the-server.ninja - ← Older posts









Search Preview

The-Server.Ninja | Server Admin by day… Server Ninja by night… | Page 2

the-server.ninja
Server Admin by day... Server Ninja by night...
.ninja > the-server.ninja

SEO audit: Content analysis

Language Error! No language localisation is found.
Title The-Server.Ninja | Server Admin by day… Server Ninja by night… | Page 2
Text / HTML ratio 29 %
Frame Excellent! The website does not use iFrame solutions.
Flash Excellent! The website does not have any flash contents.
Keywords cloud Severn Windows server Deployment comment servers Leave domain aircon security Server article service cloud Continue MDT join reading
Keywords consistency
Keyword Content Title Description Headings
Severn 13
Windows 13
10
server 10
Deployment 10
comment 9
Headings
H1 H2 H3 H4 H5 H6
18 1 1 0 0 0
Images We found 15 images on this web page.

SEO Keywords (Single)

Keyword Occurrence Density
Severn 13 0.65 %
Windows 13 0.65 %
10 0.50 %
server 10 0.50 %
Deployment 10 0.50 %
comment 9 0.45 %
servers 9 0.45 %
Leave 9 0.45 %
domain 8 0.40 %
aircon 7 0.35 %
security 7 0.35 %
Server 7 0.35 %
7 0.35 %
article 6 0.30 %
service 6 0.30 %
cloud 6 0.30 %
Continue 6 0.30 %
MDT 6 0.30 %
join 6 0.30 %
reading 6 0.30 %

SEO Keywords (Two Word)

Keyword Occurrence Density
Severn Leave 9 0.45 %
a comment 9 0.45 %
Leave a 9 0.45 %
to the 8 0.40 %
Windows Deployment 8 0.40 %
as a 8 0.40 %
of the 7 0.35 %
2015 Severn 7 0.35 %
Continue reading 6 0.30 %
reading → 6 0.30 %
one of 5 0.25 %
in the 5 0.25 %
the domain 5 0.25 %
of course 4 0.20 %
Raspberry Pi 4 0.20 %
2015 4 4 0.20 %
on the 4 0.20 %
such as 4 0.20 %
with the 3 0.15 %
the next 3 0.15 %

SEO Keywords (Three Word)

Keyword Occurrence Density Possible Spam
Severn Leave a 9 0.45 % No
Leave a comment 9 0.45 % No
2015 Severn Leave 7 0.35 % No
Continue reading → 6 0.30 % No
admin password is 3 0.15 % No
as a Squi… 3 0.15 % No
one of our 3 0.15 % No
as a service 3 0.15 % No
to the domain 3 0.15 % No
Pi as a 3 0.15 % No
domain admin password 3 0.15 % No
on Using a 3 0.15 % No
Raspberry Pi as 3 0.15 % No
The domain admin 3 0.15 % No
Using a Raspberry 3 0.15 % No
a Raspberry Pi 3 0.15 % No
you how to 2 0.10 % No
this article I’m 2 0.10 % No
to one of 2 0.10 % No
exactly is ‘The 2 0.10 % No

SEO Keywords (Four Word)

Keyword Occurrence Density Possible Spam
Severn Leave a comment 9 0.45 % No
2015 Severn Leave a 7 0.35 % No
on Using a Raspberry 3 0.15 % No
The domain admin password 3 0.15 % No
domain admin password is 3 0.15 % No
Using a Raspberry Pi 3 0.15 % No
a Raspberry Pi as 3 0.15 % No
Raspberry Pi as a 3 0.15 % No
Pi as a Squi… 3 0.15 % No
show you how to 2 0.10 % No
article I’m going to 2 0.10 % No
Leave a comment In 2 0.10 % No
25 2015 Severn Leave 2 0.10 % No
2015Jul 25 2015 Severn 2 0.10 % No
Leave a comment The 2 0.10 % No
Severn on Using a 2 0.10 % No
In this article I’m 2 0.10 % No
this article I’m going 2 0.10 % No
with the latest updates 2 0.10 % No
one of our customers 2 0.10 % No

