Advanced Search
Search Results
213 total results found
Platform Manual
Allow ssh with password
Change parameter in config file Edit ssh config file: sudo nano /etc/ssh/sshd_config Restart ssh service sudo systemctl restart sshd
macOS
Increase diskstorage for Linux VMs
To increase the storage drive you first have to increase the storagecapacity in the proxmox admin gui. Then you can use the following commands in this order to increase the size of the volume. fdisk -l cfdisk Next choose "Resize" and then "Write". fdisk -l...
Upload files & folders via Graph API
Requirements: You need to work through the "Preparations" part of this manual: Download & read files ... | LNC DOCS (lucanoahcaprez.ch) With this tutorial, files can be written to SharePoint Online repositories automatically and without user interaction. This...
User manual
Notify license shortage with automation
Requirements: Create an App Registration with LicenseAssignment.ReadWrite.All permissions and a client secret. With this automation all licenses and their usage are evaluated via Graph API. A message is posted in a team channel when a certain amount of usage ...
Advanced registry tweaks
Enable verbose status messages Configure Windows so that you receive verbose startup, shutdown, logon, and logoff status messages. Verbose status messages may be helpful when you're troubleshooting slow startup, shutdown, logon, or logoff behavior. Path Com...
Get calendar entries via PowerShell
Requirements: Basic PowerShell knowhow and Outlook Application. This documentation shows how to read calendar data from an Outlook attached mailbox in PowerShell. Use case This Outlook API can be used to migrate or evaluate the calendar data inside of an Ou...
Get task entries via PowerShell
Requirements: Basic PowerShell knowhow and Outlook Application. This documentation shows how to read task data from an Outlook attached mailbox in PowerShell. Use case This Outlook API can be used to migrate or evaluate the task data inside of an Outlook ma...
Update mailbox data via PowerShell
This documentation contains code blocks in PowerShell to get better acquainted with the Outlook API and describes how data can be modified or written. Use case This interface can be handy when calendar items or task folders need to be moved to other folders ...
Tasks to appointment working method
This guide describes one possible work methodology for getting work done efficiently and transprantly. This also allows to record the work done. Procedure If you have a new task to do in the near future, you can use the following approach. Create a new t...
Long term projects & processes
This overview can be visualized best with the help of a Kanban board. Suitable tools: Microsoft Planner, Asana, Microsoft DevOps, etc. This guide describes a possible work methodology for getting work done efficiently and transprantly. This also allows to rec...
Avoid object property checking with optional chaining
Optional chaining is a relatively new operator that was introduced in ES2020. It allows you to call object properties safely, without throwing an error. When calling properties without this operator, you many crash your applcation with the error Cannot read pr...
Create Win32 line of business app with file upload via Graph API
Here is a perfect manual: Win32LOB intunewin file upload process explained for automation (rozemuller.com)
Credential handling with Azure KeyVault
With this option, the secrets for Azure Functions are stored in an Azure Key Vault. An access policy is placed on the Key Vault which only allows the Managed Identity of an Azure Function to read the secret. On the Azure Function side, a Managed Identity is se...
Access Azure Function App via OAuth 2.0 authentication
This is a guide to protect Azure Function executions using OAuth 2.0. So the execution of the code is not possible without Client ID and ClientSecret. This allows a much more secure authentication than just using function codes in the URL in the query. Disabl...
Expose docker host API to connect over TCP
This page describes exposing the Docker Host API over plain TCP without proper security controls. Directly binding the Docker daemon to an unprotected TCP socket (e.g. 0.0.0.0:2375) is strongly discouraged because it can allow unauthorized remote users to gain...