Want your TV Series Automatically Downloaded?

Its now more easier than ever before. With this step by step guide using Sickbeard , Plex and SABnzb Want your TV Series Automatically Downloaded?
Powered by Blogger.

Latest Updates

Thursday, February 2, 2017

The Simplest way to Backup DHCP Automatically over the network

Posted By: The Funky Tech Guy - 8:09:00 AM


As most of you know, and probably the reason why you are here, is because Windows Server doesn’t have a builtin, automated dhcp backups solution to backup the DHCP Server database over the network.

However, did you know that by default DHCP does already backup the database automatically every 60 minutes? Only problem is it does it locally to C:\Windows\System32\dhcp\backup . Thats not going to help if anything happens to the server.

The Problem

You want to be able to do automatic DHCP backups to your backup server or any other networked location

Solution 1

  1. Create a Batch file with the below code or get a copy HERE and store it on the server e.g c:\scripts
  2. Modify the script by simply changing SERVERNAME to your backup , file server or wherever you want to store the backup.
  3. Create a new scheduled task and configure it as follows

    Automatically Backup DHCP

    I’ve set mine schedule to create backups every 2 hours for 8 hours starting at 8am but you can do it once a day depending on your needs. Mine is 20MB small so you don't have to worry about space issues. The script also creates the destination folder based on the current date and time e.g DHCP_20170202_1738

    Automatically Backup DHCP Over the Network

    Backup DHCP Automatically

    How to Backup DHCP Automatically

    The rest of the settings are defaults
  4. Test by running your scheduled task manually and voila!!

I hope this has been informative for you. If you have any questions do leave them in the comments section below and don’t forget to like and share Winking smile


Tuesday, January 31, 2017

How To: Deploy Java with Active Directory and Group Policy

Posted By: The Funky Tech Guy - 12:51:00 AM




My first post for 2017 and what a year this is starting out to be. I wish you all success in whatever you set out to do.

Today I'm going to show you how to install java to multiple machines or rather how to deploy java with active directory.

Most of us install java by going to  but doing that on a few hundred machines would be impractical. Also that’s usually the online installer, which is a small file that you execute that downloads the rest from the internet before installing it. You can get the offline installers here


The Problem

You want to install java to multiple machines on your network and need a method of doing it automatically.

The Solution

The actually technical bits is pretty simple and its like deploying any other piece of software or .msi via group policy. The tricky bit however is obtaining the software as its not available publicly. What you need is the MSI Enterprise JRE Installer the downside is and I quote:

The MSI Enterprise JRE Installer is only available as part of Oracle Java SE Advanced products1 and is available to customers via My Oracle Support (MOS).

So basically It requires a commercial license and most of us won’t have that. We just want Java.

This is where I come in. You can download a copy here.

How to Install / Deploy

For the record this is how you would deploy most applications via Active Directory and Group Policy.

  1. Obtain the software , see link above
  2. Copy it to your file server share or to your domain controllers netlogon share(if you have many remote sites with slow links) and make a note of the location
    e.g \\servername\share\jre-8u111-windows-i586.msi
  3. Create a new AD Group e.g Java_Installations (Computers in this group will have java deployed to them.)
  4. Open the Group Policy Editor and create a new Group Policy Object (GPO)
  5. Configure the GPO  similar to the below:


  6. From a command prompt do the following, its optional but recommended if you are testing and want faster results

  7. This is a computer policy so check that it applied to your machine by running GPRESULT /R from a command prompt and check that its applied.

  8. You may need to reboot twice maybe more to find that it installed successfully
  9. That’s how you deploy java with group policy

Notes: The Java Uninstall Tool is integrated with the installer to provide an option to remove older versions of Java from the system. The change is applicable to 32 bit and 64 bit Windows platforms. See Uninstalling the JRE for more information




If this post has been useful I would a appreciate a share,like and tweet.

Comment below with any questions or suggestions.

Tuesday, November 29, 2016

Security while playing Online Games

Posted By: The Funky Tech Guy - 12:56:00 PM

Many of us enjoy gaming and it makes the experience that much more fun when you can enjoy it with friends online. However, have you ever stopped to wonder and ask yourself, how safe online gaming is?