Internal links in - the-server.ninja

About
About | The-Server.Ninja
Jan 11, 2018Jan 19, 2018
Powershell – Creating Active Directory User Accounts: with an Office 365 mailbox | The-Server.Ninja
Severn
Severn | The-Server.Ninja
email signature script
How to standardize your company email signature | The-Server.Ninja
Dec 19, 2017
GDPR – Getting Started | The-Server.Ninja
Nov 16, 2017Jan 14, 2018
Windows 10 v1709 Deployment | The-Server.Ninja
Sep 13, 2016Nov 3, 2016
Windows Deployment: PXE booting between VLAN’s | The-Server.Ninja
Sep 6, 2016May 12, 2017
Defeat Ransomware: Use Microsoft File Server Resource Manager (FSRM) – with a twist! | The-Server.Ninja
May 12, 2016May 12, 2017
Build your own computer defence shield: security infographic | The-Server.Ninja
Mar 31, 2016Nov 3, 2016
Happy World Backup Day!!!! | The-Server.Ninja
Dec 6, 2015Nov 3, 2016
Tis the season to be infected.. | The-Server.Ninja
← Older posts
The-Server.Ninja | Server Admin by day… Server Ninja by night… | Page 2
How to standardize your compan…
How to standardize your company email signature | The-Server.Ninja
Cloud
Cloud | The-Server.Ninja
Exchange
Exchange | The-Server.Ninja
Hyper-V
Hyper-V | The-Server.Ninja
Microsoft
Microsoft | The-Server.Ninja
Programming
Programming | The-Server.Ninja
Raspberry Pi
Raspberry Pi | The-Server.Ninja
Security
Security | The-Server.Ninja
Server
Server | The-Server.Ninja
Squid
Squid | The-Server.Ninja
Tools & Utilities
Tools & Utilities | The-Server.Ninja
Uncategorized
Uncategorized | The-Server.Ninja
VPN
VPN | The-Server.Ninja
Windows 10
Windows 10 | The-Server.Ninja
Windows Deployment
Windows Deployment | The-Server.Ninja
Entries RSS
The-Server.Ninja
Comments RSS
Comments for The-Server.Ninja

