comment on the importance of these alerts in relation to our operations.
As we have already told you in the previous paragraph, having a system of signals to be able to invest is quite advantageous, since, through these alerts, we will obtain quality information so that our operations end up being a true success.

»Use of signals for beginners and experts

In this sense, we have to say that one of the main advantages of Forex signals is that they can be used by both beginners and trading professionals.
As many as others can benefit from using a trading signal system because the more information and resources we have in our hands. The greater probability of success we will have. Let's see how beginners and experts can take advantage of alerts:
  • Beginners: for inexperienced these alerts become even more important since they will thus have an additional tool that will guide them to carry out all operations in the Forex market.
  • Professionals: In the same way, professionals are also recommended to make use of these alerts, so they have adequate information to continue bringing their investments to fruition.
Now that we know that both beginners and experts can use forex signals to invest, let's see what other advantages they have.

»Trading automation

When we dedicate ourselves to working in the financial world, none of us can spend 24 hours in front of the computer waiting to perform the perfect operation, it is impossible.
That is why Forex signals are important, because, in order to carry out our investments, all we will have to do is wait for those signals to arrive, be attentive to all the alerts we receive, and thus, operate at the right time according to the opportunities that have arisen.
It is fantastic to have a tool like this one that makes our work easier in this regard.

»Carry out profitable Forex operations

These signals are also important, because the vast majority of them are usually quite profitable, for this reason, we must get an alert system that provides us with accurate information so that our operations can bring us great benefits.
But in addition, these Forex signals have an added value and that is that they are very easy to understand, therefore, we will have a very useful tool at hand that will not be complicated and will end up being a very beneficial weapon for us.

»Decision support analysis

A system of currency market signals is also very important because it will help us to make our subsequent decisions.
We cannot forget that, to carry out any type of operation in this market, previously, we must meditate well and know the exact moment when we will know that our investments are going to bring us profits .
Therefore, all the information provided by these alerts will be a fantastic basis for future operations that we are going to carry out.

»Trading Signals made by professionals

Finally, we have to recall the idea that these signals are made by the best professionals. Financial experts who know perfectly how to analyze the movements that occur in the market and changes in prices.
Hence the importance of alerts, since they are very reliable and are presented as a necessary tool to operate in Forex and that our operations are as profitable as possible.

What should a signal provider be like?

https://preview.redd.it/j0ne51jypny51.png?width=640&format=png&auto=webp&s=5578ff4c42bd63d5b6950fc6401a5be94b97aa7f
As you have seen, Forex signal systems are really important for our operations to bring us many benefits. For this reason, at present, there are multiple platforms that offer us these financial services so that investing in currencies is very simple and fast.
Before telling you about the main services that we currently have available in the market, it is recommended that you know what are the main characteristics that a good signal provider should have, so that, at the time of your choice, you are clear that you have selected one of the best systems.

»Must send us information on the main currency pairs

In this sense, one of the first things we have to comment on is that a good signal provider, at a minimum, must send us alerts that offer us information about the 6 main currencies, in this case, we refer to the euro, dollar, The pound, the yen, the Swiss franc, and the Canadian dollar.
Of course, the data you provide us will be related to the pairs that make up all these currencies. Although we can also find systems that offer us information about other minorities, but as we have said, at a minimum, we must know these 6.

»Trading tools to operate better

Likewise, signal providers must also provide us with a large number of tools so that we can learn more about the Forex market.
We refer, for example, to technical analysis above all, which will help us to develop our own strategies to be able to operate in this market.
These analyzes are always prepared by professionals and study, mainly, the assets that we have available to invest.

»Different Forex signals reception channels

They must also make available to us different ways through which they will send us the Forex signals, the usual thing is that we can acquire them through the platform's website, or by a text message and even through our email.
In addition, it is recommended that the signal system we choose sends us a large number of alerts throughout the day, in order to have a wide range of possibilities.

»Free account and customer service

Other aspects that we must take into account to choose a good signal provider is whether we have the option of receiving, for a limited time, alerts for free or the profitability of the signals they emit to us.
Similarly, a final aspect that we must emphasize is that a good signal system must also have excellent customer service, which is available to us 24 hours a day and that we can contact them at through an email, a phone number, or a live chat, for greater immediacy.
Well, having said all this, in our last section we are going to tell you which are the best services currently on the market. That is, the most suitable Forex signal platforms to be able to work with them and carry out good operations. In this case, we will talk about ForexPro Signals, 365 Signals and Binary Signals.

