How do you put pictures in your Outlook email signature so that everyone you send email to gets a little picture, and when they click on it, it sends them to a special website of your choosing? Well mom, that’s easy! Here’s how. But keep in mind, your screens may look a little different than mine, but it’s the same general get-r-dun process even if you’re using an older version of Outlook or Windows. I’m on 2008 server, so your mileage may vary.
I really like this tool, redirect the output to a file and it should dump the whole tree in seconds. All I was really interested in was the dn, cn, mail, and displayName, but I found I was able to see much more.
See current network properties for all interfaces, Manually configure an IP address for interface eth0, See the current network properties for all wireless interfaces, Configure wireless to talk to a specific access point by address, Configure a wireless interface to use channel 11, Set the default gateway, Configure static routes, See what PIDs/processes are associated with remote connections
Find computers and their description from the AD, Use LDP to search for tombstoned objects in AD, Show all replicated attributes in the AD Schema, Show an AD schema attribute, Find a list of CNs in the directory and return their homeDirectory, Identify the DN of an Active Directory group, Query a user from AD using WMI, etc.
Here is a directory where I checked out some code, and I don’t want this to get updated or changed in any way at all. I like it exactly like it is, and if someone messed with it, i’d like to know what’s changed. For this example, I use a fsvs repository so I can see the history and roll back to exactly the right version, but lets just say you want a one shot deal for a bunch of files… If something comes up and I think this has changed in any way, I can run another batch of md5sums and meld the results. (yum info meld, good utility)
There’s a .dll in the Windows 2k3 Resource Kit named “Acctinfo.dll” that’s not registered by default. If you copy this .dll to a machine where you browse AD with Active Directory Users and Computers snapin, and register it, you’ll start seeing several additional attributes that were not queried before like password expiration date, SID, GUID, etc.
So now I know this certificate is blessed by my client, I can try to use it to connect. But let’s say I try to use a self-signed certificate or another cert that’s not trusted… And using a self-signed certificate, you should see something like this… If it’s a trust issue, perhaps the certificate is valid, but it just can’t find the CA or intermediate certificate… But, if everythings working correctly, your client should connect just fine. And it will look something like this, with a big fat Verify return code: 0 (ok) at the end.