• Step-by-Step Guide to Configure Firefox Proxy Settings Using Group Policy

    Step-by-Step Guide to Configure Firefox Proxy Settings Using Group Policy

    If you desire to manage the proxy settings of the Mozilla browser in a network in a centralized way, there exists an applicable Group Policy. Different from Google Chrome or Microsoft Edge, Firefox has the potential to not only obtain the proxy configuration from Windows directly but also through GPO. Within numerous organizations, users access…

  • How to Use PowerShell for Managing System and User-Assigned Managed Identities in Azure

    Managed identities provide secure authentication for resources accessing other resources in Azure without requiring sensitive information such as secrets, credentials, and certificates to be handled. Microsoft Entra ID manages these identities, enabling applications to obtain tokens for authentication. In this post, I will provide an example that illustrates how to use system and user-assigned managed…

  • A Step-by-Step Guide: How to Identify Your Installed Windows Version and Build Number

    The easiest way to quickly find out the version and build number of the Windows OS that is installed on your computer is to press the Win+R on the keyboard and run the winver command. The following screenshot shows that Windows 10 version 22H2 is installed on the computer (build number 19045.3324). Both the release…

  • How to Manage Docker Using VS Code

    How to Manage Docker Using VS Code

    You can manage Docker images and containers directly within Visual Studio Code (VS Code) with Microsoft’s Docker extension. This article walks you through adding Docker files to a Workspace, creating a containerized application environment, and explains how to build and run Docker containers directly from the VS Code interface. Prerequisites To follow this guide, you…

  • How to Create a Bootable ISO for a Windows Image (.wim)

    How to Create a Bootable ISO for a Windows Image (.wim)

    Before deploying to clients, it’s critical to update a Windows image with the most recent patches and tailor it according to their requirements. Depending on your deployment technique, the WIM archive may need to be provided on a bootable ISO file. This is something that can be achieved with the tools offered in the Windows…

  • Mastering Complex Network Simulations with GNS3

    Mastering Complex Network Simulations with GNS3

    The free Graphical Network Simulator-3 (GNS3) allows for the planning and practical simulation of networks and their topology. Thanks to Dynamips, it also supports integrating images of Cisco IOS. GNS3 can be integrated with physical hardware, enabling, for instance, the testing of monitoring solutions. In the first step, we install GNS3 on a physical computer,…

  • Step-by-step Guide to Building Your Own ChatGPT App

    Step-by-step Guide to Building Your Own ChatGPT App

    In my previous post on the OpenAI API, I introduced a simple chatbot that demonstrated how to interact with the API. In this post, I will take it a step further by showing you how to create your own ChatGPT app. You may be wondering why you need your own ChatGPT app when you can…

  • Optimizing Performance with Ceph Tuning

    Optimizing Performance with Ceph Tuning

    Tuning Ceph performance is crucial to ensure that your Ceph storage cluster operates efficiently and meets the specific requirements of your workload. As Ceph installations, both in software and hardware, are upgraded or as your workload changes, the default tunables that were optimal at one time may now be obsolete or counterproductive. This article assumes…

  • Step-by-Step Guide on Inserting Offline .MSU Updates into Windows .WIM Images

    Before deployment, Microsoft ISO’s install .wim or custom images should be updated. With the DISM module in PowerShell, you can add .msu updates, apps, and drivers to a Windows image offline without the need to boot it up. In principle, you can roll out outdated WIM archives because Windows Update subsequently downloads the patches to…

  • Step-by-Step Guide to Linking an Azure Function or Web App to a Key Vault using PowerShell

    Azure Functions often require access to sensitive information. It is a security risk to store credentials in code or configuration files. Thus, protecting sensitive information like connection strings, API keys, or passwords is crucial. This is where Azure Key Vault comes in, offering secure and centralized storage for all your secrets. In this article, I…