Forex Signals Reddit: conclusion

To be able to invest properly in the Forex market, it is convenient that we get a signal system that provides us with all the necessary information about this market. It must be remembered that Forex is a very volatile market and therefore, many movements tend to occur quickly.
Asset prices can change in a matter of seconds, hence the importance of having a system that helps us analyze the market and thus know, what is the right time for us to start operating.
Therefore, although there are currently many signal systems that can offer us good services, the three that we have mentioned above are the ones that are best valued by users, which is why they are the best signal providers that we can choose to carry out. our investments.
Most of these alerts are quite profitable and in addition, these systems usually emit a large number of signals per day with full guarantees. For all this, SignalsForexPro, Signals365, or SignalsBinary are presented as fundamental tools so that we can obtain a greater number of benefits when we carry out our operations in the currency market.
submitted by kayakero to makemoneyforexreddit [link] [comments]

2 months back at trading (update) and some new questions

Hi all, I posted a thread back a few months ago when I started getting seriously back into trading after 20 years away. I thought I'd post an update with some notes on how I'm progressing. I like to type, so settle in. Maybe it'll help new traders who are exactly where I was 2 months ago, I dunno. Or maybe you'll wonder why you spent 3 minutes reading this. Risk/reward, yo.
I'm trading 5k on TastyWorks. I'm a newcomer to theta positive strategies and have done about two thirds of my overall trades in this style. However, most of my experience in trading in the past has been intraday timeframe oriented chart reading and momentum stuff. I learned almost everything "new" that I'm doing from TastyTrade, /options, /thetagang, and Option Alpha. I've enjoyed the material coming from esinvests YouTube channel quite a bit as well. The theta gang type strategies I've done have been almost entirely around binary event IV contraction (mostly earnings, but not always) and in most cases, capped to about $250 in risk per position.
The raw numbers:
Net PnL : +247
Commissions paid: -155
Fees: -42
Right away what jumps out is something that was indicated by realdeal43 and PapaCharlie9 in my previous thread. This is a tough, grindy way to trade a small account. It reminds me a little bit of when I was rising through the stakes in online poker, playing $2/4 limit holdem. Even if you're a profitable player in that game, beating the rake over the long term is very, very hard. Here, over 3 months of trading a conservative style with mostly defined risk strategies, my commissions are roughly equal to my net PnL. That is just insane, and I don't even think I've been overtrading.
55 trades total, win rate of 60%
22 neutral / other trades
Biggest wins:
Biggest losses:
This is pretty much where I expected to be while learning a bunch of new trading techniques. And no, this is not a large sample size so I have no idea whether or not I can be profitable trading this way (yet). I am heartened by the fact that I seem to be hitting my earnings trades and selling quick spikes in IV (like weed cures Corona day). I'm disheartened that I've went against my principles several times, holding trades for longer than I originally intended, or letting losses mount, believing that I could roll or manage my way out of trouble.
I still feel like I am going against my nature to some degree. My trading in years past was scalping oriented and simple. I was taught that a good trade was right almost immediately. If it went against me, I'd cut it immediately and look for a better entry. This is absolutely nothing like that. A good trade may take weeks to develop. It's been really hard for me to sit through the troughs and it's been even harder to watch an okay profit get taken out by a big swing in delta. Part of me wonders if I am cut out for this style at all and if I shouldn't just take my 5k and start trading micro futures. But that's a different post...
I'll share a couple of my meager learnings:


My new questions :

That's enough of this wall of text for now. If you made it this far, I salute you, because this shit was even longer than my last post.
submitted by bogglor to options [link] [comments]

Alternate CoS Asian Deiselpunk Setting PART 2: Reign of the Storm Shogun

Continued from previous Post: https://www.reddit.com/CurseofStrahd/comments/gwaj5b/alternate_cos_asian_dieselpunk_setting_part_1/