Online gaming

Technological developments especially the advent of personal computers in the 1970s greatly accelerated the growth of online gaming. Furthermore, the creation of high-speed (broadband) internet connections has stimulated the evolution of new gaming genres such as the massively popular multiplayer online role-playing games (MMPORGs). Currently, some of the most popular online games are Dota 2 (one of my personal favourites), War Thunder, League of Legends, Planet Side 2, Lineage, and Star Wars: Old Republic.
It is estimated that half a billion people play online games on a daily basis. Most games can now be played on PCs, consoles, and mobile devices. According to a US based study, more than 40 percent of online time is spent on 3 activities - social networking (22.7%), gaming (10.2%) and emails (8.3%).
Online gaming has become a huge and lucrative industry. A recent global games market report showed that the global games industry reached revenues of USD99.6 billion in 2016 and could exceed USD102.9 billion in 2017. The popularity of online gambling has also increased and already had an estimated 937 million gamers in 2012. You can now play most of your favorite games such as poker,blackjack, baccarat, and roulette live, interacting with live dealers and fellow players. The thrill and excitement of winning is all the more exhilarating if you play for real world money. People can also play slots  in a secure online casino, lotteries, bingo, as well as place sports bets. Industry analysts predict that revenues derived from the global gambling market will reach USD 1,009 billion by 2020. Unfortunately, because online gaming is such a profitable industry, it is also set to become the next big target of cyber crime.

The Dangers

The results of a 2016 crime survey conducted in the UK revealed that 6 million online offences had been committed, and one in ten persons in that country had been victims of various cyber crimes. The report warned that people are “more likely now to be mugged online than in the street.” The most shocking statistics for me is that most of the time you have no idea that you’ve become a victim until it’s too late.
Some of the most common cyber crimes and risks associated with online gaming involve identity theft, fraud, phishing, stealing your banking and credit card information, counterfeiting, privacy violations, software piracy, hacking of email and social media profiles, computer virus attacks, cyber bullying, and kidnapping. Online shopping scams and those involving dating sites are some of the other cyber crimes to be on the lookout for. Crimes involving children are also increasing as they are more exposed and naïve when it comes to the dangers of playing online multiplayer games such as Minecraft.

Protecting yourself

So how can you protect yourself when gaming online? How well are you protecting your information from being stolen, used and sold? Some tips are just common sense and being alert and aware
To avoid some of the common risks associated with online gaming make sure that you incorporate the following tips to improve your online security.
  • Start by just using plain old common sense. E.g. If a deal is too good to be true it usually is.
  • Be alert, and be cognisant to the fact that the threat is real
  • Internet security software
    • Ensure that you have installed up to date internet security software. This should include secure firewalls, antivirus and antispyware programs. Also secure all remote connections. Some good free software are AVG, Avast, and Malwarebytes.
  • Passwords
    • There are so many online activities that require a password - online banking, a multitude of social media platforms, forums, gaming, e-mail and tons more. Remember all websites don’t practice the same level of security. That is why you should NOT use the same password for the simple reason that if you have been compromised,they would have only gained access to that one platform.
    • Consider using a password manager to encrypt your passwords. Always use strong passwords. I personally prefer to use long phrases e.g SummerIsGre@t , IL0veDota2, SeeingIsntAlwaysBelieving , WhoTheMan? , BigBoysDontCry . These are example of password that are long but easy to remember.
  • Personal Information
    • NEVER disclose any of your personal information to other players. Also be careful not to reveal your personal information in your username, or where possible when creating a personal profile. Ensure that you delete all personal information should you sell your game consoles (mobile or pcs).
  • Avoid Ad supported games
    • These games still need to make money and usually do so by selling your information to other websites that often result in unsolicited mail.
  • Use reputable gaming platforms
    • Steam – a wide range of both free and paid games that practice good security such as two factor authentication, email verification, SSL
    • if you prefer playing games to win real world cash. – Reputable, SSL and fully licensed
    • Clash of Clans – for mobile gamers on IOS and Android
    • Choose platforms that offer good email and telephonic support
  • Children
    • If you are a parent, ensure that you set clear rules and guidelines for your children when they are playing online. It may be best for younger children not to be allowed to play online games with strangers.

Online gaming is a dynamic and ever changing industry. Today’s gaming genres have come a long way since the early days of Atari consoles and Arcade gaming that was so popular in the 1980s. Gaming has also become firmly embedded in modern popular culture. So where to from here? Virtual reality games and games using artificial intelligence technology are currently being developed. These are new and exciting developments that will keep millions of gamers enthralled. It’s clear that gaming is and will remain a wonderful form of entertainment to connect with friends and family. However, safety should always remain a serious consideration when you are online whether you are gaming, banking, shopping, or connecting with friends on social media.

Have you been a victim due to lack of security on any online gaming platform? Do you use two factor authentication? Are there any additional security precautions you take when playing online, not mentioned here? Let me know in the comments below.

