Archives for Networking Essentials - Page 3
UPN vs SPN Troubleshooting–Event Logs
Kerberos Authentication (Any AD auth related events) go into the Windows System Event ; This is the first place to start looking for any authentication errors that occur with SPN…
VPN Essentials
What is a VPN? A VPN makes the private network, such as your corporate network, accessible through public infrastructure (aka internet). A VPN can allow users to exchange data efficiently…
Containerization of Legacy Apps
Recently, I was tasked with devising a strategy for transferring legacy apps (running on Windows 2003 and older) Containerization Strengths A technique for packaging a service, application or job. Shares…
image2docker–getting older ASP.NET webforms apps onto newer OSes
Image2Docker may be the simplest path for getting your older .NET apps working on newer ; It works by extracting either an entire VM or specific 'artificats' from a ;…
VPN–Tunnel essentials
Types of Tunnels - Site to Site or Network to Network VPNs can be either remote-access (connecting a computer to a network) or site-to-site (connecting two networks). In a corporate…
CPUs, Cores per CPU and vCPUs
Assume that we have a piece of hardware with 4 CPUs that have 4 Cores each. Say hyperthreading is enabled; which means that each core can handle 2 threads simultaneously;…
Fiddler–for tweaking the HTTP Referrer field
Fiddler can be used to quickly modify the parts of an HTTP request (both GET and POST) Fiddler provides a window below the URL textbox – which can be used…
Ping versus TraceRoutes
Do Firewalls Let in Ping Traffic? Corporate firewalls may not allow PING traffic, which makes it not the most reliable test. Tracert however, should always work, since it is based…