(Player) New and Variant Backgrounds: Some slightly altered backgrounds to give more ways to integrate your character into the world. Some of these backgrounds are simple reskins of existing backgrounds with new flavor text to help give potential character ideas.
Variant Soldier: Samurai
Skill Proficiencies: Athletics, Intimidation
Tool Proficiencies: One type musical instrument or Calligraphy Set,
vehicles (land)
Equipment: A banner bearing the crest of your clan or Daimyo, An ornate helmet and mask known as a Kabuto, a Calligraphy Set, A scroll stamped with the Imperial Seal denoting you as serving a Daimyo, a fine Kimono, and a belt pouch containing 10 gp
Feature: Way of Bushido – Anyone may follow the path of Bushido but you have devoted your life to following a strict personal code of honor. Bushido demands service, and so you have sworn yourself to a master or " Daimyo ". A Daimyo may be a local noble, the Jade Emperor, or even a childhood friend. It does not matter who a Daimyo is to a Samurai, only that they serve them with Honor. As long as the Samurai remains Honorable and obeys the will of his Daimyo he may requisition basic equipment and horses for temporary use as well as dwell for free in most inns. The owners of the equipment and innkeepers do this with the understanding that the Samurai will have his Daimyo cover the costs with interest to them later, though there are limits to this trust no Gunsmith will provide a Gun to a Samurai even just to borrow for free.
Variant Folk Hero: Ronin
Some Samurai do not follow a Daimyo, but instead swear themselves unto the weak and the innocent making them collectively his Daimyo. These roaming Samurai are called Ronin and they venture to the remote reaches of Daichi to bring justice.
The Ronin follows a strict personal code of Bushido that always includes " Protect the weak and innocent " among its edicts. As long as the Ronin follows this code his background Skill, Tool, and Language proficiencies as well as Background Feature are identical to the core Background Folk Hero with the exception of his equipment.
Equipment: A set of artisan’s tools (one of your choice), a humble unadorned Helmet and Mask called a Kabuto, a warm traveling Kimono, Scrolls detailing your lineage and status as a Samurai stamped with the Imperial Seal, and a belt pouch containing 10 gp
Variant Criminal – Shinobi:
Sometimes referred to as Ninjas by common folk, Shinobi are a cloister of loosely connected and often competing clans of professional assassins and infiltrators. Shinobi are masters of stealth and subterfuge and while the image of the black clad warrior made popular in Kabuki plays is certainly a major aspect of the Shinobi it is not all that they are. Though there are always exceptions most Shinobi Clans work for coin or for an ancestral Daimyo in much the same way a Samurai does, though it is rare that individual Shinobi serve a singular master. The most infamous clan are the Rain Maidens who have long served the Storm Shogun.
Shinobi are identical to the Criminal background in all ways except the following alterations to the background feature:
Feature: Clan Contact
You have a reliable and trustworthy contact who acts as a liaison to your Shinobi Clan. You know how to get messages to and from your contact even over great distances; specifically, you know the local dead drop locations, secret handshakes to contact messenger Shinobi, and trained messenger raven rookeries who can deliver the messages for you. As long as you are in good standing your Clan is willing to aid you acquire basic supplies and occasional vital information to aid you in your personal endeavours.
Variant Acolyte -Shrine Maiden: While men are permitted to watch over Kami Shrines it is traditional that a lone Maiden watch over the smaller way-shrines along major roads, these women lead very solitary and lonesome lives and it is not uncommon for them to occasionally be filled with a period of wonderlust where they seek out adventure before returning to their duties. Sometimes these Maidens have families that will live nearby but the Maiden is expected to live and sleep within her Shrine for most of the year. While this is tradition, there is no actual law requiring the Shrine Maidens to remain at their posts or to live solely within the Shrines and it is not particularly frowned upon for them to have lives outside their work.
Variant Entertainer – Geisha: An exclusively female profession of extremely skilled entertainers who spend their lives training in matters of conversation, party planning, tea serving, singing, acting, and often many other skills that serve well in keeping rich and powerful guests happy. Geisha is a highly honorable and respected profession that takes years of practice to attain the lowest rankings, while there are males who have obtained the same degree of skill and who’s abilities are identical to a Geisha’s they are simply called Entertainers. Geisha are sponsored by great noble houses, there are strict requirements and examinations to attain rank and title the cost of which can often indenture common Geisha to service to one of the great noble houses.
Variant Outlander – Vajra: A nomadic people of traders and merchants, they travel openly and without fear of the dark evils of the Storm Shogun under the protection of an ancient pact. They are reviled by many, refused entrance to most towns and villages but even so they are a peaceful people on whom the economy of Daichi depends. They revere their ancestors and believe in reincarnation, they do not worship the great Rakasha but do revere it and thus all Rakasha and tigers are sacred to them. They travel on the back of great elephants which carry their homes, their culture is rich and vibrant with a fondness for oral storytelling.
Identical in all ways to Outlander core background except exchange language choice for Language: Vajra and add Tool Proficiency: Musical Instrument. You may begin play with a Sitar, a guitar like instrument.
New Background – Invader:
You are a descendent of the coalition of nations that came to conquer Daichi one thousand years ago. While many still serve the Shogun Ishin you have chosen instead to join the other defectors in living peacefully among the people you once conquered. While despised even more than Vajra you serve an even more vital function in keeping the engines and machinery within the cities and villages of Daichi running. While the Invaders are from many nations their culture has eroded and homogenized over time. Their legends speak of a " Homeland " but none can remember the name. All invaders have a special innate affinity for their blood magic fueled hemo-diesel technology and all can instinctively repair and maintain it.
Skill Proficiencies: Insight, Arcana
Tool Proficiencies: Tinker’s and Smiths Tools
Languages: Invader’s Trade Tongue
Feature: Born Engineer – You instinctively know how to perform repairs on all manner of machinery magic and mundane. You may cast as a Mending as an Artificer of your level. Further, whenever you are in an annex or industrial sector of a city you may call on the aid of your fellow Invaders for access to crafting machinery, temporary use of simple vehicles, and a place to lay your head in the factory barracks.