The-server.ninja Spined HTML


The-Server.Ninja | Server Admin by day… Server Ninja by night… | Page 2 The-Server.Ninja Server Admin by day… Server Ninja by night… Menu Skip to content HomeAbout Search Search for: Phishing Oct 13, 2015Oct 13, 2015 / Severn / Leave a scuttlebutt Protect yourselves from Phishing attacks with this handy poster:  Phishing Advertisements Education. Education. Education Aug 28, 2015Oct 18, 2015 / Severn / Leave a scuttlebutt No, I’m not referring to one of Labour’s winning manifesto policies of the 1997 UK unstipulated election, in this case, I’m talking well-nigh educating end users well-nigh ICT security. What lead me to write this vendible was an interesting issue I recently came across. I say issue, it was increasingly of a surprise. A pleasant one I may add… Think surpassing you click! In a typical world, most computers users are click happy. See an advert… click, new message pops up on screen… click, new email comes through… click! In the unenduring pauses between the clicking of clicks, the computer user spends very little time, if any, to review what is unquestionably stuff clicked on… So, it came as a surprise (after many months and years of what I thought was a seemingly fruitless effort in trying to educate people), out of the blue, one of our customers emailed me to notify me that they had received a suspicious email, and could I investigate… Sure enough, not only had the suspicious email happily passed wideness no less than four variegated AV & Malware venders to reach the users mailbox, none of the 56 vendors from Virus Total detected an issue either! Of course, stuff highly suspicious, I sent the sample to one of our AV providers, an hour later they responded stating the zipper was in fact infected with a trademark new virus: Halifax_Reactivation.pdf – PDF/Phishing.Agent.AV trojan and would be widow to the next signature, which rolled out a few hours later. So in the end, rather than a fruitless effort to make users enlightened of the risks; in this specimen at least, education proved itself to be whilom all else, a vital first defence versus infection and potentially prevented major damaged to the merchantry (imagine if that virus happened to be a new successors of Cryptolocker!). Oh, and of course, that particular user was publicly thanked for bringing the problem to our attention, followed up with information from our AV vender… TSN Windows Deployment: Advanced Part 3 –SuburbaniteInjection. UPDATED for 2018. Jul 26, 2015Mar 26, 2018 / Severn / 1ScuttlebuttIn this article, I’m going to show you how to maintain a suburbanite library within MDT and use one Task Sequence for all hardware models. Separate your drivers out to stave conflicts and reliability issues. This moreover makes it easier to update manufacturer drivers. Continue reading → Windows Deployment – Advanced Part 2: Using WSUS to inject updates during OS deployment Jul 25, 2015Jul 25, 2015 / Severn / Leave a scuttlebutt In this article, I’m going to demonstrate how to configure WSUS to work with MDT (or rather MDT to work with WSUS). Now, updating the odd computer with the latest updates isn’t really an issue, plane on the slowest of internet connections. But what if your trying to update tens, or hundreds of vendee computers during your image deployment? Every one of those clients is going to individually struggle to contact Microsoft and download necessary updates. You’ll find this quickly bottlenecks your internet feed, plane on the fastest of connections. What’s a WSUS? No, tint that image that weedy person to one side!Consideringwe’re talking well-nigh Microsoft WSUS!! Continue reading → 50.503630 -4.652498 Windows Deployment – Advanced – Part 1. Performing Domain Joins Securely Jul 18, 2015Jul 25, 2015 / Severn / Leave a scuttlebutt In the first of this new multi-part series, I will show you how to take you Windows Deployment to the next level. (For this series, we're thesping your running Server 2012 R2 with the latest updates, and the latest release of MDT 2013). This vendible looks at locking lanugo the os.deploy worth that you use to automatically join computers to the domain. So, let us modernize the security of the mdt join account. This worth which we have specified in CustomSettings.ini (Windows Deployment, Part 1: Configuring the Deployment Environment) and which is used by MDT to join the target computer to the domain. If we leave this worth as a Domain User, then MDT will be worldly-wise to join the first few computers it installs into the domain but then will goof to join any others. This is considering by default Domain Users can only join 10 computers to the domain. In our initial article, we made the worth a member of the domain admins group – of course, perfectly winning in a lab environment, but not so in the real world. This is considering of these three facts: The domain admin password is visible in the customsettings.ini The domain admin password is sent in plain text wideness the network The domain admin password is temporarily stored on the remote pc So, how do we overcome this?? Continue reading → So, what exactly is ‘The Cloud’?! Jul 7, 2015Jul 7, 2015 / Severn / Leave a scuttlebutt The Cloud: A phrase that for many conjures up images of typical British weather, leaving many with the question: “What exactly is ‘The Cloud’?” This vendible attempts to well-spoken things up in time for summer and wordplay that very question.   What is ‘The Cloud’? The deject in its simplest form means: a set of servers or services offered over a publicly wieldy network (ie. the internet) Many people use deject technologies every day, without plane giving it a second thought. Gmail, Outlook.com, OneDrive, iCloud and Dropbox are spanking-new examples of deject based services you’ve likely come wideness both at home, and in the workplace.   What can ‘The Cloud’ do for me and my business? There are many advantages for those looking to use deject technologies: Reducing infrastructure financing Utilizing deject technologies such as Microsoft’s Azure can help your merchantry reduce it’s spend on IT hardware, maintenance agreements and ongoing financing associated with power and cooling. Whilst services such as Azure don’t yet totally eliminate the need for on-site servers, it does reduce the quantity of servers your merchantry may need to purchase or refresh in the future. Improving your Disaster Recovery plan If you have a need to when up your data, and let’s squatter it, who doesn’t, using a deject service to store an offsite reprinting of your important documents or servers can offer a forfeit constructive way of improving your disaster recovery plan.   