Thursday, October 6, 2016

How to secure your Active Directory by tracking historical activities/changes

Posted By: The Funky Tech Guy - 12:35:00 AM

Active directory is arguably the most important part of your IT infrastructure – housing all user accounts and password data in a centralized place. Due to its very nature, ensuring the Active Directory is secure is both a complex and necessary task. To protect yourself against insider threats it is important to make sure you keep track of all activities and changes that occur in the past and present in your Active Directory through in-depth reporting and real-time alerting.

How to track, audit and monitor Active Directory activities and modifications

There are two main techniques for auditing Active Directory – native auditing and third party solutions.

1. Native Auditing

Auditing the Active Directory natively involves enabling the “audit object changes” option in Active Directory Domain Services. This feature can be implemented by enabling the Global Audit Policy and configuring the System Access Control List. By doing this, you can generate audit logs which can be tracked in the event viewer. To avoid generating an excessive number of logs, create audit exceptions through schema.
In previous versions of Windows Server, audit logs provided information solely on who made changes to which active directory object attributes. From Windows Server 2008 onwards, enabling auditing creates logs of old and new values as well.
Although these audit logs do display a substantial amount of information, using native processes like “Event Viewer” or “PowerShell” can be both a time consuming and ineffective method. This is mainly due to the lack of reports, alerts and graphical comparisons that you can get from the tools. For example, in order to perform historical change tracking, you have to manually compile audit data for each change and list them to make comparisons. This is essentially a full time job if you intend to perform regular and in-depth audits.

2. Third Party Solutions

Third party solutions can help you address all manner of security, systems management and compliance challenges by pro-actively auditing, monitoring and alerting on critical IT systems. LepideAuditor for Active Directory automates the auditing of Active Directory and provides over 270 pre-defined reports that can be delivered via the console or to any specified email address. Deploying an automated solution like this ensures that you get the maximum detail from your audits with the minimum amount of effort.
Below are some examples of the customized reports generated by LepideAuditor for Active Directory that can be used to track, monitor and alert on historic events/activities happening within the Active Directory:
Report I – The following image depicts three trends (in graphical view) as a result of the past events/activities in the Active Directory, including:
1. User Modifications Trend – This displays important operations performed by users, such as create, delete, modify, rename, move, security changes and permissions modifications.
2. Computer Modifications Trend – This report displays computer operations, such as create, delete, modify, move, rename, status change and permission modifications.
3. Group Modifications Trend – This graph shows all the operations performed on specific or numerous groups (a group of user accounts) such as create, delete, modify, rename, move, permission change and membership information (including the addition of new users and deletion of some users).
By hovering over the values you can obtain further details on the information displayed in the graph.
In addition to this, LepideAuditor for Active Directory can also generate detailed reports that show any changes in the usual trends of permissions being granted to users. This includes permission analysis of the historic events/activities in the Active Directory.
Report II – The below report shows domain modifications made by users in an easy to view grid alongside details regarding users whose accounts have been created. You can delve deeper into the reports by filtering based on user path, who created the account, when the account is created, where it is created, “from” field and more. In this image, the custom filters “this month” and “administrator” have been applied to generate a report of the administrator’s activities in the current month.
The detail of each row in the report is displayed on the right hand side under the “Detail” column, as shown in the image.


LepideAuditor Suite includes numerous exclusive features designed specifically to ensure that users are provided with complete visibility into activities taking place in the Active Directory. Some of these include the following:

1. All Modification Reports for Active Directory

LepideAuditor Suite tracks Active Directory modifications and displays all potential changes, along with before and after values, for the objects being modified.


2. Real-time Alerting

Whenever any suspicious behavior, activity or event is encountered in the Active Directory environment, LepideAuditor Suite sends real-time alerts in three different ways: Email notifications (sent straight to the inbox), LiveFeed alerts that continuously track changes as they happen and the LepideAuditor app – a mobile application that allows users to receive instant alerts straight to any Apple or Android enabled device.

3. Powerful Search Capability

LepideAuditor Suite possesses a powerful search functionality that allows users to locate relevant data quickly and easily. All searches can be saved directly to the console for future reference.


Securing your Active Directory is a critical part of your IT security plan, and tracking the changes (both current and historical) that your users are making in this system is a reliable method of detecting suspicious activity. Third-party solutions, like LepideAuditor for Active Directory, provide you with a 360-degree view (both graphical and grid based) of all the events happening within your Active Directory – including displaying “who,” “what,” “when” and “where” details for all changes made. By automating the auditing of your critical IT systems you can ensure that you are getting the maximum amount of detail with the minimum amount of effort.
This article was written by Satyendra Tiwari for The Funky Tech Guy. Follow him on twitter @satylepide

Featured Post

Infrastructure Matters

Copyright © 2013 The Funky Tech Guy ™ is a registered trademark.

Designed by Templateism . Built with Blogger Templates .