(Player) New Subclasses:
Editorial Note: Due to some of the listed subclasses being from 3rd party content that I have purchased I cannot directly copy class abilities into this listing. The actual subclass will be presented as Handouts in-game. PM me if you require further information regarding each subclass.
Barbarian:
Path of the Juggernaut: You have built, scavenged, stolen, or otherwise acquired a titanic Diesel Suit. While most barbarians disdain armor you have made it into a focus for your Rage.
Ability Preview: Unstoppable – By expending a unique resource called " Momentum " you can burst through non-magical walls, furniture, and other barriers.
Path of the Iron Rider: You have formed a unique bond with a Tsukumogami Dieselcycle which you can call as a Familiar. You channel your rage into heavy firearms as you ride against the storm.
Ability Preview: Iron Horse – You can call a spirit possessed Dieselcycle to yourself using the Find Vehicle spell.
Ability Preview: Bullet Rage – Instead of channeling your Rage into melee strikes you may instead empower Firearms, eventually reloading and firing with blinding speed.
Bard
College of the Geisha – You are a professional of beauty and grace, your words, songs, and dances inspire in ways no other Bard can compare to. This has cost you the potency of magic and martial knowledge of other Colleges but strengthening and supporting your allies is more than worth it.
Ability Preview: Fascination – When an ally uses a skill empowered by Bardic Inspiration they also have Advantage on that roll.
College of the Vajra Weather a true born Vajra or one who has adopted their ways and culture, you have earned many of the unique powers of the foreign nomads. Farsight, Curses, and other oddities to aid allies or confound enemies are yours to command.
Ability Preview: Flash of Despair – You grant your enemies a moment of your own foresight, showing them their own imminent failure. You may use your Bardic Inspiration to grant penalties to your foes in the same ways you grant boons to your allies.
Cleric
Thaumic Engineering Domain: You have abandoned the old religions, accepting the new gods of Science and Reason. You are a man of logic not faith, but you do not ignorantly deny the existence of gods. Rather you recognize that they are a natural force in the world in much the same way as wind or fire are natural forces, and being a scientist at heart you have made it your speciality to put a microscope onto the powers of the divine.
Ability Preview: Armor of Divinity – You have discovered the underlying magical force that grants moments of supernatural protection to the Faithful and applied this theory to a physical suit of armor. You can summon a suit of diesel armor at will that is empowered by your knowledge of the divine.
Ability Preview: Theological Scholar – Where most Clerics dispense Wisdom you dispense Knowledge. Your spellcasting modifier is Intelligence, other class abilities that would scale off of Wisdom instead scale off of Intelligence.
Ability Preview: Spark of Creation – You slowly begin to apply your theories regarding the creation of life and the universe, fabricating advanced Automata with a spark of divine life.
Druid
Circle of the Machine: While most Druids protect the deep forests and natural wonders of the world, you have chosen to see to the needs of the Cities and their people. Viewing the wonders of technology as a creation just as worth of protection as any waterfall or mountain you have found a way to channel the raw powers of technology through your body to overcome the limitations of other Druids.
Ability Preview: Iron to Steel: You realize that Steel is just another form of iron, manufactured weapons are made from base natural components. You are proficient with Firearms and are not hindered by wearing metal armor or weapons.
Ability Preview: Machine Shape – The ultimate expression of your beliefs, you channel the raw force of technology and creation through your flesh to become one with the Machine. When you Wildshape you may change the Type of your beast shape to Construct.
Ability Preview: Automata Companion – As many druids surround themselves with the beasts of the forest you surround yourself with mechanized allies. You gain an Automata companion in the shape of a Beast.
Monk
Way of the Jade Bailiff You have sworn an oath to venture out into the distant reaches of Daichi bringing law and justice with you. You are trained well in the art of subdual and investigation, you never kill when arrest is a possibility.
Ability Preview: Pacify Suspect – You use your advanced hand-to-hand combat training to grapple or disarm targets while overwhelming them with a flurry of blows.
Way of the Singularity To obtain enlightenment is to comprehend infinity and eternity both, but flesh is finite and limited. In your journey to the nirvana of perfect understanding you have chosen to forsake flesh for augmetic steel. You have already installed numerous cybernetic implants within your body and will continue to do so, every pound of flesh lost bringing you closer to perfect understanding of the cosmos.
Ability Preview: The Flesh is Weak – Among various other augmentations you replace a full limb with a cybernetic augment. You may channel your Ki through this augment to bend the universe to your will, casting specialized Automation Spells.
Rogue
Drunken Master You realize that life is about more than just fighting, obtaining wealth, or rising through social ranks. It is a vital necessity for all living beings to relax and enjoy themselves, to this end you have made it your lifestyle to spread your mastercrafted brews far and wide.
Ability Preview: Good for what ails you – Your Sake is more than just simple rice wine, you have brewed it with ancient techniques gifted to the mortal races by the Kami at the dawn of time. These are not just booze but potent elixirs that replicate the effects of many Potions.
Alternate Drunken Master – hanoyu MasteMistress – While mechanically identical to the Drunken Master you have chosen to master the complex and delicate art of the tea ceremony rather than the bar room brawl. You use mystical tea leaves gathered from secret sanctuaries in the deep woods often tended by forest sprites rather than hard liquor.’’
Ranger
Automata Hunter Many in this world embrace technology, but not you. You hold special animosity and hatred for the industrialization that is poisoning Daichi, for the Automata that slaughter innocents, and for the slowly receding natural world. You have spent a lifetime learning the special weaknesses of machines, turning their own strength against them.
Ability Preview: Breaker Weapon – You have constructed an Anti-Tank Rifle, Thermal Torch, Piston Hammer, or Buster Sword. These weapons are customized to your exact specifications to destroy machines and bypass their armor. They are also still effective against organic targets, though their size tends to get in the way.