Can you PaaS me the what???Overlyheard terms such as IaaS and PaaS? No idea what they mean?  Read on… IaaS: Infrastructure as a service allows you to create your own virtual servers, without the financial overhead of purchasing your own server hardware. PaaS: Platform as a service offers the worthiness to host auto-scaling websites and SQL databases, without the financial overhead or technical complexities typically associated with hosting those services in-house. SaaS: Software as a service, such as Office 365, gives businesses the worthiness to modernize collaboration and liaison between employees and other businesses.   There you have it, the next time someone’s talking “the cloud”, theres no need to vacantly stare into the sky and wonder… Death from above: The silent server room killer May 27, 2015Jul 9, 2015 / Severn / Leave a scuttlebutt It was a Tuesday morning without a wall holiday. 90 minute trek into the office, which was quicker than the usual two hour slog out of Cornwall. Turned the palmtop on, and grabbed a coffee whilst the palmtop finished installing its selection of updates for Windows 10 tech preview. Upon firing up our service workbench application, I was greeted with hundreds of server alerts from the evening before. Careful inspection of the alerts showed that the aircon had failed in one of our customers replacement server rooms. Luckily, the extractor fan we insisted on having installed (after a secondary aircon unit was considered too expensive) was worldly-wise to squire with cooling the room. Not unbearable to alimony the room cool, but helped prevent forfeiture to the hardware. The local aircon maintenance visitor were tabbed out to perform an urgent repair.Withoutunder an hour onsite, the aircon engineer had resolved the problem and the disaster had been averted. The problem? Dandelion seeds. An glut of dandelion seeds had obstructed the external inverter units fan, causing it to overheat and trip out the power. This of undertow shut lanugo the aircon to the server room. Unbelievable, but true. If you have external aircon inverters, its worth getting them checked out! What can I do to prevent this: Of undertow having redundant aircon units on separate supplies is a unconfined idea (with an yearly maintenance contract) , if funds allow, but having email alerts coming through is a unconfined warning system, and its little to no forfeit to implement. It’s moreover possible to shutdown servers if they get hot (though of undertow that can have its own issues with regards to continuity of service). I recommend taking a squint at this guide from the guys over at howtogeek 60 days to go: Is this the biggest security threat of 2015? May 14, 2015Jul 24, 2015 / Severn / Leave a scuttlebutt The clock is ticking…. With less than two months from now, Microsoft will stop supporting Server 2003, leaving many businesses with a major security headache. From July 14th 2015, Microsoft will no longer issue security patches for Server 2003, leaving it unshut to an overly increasing risk of virus, spyware and malware infection, not to mention a plethora or security holes permitting hackers to proceeds wangle to a businesses network (67% of IT security breaches happen with businesses employing less than 100 staff). Continue reading → Enable Hyper-V replication between two workgroup servers May 13, 2015Jun 27, 2017 / Severn / Leave a scuttlebutt Hyper-V replication is an essential ‘server availability’ tool for any organization. Whilst it is not a substitute for good backups; it will indulge you to restore an up-to-date reprinting of your virtual servers very quickly, should your primary host hardware fail. In this tutorial, i have built two Windows 2012 R2 servers using a pair of old Dell Optiplex 580’s (AMD Phenom CPU, upgraded to 8GB RAM each), and a single 8 port Netgear GB switch. The Primary server name is: Truro The Secondary server name is: Exeter Lets get started… Continue reading → How to reset a forgotten server admin password… May 2, 2015Mar 19, 2018 / Severn / Leave a scuttlebutt A few weeks ago, we had a undeniability from a merchantry who’s IT support visitor had gone AWOL. This left the merchantry with a server they were unable to wangle – you see, the IT support visitor hadn’t provided their consumer with any passwords or documentation for their server. So, when we got the call, the visitor I work for did as any good IT support merchantry would…  we donned our superhero capes and got stuck in….   Here’s how you do it: Continue reading → Posts navigation ← Older posts Newer posts → Search for: Recent Posts Powershell – Creating Active Directory User Accounts: with an Office 365 mailbox Jan 11, 2018 GDPR – Getting Started Dec 19, 2017 Windows 10 v1709 Deployment Nov 16, 2017 News: Windows Server 2016 RTM. Now misogynist on the MVLS portal! Oct 13, 2016 Windows Deployment: PXE booting between VLAN’s Sep 13, 2016 Recent Comments Powershell – C… on How to standardize your compan…Severn on Windows Deployment: Advanced P…Severn on Using a Raspberry Pi as a Squi…Wall on Using a Raspberry Pi as a Squi…Severn on Using a Raspberry Pi as a Squi… Archives Archives Select Month Jan 2018  (1) Dec 2017  (1) Nov 2017  (1) Oct 2016  (1) Sep 2016  (2) May 2016  (1) Mar 2016  (2) Dec 2015  (1) Oct 2015  (1) Aug 2015  (1) Jul 2015  (4) May 2015  (4) Apr 2015  (4) Feb 2015  (4) Jan 2015  (3) Apr 2014  (11) Categories Active Directory (4)Deject(1) Exchange (2) Hyper-V (2) Microsoft (10) Programming (3) Raspberry Pi (1) Security (14) Server (7) Squid (1) Tools & Utilities (7) Uncategorized (4) VPN (1) Windows 10 (2) Windows Deployment (17) Meta Register Log in Entries RSS Comments RSS WordPress.com Advertisements SocialView /pages/The-serverninja/611128422321990’s profile on FacebookView @the_serverninja’s profile on Twitter Follow The-Server.Ninja on WordPress.com Blog at WordPress.com. Post to Cancel Privacy & Cookies: This site uses cookies. By standing to use this website, you stipulate to their use. To find out more, including how to tenancy cookies, see here: Cookie Policy