(Player) Misc. Player options, New Warlock Patron, Feats, Equipment, Familiars.
Editorial Note: Much like with Subclasses as some of this content is 3rd party I only provide flavor descpritions rather than actual rules which are instead provided through the compendium legally.
New Warlock Patron: Logic and Reason – Pacts with eldritch entities from beyond time are but a crutch to you. Through overwhelming knowledge of science and the deeper mechanisms that drive the cosmos you have become your own Patron.
Ability Preview: Space-Time Recollection – By using advanced knowledge of light particles and chronology magic you can view past events within an area up to 24 hours past. While you cannot willfully speed up or slow down the viewing of these events you can specify a general time frame such as " Morning, Early Afternoon, 9:45 PM "
Eldritch Invocations of Logic and Reason:
Binary Linguist – You can communicate with any Construct flawlessly, it always understands you even through pure body language. You in turn can understand the same.
Equipment:
Prosthetic Limb 50 GP – Loss of Limb is a common reality to the people of Daichi, necessitating such crude augmentations. While gorgeous paragons of artisanal mastercraft, or cunning advanced combat prosthetics do exist this is neither. This limb represents a modest workman’s limb. It does not come with excessive adornments and his simple unpainted steel. This device runs on 1 sp worth of Diesel fuel per day and perfectly matches the function of an organic limb. While the limb can replicate strength of up to a score of 20, being set any higher than the user’s natural strength would result in the limb tearing itself free or otherwise damaging the user.
DieselCycle, Price: Varies – The Dieselcycle is the most popular form of personal transport across Daichi, extremely rugged and reliable these two wheeled motorized vehicles can cross all manner of difficult terrain at breakneck speed. Many varieties of Dieselcycle exist, mirroring various breeds of horse and mule. Dieselcycles use the stat block of the specified Mount though with an intelligence, wisdom, and charisma score of 0, Type – Construct, double the listed HP and Speed, and with Bite or Hoof attacks becoming Ram attacks. Dieselcycles cannot move or operate without a Rider but unlike Horses do not feel fear and have no minds to warp with magic. A dieselcycle is destroyed when it reaches 0 HP and requires 1 GP worth of Hemo-Diesel to operate per day.
Familiars For sake of simplicity these entries will be kept brief, giving a short description of each new Familiar instead of a lengthy stat block.
Lesser Pheonix The smallest species of Pheonix, an extremely minor Kami. One should not summon such a creature if they are not prepared to give it proper reverance.
Helper Automata A small robot built to aid it’s maker. These Automata can be built into any shape from very small humanoids to mimicking animals, or more crude and utilitarian bundles of spidery limbs and tool armatures. Some are even shaped as extra mechanized arms to hold things for their masters.
Giant Silkworm Come in both " naked " and " fuzzy " varieties, these creatures provide the economic backbone for many mountain communities that make their living by weaving dazzling Kimono. They are calm tempered, vegetarian, and have no bite. Popular with small children.
Giant Flower Mantis Temperamental hunters this creature is as likely to bite and slice at it’s handler as it is an enemy. One rarely refers to these beasts as a " Familiar " for they more tolerate than serve their summoners.
Giant Hawkmoth The later stage of the SIlkworm’s life cycle, now possessing two great scythe limbs they become aggressive carnivores, though they retain the bonds they held in their larval stage with human owners and often are kept as beloved pets for many years.
Fu Dragon The least of the Dragons is still a mighty Kami. These Dragons will serve entire family lineages for generations as long as they are properly revered and respected.
Ancestor Spirit When a young Wu Jen or Warlock needs further guidance than can be given through mere rote memorization of ancestral tomes, sometimes an Ancestor will voluntarily leave Heaven to give spiritual guidance directly.
Feats For sake of simplicity Feats are cut down to just brief descriptions rather than the entire Feats entry. Racial Feats are not repeated here, they are listed in or near their racial entries in the Race section.
Bonded Weapon Wielder You attune your soul to a particular Weapon. You may call this weapon to your hand as a Bonus Action as long as it is on the same Plane as you. This Weapon no longer needs to be Attuned if magical.
Hengeyokai Ancestry You either carry some Hengeyokai blood in your veins, or if you are already a Hengeyokai discover enough of your hidden ancestries to unlock a new Animal Form. You may shapechange into an animal ( though not a Hybrid ) or a new additional animal form if already a Hengeyokai.
Tattooed Special Prerequisite: You have earned the respect of a master Monk or Maiko who has chosen to gift you one of these magical Tattoos. The tattoo is filled with magic and grants you a particular benefit dependent on the tattoo you earn.
Firearm Mastery Countless hours with a gun in your hand have paid off by allowing you to engage in melee combat with a gun among other benefits.
Novice Inventor Through constant experimentation you have dipped into the Automation magic of the Invaders. Gaining one of their spells and a Cantrip.
Augmented You have taken into your body extensive cybernetic improvement. You become more faster, stronger, or tougher and your mechanical parts make you more resilient. If you could before, you can no longer hide your cybernetic nature, your limbs and organs are obviously artificial.

(DUNGEON MASTERS) Okay with the general setting and player info out of the way we can talk a bit about the actual campaign. While I won't post all my notes here I will give enough of a general overview such that DM's can use it as a jumping off point if they so wish.

The True Backstory of Daichi and the Storm Shogun:

Isak was raised in a family of wealth and status with a glorious military history in a nation resembling 1920's America. He was brought up with the understanding that war was a glorious and honorable endeavor where the strong defended their ideals on the field of battle. Advances in technology and politics robbed him of this delusion however, wars of defense became wars of colonial conquest. Officers who once led from the front now telephoned their orders as men died by the thousands to machine gun fire. Isak grew to resent and hate his own people for failing to live up to the fantastical narrative he had been raised on. When Isak conquered Diachi he soon found solace in it's path of Bushido, the Samurai of Daichi embodied the world Isak wished to live in and so he sought to emulate them, eventually renaming himself the Storm Shogun Ishin. Ishin soon received orders that Daichi was to be colonized and her people marched onto reservations. Ishin's leutenant and childhood friend Mara ( Rahadin ) was of a people similarly subjugated and made certain Ishin knew fully what these reservations would do to the people of Daichi. Ishin promptly sought a means to betray his commanders and save Daichi. Delving deep into an ancient temple formed of Amber from the World Tree he uncovered the prison for the Four Great Perils. Hearing the whispers of Taowu who easily convinced Ishin that if he released them they would in gratitude draw Daichi away from the Material Realm such that it would be safe for eternity, however this act required a sacrifice in the form of the " ultimate betrayal of the one you love most. " Ishin despaired as he knew it could only mean killing his beloved sister. Ishin's Sister never entered the army but dissapointed her family by taking up the trade of a humble engineer, she was hesitant to accept Ishin's offer years ago to come to Daichi but relented to see her beloved brother again. During her stay at the former Imperial City she met a street thief named Yoko and the two quickly fell in love. Ishin returned to the city from his journey to the Amber Temple to discover the two being married beneath a sakura tree. Ishin quickly slew the Samurai Honor Guard ( The Player Characters ) and then murdered his own sister in cold blood. As life left her he looked to Yoko and knew that the betrayal was not sufficient, he had to first take from his sister the thing *she* loved the most before his betrayal would be truly ultimate. However with his sister dead Yoko flew into a rage and fought the Shogun with every dirty trick she knew, forcing the shogun to kill her. Taowu was furious at the Shogun's incompetent failure, yet with his betrayal half-complete the Great Perils were still able to manifest partiallin in Daichi and swiftly swept it away from the Material Plane while creating the eternal Typhoon in the process.

Now empowered by the Great Perils, the immortal Storm Shogun has been trapped in a thousand year long cycle of murdering his sister, her lover ( Ireena ), and their four guardian Samurai ( The Player Characters ). On the thousandth anniversery of his failure the Great Peril's hold on Daichi will wane and it will crash back to the Material Plane, destroying the world in the process. To save the world either the Storm Shogun must prevail......or the Samurai must find a way to undo the damage he has caused.

Meanwhile in the sleepy Kimkaro Village four humble Samurai are called to the home of the Daimyo who lies on his deathbed, he wishes to see his adoptive daughter Yoko one last time before he passes and has asked you to fetch her........

(Dungeon Masters) General Plot overview: This is how the game is intended to flow and be resolved. It is of course very much up to individual Dungeon Masters to modify this to fit their players and narrative. Obviously no plan or plot survives first contact with Players so adjust as needed. I've woven in plotlines from some other Modules I have to pad out areas I felt needed it.

Level 1: The party goes to find Yoko at her home outside the village walls and discovers that an Automata ( Animated Armor ) she has been scavenging parts from has sprung to life, possessed by a ghost screaming about it's Hunger. The ghost is Shinzo the Eater, a spirit astrally projecting from his emaciated corpse in the Death House. After defeating the machine the party visits the Daimyo who offers his blessing for the party to leave the village.....after they help resolve the current issue with the polluted river. The River the village relies on for fish has been dying off with the river goddess refusing to answer prayers.

The party spends a week searching without avail but while fishing Yoko finds a talking Koi Fish claiming to be the River Goddess! She needs to pass through the Dragon Gate at the top of a nearby mountain to resume her true form. (Dungeon Master) The " River Goddess Koi " is actually Jin-Hao the daughter of the true river goddess Jin-Zhi, he has been cursed into a koi fish as punishment for her arrogance and hubris in attempting to solve the poisoned river problem herself while her mother was away attending to matters in Heaven. Jin-Hao tried to use advanced magic far beyond the Wyrmling and accidently caused a massive lightning storm ( Nobody died thankfully ). It should be very obvious to the players that the Koi is lying and she will confess the truth under fairly little scrutiny as long as the party is kind.

A journey upriver ensues where the party must brave several skill challenges to overcome obstacles, there is always an extremely easy path that merely takes a long time to navigate. Jin-Zhi has engineered this to teach her daughter ( and the players ) patience. Weather the players succeed or fail the skill challenges Jin-Hao comes to realize that taking time and being patient solves more problems more easily than rushing ahead. Try to reflect in roleplay her slowly becoming less of a whiny impatient child and more level headed and patient as the player's progress. Eventually they will come to the Dragon's Gate and pass through where a final challenge awaits, Jin-Zhi in the form of a Tiger. This test is not for her daughter but rather for the Players, to see if they will be worthy of the gift she has for them. After Jin-Zhi takes 40 HP damage ( adjust as needed for party size. ) or the party is reduced to 0 HP ( They cannot die while in the Dragon's Gate and Jin-Zhi will resurrect them if they somehow do. ) she will adopt her true form and do the same to her daughter who will become a Lung Dragon once more. If the party has taken the lessons learned during the journey to heart, encouraged Jin-Hao to do the same, showed honor, teamwork, and courage in the final combat ( weather they won or not ) , and generally been polite she will reward them with a Clam of Patience.

Clam of Patience: Wonderous Item, Uncommon - This pearlescent creature produces a single use Pearl of Power once a Week. This pearl is known as a " Fruit of Time " and will crumble to dust when used or when the Clam produces another.

Jin-Zhi will offer to allow Jin-Hao a second try at fixing the river but the young dragon has learned her lesson and says she is not ready. Pleased with this Jin-Zhi explains to the party that the River's poisoning is from a dam downstream that is flooding the river with pollutants. She allows the party to ride on her back as far downstream as she is able to go before she reaches the edge of her allotted domain. At this point the party should be Level 2. If the party has grown attatched to Jin-Hao consider allowing them to retain her as an ally for the coming dungeon ( Silver Dragon Wyrmling ), if not grant them Inspiration.

Level 2: The party reaches the Dam which has an ancient house built on it in the style of the Invaders. This home belonged to Commander Durst, a cruel and wicked military officer who was " encouraged " to build his home far from any civilization as a form of exile by the Storm Shogun. This house is effectively identical to the Death House, however Rose and Thorn are replaced by Shinzo the Eater, Durst's son who was trapped in the deep watershed of the estate and starved, feeding on the corpses of his family after the Shogun slaughtered them upon his rise to power. ( The Shogun was ignorant of Shinzo's presence as he was hiding at the time. ) Shinzo soon became a horrifying emaciated Oni that is trapped within the building. Use the stats for the Shambling Mound though roleplay the Engulf Ability as Shinzo stuffing people whole into his horrid mouth lined with rows and rows of razor sharp teeth. Consider removing the Animated Armor ( The party already fought an Automata ) and making the Specter non-hostile. Replace the Grick and Mimic with more Asian themed monsters of equal CR.( I use creatures from the " Monsters of the Orient " complete Beastiary. )

Upon completing Death House the Dam begins to crumble and disintigrate, cue the party ( hopefully ) dramatically escaping just as the dam breaks and the poisoned waters are freed. Jin-Zhi in grattitude uses her magic to stop the dam from otherwise causing catastrophic flooding and the River is soon restored to health. The party levels to 3.

Level 3: The funeral of the Daimyo was delayed due to the pressing issue of the River. Now as the party returns they may proceed with burying Yoko's adoptive father, the arrangements go off without a hitch. However a mysterious individual is present, a woman in the uniform of the Storm Shogun's tank battalions. This woman is Lieutenant-Commander Mara Strahd's right hand woman ( Rahadin ). This character embodies the role of femme fetale but is more honorable than Rahadin and if she witnesses the Feast of St. Andral's event she can be convinced to betray the Storm Shogun.

She explains that she is an agent of the Storm Shogun and has come to declare the new Daimyo of the village. Considering the party single handedly are responsible for the River being cleansed she asks them for their recommendations and honors their requests, she holds relatively little regard for Shang as Daimyo and will only declare him if asked to. ( She dislikes anyone who acts through Proxy so make this clear unless Shang accompanied the party during any stage of the adventure ). She commands the party to go to The Imereial City to inform " the traitors " of the new Daimyo's appointnemt and issues them travel passes if they do not have them already.

At this point the game proceeds as normal for Curse of Strahd with reflavorings where needed.

Old Bonegrinder is now a Tea Plantation run by three White Haired Witches, Dream Pies are replaced by Dream Tea.

The Abbot is now the Maiden who operates a vast shrine at the village of Kreza, where she creates horrid amalgamations of Flesh and Metal. ( Cyborgs replace the Mongrelfolk )

The Imperial City is Vallaki, I allow the option to have a " golden ending " to the questline in which the Jade Emperor is ousted but his wife the Empress enters a political binding agreement ( or marriage if you want ) with Evangaline Pentageist and the Jade City remains free while improving the lives of all citizens. Evangaline keeps the Shogun placated with hidden loyalty without turning the city over to him wholesale.

The biggest departure is the removal of the Martikovs. I repalced them with The Troupe, a band of 36 highly skilled Kabuki Play actors and actresses who each own a distinct Mask. The party has hints of these masks throughout the adventure and slowly learn that there is a massive information network of these players. Inspired by the White Lotus from Avatar the Last Airbender, they preserve the story of the true origins of the Storm Shogun and help the party realize that they have been reincarnated dozens of times only to fail, this helps them learn from past mistakes.

The second greatest departure is that the Shogun's Sister ( Sergei ) is also reincarnating. She and Yoko have over time retained memories of each other despite their constant reincarnations, though the memories are vague and dreamlike. This is how Yoko has slowly become a skilled engineer while the Shogun's Sister has slowly become a street thief in the Imperial City. The two should meet often throughout the adventure, first as adversaries but slowly growing to be lovers. NOTE: Doing a love story, particularly one that does not involve players, is hard to make engaging. Imply rather than show, have Yoko show up later than usual at night and say how much fun she had while out with a " Friend " etc. etc.

I had Yoko be a Kitsune for this adventure and had the Shogun's Sister reincarnate as a Tanuki just for the fun of it but feel free to make them be of any race. You can make the Shogun's Sister Male if you wish, I personally just felt like adding some diversity to the campaign.

Wooooo! That was a long journey but we mostly got through it. I know there's alot that's glazed over but that's just part of my DMing style. I don't really write down every possible thing because honestly my players are gonna blow 90% of those plans up before they even make contact with them. If your curious to know more about anything just let me know and hopefully I didnt' bore you too much!
submitted by Zephyr_2 to CurseofStrahd [link] [comments]

Part 2: Tools & Info for Sysadmins - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments or suggestions.
u/crispyducks
submitted by crispyducks to sysadmin [link] [comments]

Tools & Info for MSPs #2 - Mega List of Tips, Tools, Books, Blogs & More

(continued from part #1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
Fyi - I've set up a subreddit /itprotuesday, where we feature / encourage posts of some additional tools, tips etc. throughout the week. Pop over and subscribe if you’re interested.
submitted by crispyducks to msp [link] [comments]

IT Pro Tuesday #64 (part 2) - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Captura is a flexible tool for capturing your screen, audio, cursor, mouse clicks and keystrokes. Features include mixing audio recorded from microphone and speaker output, command-line interface, and configurable hotkeys. Thanks to jantari for the recommedation.
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
submitted by crispyducks to ITProTuesday [link] [comments]

100% Win Strategy - $50 to $7K - Binary Options Newest ... Binary Options Strategy 2020  100% WIN GUARANTEED ... Binary Options 1 Hour Channel Trading Strategy 90% Accurate Yet Simple Olymp Trade Best 80% Winning Strategy  Best Binary Option ... Charting Techniques A Trading Strategy In Detail binary ... BINARY OPTIONS TUTORIAL - YouTube 2 Minutes Strategy Binary Options 2020 (IQ Options) - YouTube

Alex Gorbunov, Profitable binary option trading strategy: Binary options have a very low level of entrance. Even $10 is enough to open an account and start trading. Besides that, you can open a demo account without money and start practicing your trading. If you would like to see which are the advantages of using binary trading, sign up for the course. It doesn’t matter if you are a beginner ... Trading Vite is an investment management company. We are run by a team of trading experts who generate profits by buying and selling currencies, stocks, options and commodities on the foreign exchange market. We employ a variety of trading techniques to achieve the set goals for the client. Reversal Channel Trading Strategy By benjamin • Posted in Binary Options Trading Tips • No Comments Every trader desires to earn more money so that he/she can have that ultimate vacation or buy that dream gadget or other stuff. Learn the three proven techniques you can use every day to trade with the Keltner trading strategy.The Keltner channel system can improve your profitability because it adapts to the ever-changing Forex market conditions.. If this is your first time on our website, our team at Trading Strategy Guides welcomes you. Jan 19, 2013 - Explore Michael Freeman's board "Mike's Binary Options Channel" on Pinterest. See more ideas about Binary, Options, Forex trading tips. There are techniques developed to help you understand some of the data, such as charts and which will make it easier for a new trader. Ready? Start trading binary options now . The popular strategies to go for are: I – Fundamental Analysis Strategy. This strategy is concerned with the analysis of the behavior of the overall performance or attributes of a company. As an investor or trader in ... Today we are going to share our binary options trading strategy with you. This strategy is designed to help you identify whether you'll like trading binaries and teach you how to trade binary options the right way. If you prefer to play it safe over gambling, you'll need a strategy or tactic to help you master binary options and other trading activities. This is where our TSG team comes to the ... Binary options offer financial markets speculators an easy way to trade with limited downside risk. Unlike the underlying assets themselves that have potentially unlimited trading risk, binary ... Binary Options Trading Requires Very Little Experience. The common misconception is that binary options trading and forex trading can only be done by one that has a certain amount of experience in the area. There is no requirement to have any previous experience in financial trading and with a little time, any skill level can grasp the concept of binary options trading. Canal binário opções binárias sistema de negociação para M1 No canal estratégias fronteiras do canal de preços agem em um papel de suporte ...

[index] [10590] [19490] [1217] [15482] [5794] [26841] [17044] [29145] [29613] [749]

100% Win Strategy - $50 to $7K - Binary Options Newest ...

Olymp Trade Best 80% Winning Strategy Best Binary Option Strategy WaRiis Ali Olymp Trade Registration https://bit.ly/3n6NnC8 Telegram Channel ⭐️https:/... This 1 hour binary options strategy is another very accurate system to make huge binary options profits. It like 90% accurate. The indicator involved is called BO channel. I don't recommend ... Open VIRTUAL money account - http://goo.gl/y45Lng Charting Techniques A Trading Strategy In Detail binary options binary options martingale, binary options m... Hi! This is my binary options video blog. I will show you how I earn money on binary options with simple binary options strategy This is iq option, binary_com, deriv_com,olymptrade, binary, forex, and Crypto strategy channel for new traders. If you are not experienced and need some hel... IQ Options -https://affiliate.iqoption.com/redir/...Please subscribe and leave a like for more videos.Online trading is a very risky investment/profession. It i... The road to success through trading IQ option Best Bot Reviews Iq Option 2020 ,We make videos using this softwhere bot which aims to make it easier for you t... 200% Deposit Bonus ExpertOption Link : https://bit.ly/2Lq3NUt-----... Try in Free: https://bit.ly/2Sstje2 #binary_options #iq_option_strategy #iq_option ★★Best Binary Broker List★★ ----- RISK ...

http://binaryoptiontrade.booksvimicma.ml