SlideShare a Scribd company logo
Prepared by: LENG Tola SNA15-B
 Active Directory, Trust Domain on
Windows.
Homework
1. Create two OU (SNA15-A, SNA15-B)............................................................3
2. Create Users of class SNA-A and SNA-B(Description: Students, Office:
B13,A21)................................................................................................................6
a. Create and use syntax for create users of class SNA15-B.....................6
b. Create and use syntax for create users of class SNA15-A.....................7
3&4. Create two groups for G_SNA15A and G_SNA15A and Add users of
class SNA-A and SNA-B into each groups........................................................12
- G_SNA15A......................................................................................................12
- G_SNA15B......................................................................................................19
4. client joins domain with windows srv2008...............................................25
5. Create user profile on windows client (take one user in class SNA-A&B
login)....................................................................................................................33
a. A user in class SNA-A................................................................................33
b. A user in class SNA-B................................................................................35
6. Set limit hours logon for two users in Class SNA-A&B to login server
(any users)..........................................................................................................39
- Note: Start from 8:00AM to 6:00PM and from Monday until Friday..
Class a.SNA15-A..............................................................................................39
b.Class SNA15-B..............................................................................................40
7. Set temporary or account expire two users for class SNA-A&B (any
users)...................................................................................................................46
8.Delegate two users (Class Monitor) on each OUs.......................................51
10. Configure Trust domain...............................................................................79
Prepared by: LENG Tola SNA15-B
1. Create two OU (SNA15-A, SNA15-B)
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
2. Create Users of class SNA-A and SNA-B(Description:
Students, Office: B13,A21)
a. Create and use syntax for create users of class SNA15-B
Prepared by: LENG Tola SNA15-B
b. Create and use syntax for create users of class SNA15-A
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
3&4. Create two groups forG_SNA15A and G_SNA15A
and Add users of class SNA-A and SNA-B into each
groups
- G_SNA15A
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
- G_SNA15B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
4. client joins domain with windows srv2008
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
5. Create user profile on windows client (take one user
in class SNA-A&B login)
a. A user in class SNA-A
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
b. A user in class SNA-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
6. Set limit hours logon for two users in Class SNA-A&B to
login server (any users)
- Note: Start from 8:00AM to 6:00PM and from Monday
until Friday.. Class a.SNA15-A
Prepared by: LENG Tola SNA15-B
b.Class SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
7. Set temporary or account expire two users for class
SNA-A&B (any users)
- Monday 28th july 2014 (Temporary time)
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
8.Delegate two users (Class Monitor) on each OUs
a. Delegate for user chhunly.bin who class monitor of
SNA15-A
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
-Show result
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
b.Delegate for class monitor of SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
10. Configure Trust domain
First: Choose Two ways option then shows result.
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
a. Open Active Directory Domains and Trusts.
Prepared by: LENG Tola SNA15-B
b. right-click the domain for which you want to establish a trust, and then click
Properties.
c. On the Trusts tab, click New Trust, and then click Next.
Prepared by: LENG Tola SNA15-B
d. On the Trust Name page, type the Domain Name System (DNS) name (or NetBIOS
name) of the domain, and then click Next.
Prepared by: LENG Tola SNA15-B
e. On the Trust Type page, click External trust, and then click Next.
Prepared by: LENG Tola SNA15-B
f. On the Direction of Trust page, click Two-way, and then click Next.
Prepared by: LENG Tola SNA15-B
g. On the Sides of Trust page, click Both this domain and the specified domain, and then
click Next.
Prepared by: LENG Tola SNA15-B
h. On the User Name and Password page, type the user name and password
for the appropriate administrator in the specified domain.
i. On the Outgoing Trust Authentication Level--Local Domain page, do one of the
following, and then click Next:
Prepared by: LENG Tola SNA15-B
j. On the Outgoing Trust Authentication Level--Specified Domain page, do one of the
following, and then click Next:
Prepared by: LENG Tola SNA15-B
k. On the Trust Creation Complete page, review the results, and then click
Next
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
l.
m. If you want to confirm this trust, click Yes, confirm the outgoing
trust, and then supply the appropriate administrative credentials from the
specified domain.
Prepared by: LENG Tola SNA15-B
n.
o. If you want to confirm this trust, click Yes, confirm the incoming trust,
and then supply the appropriate administrative credentials from the specified
domain.
Prepared by: LENG Tola SNA15-B
p. On the Completing the New Trust Wizard page, click Finish.
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
q. Show Result
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
r. Test and show result
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
10. Second: Choose One ways (in-coming) option then
shows result
a. Open Active Directory Domains and Trusts.
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Test and Show result
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Test and Show result
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
What is different between Trust domain Two ways and One ways (in-coming) option?
Prepared by: LENG Tola SNA15-B
- Two-way. A two-way trust allows authentication requests that are sent by users in either
domain or forest to be routed or communication are successfully to resources and user
logon… in either of the two domains or forests.
- One-way: incoming. A one-way, requests that are sent by users in your domain or forest
(the domain or forest where you started the New Trust Wizard) to be relationship
successfully to resources or login in the other domain or forest. But make sure each
domain is have new trust of One-way: Outgoing.
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B
Prepared by: LENG Tola SNA15-B

More Related Content

Viewers also liked

How to be a good presentor by tola
How to be a good presentor by tolaHow to be a good presentor by tola
How to be a good presentor by tola
Tola LENG
 
Java Logging discussion Log4j,Slf4j
Java Logging discussion Log4j,Slf4jJava Logging discussion Log4j,Slf4j
Java Logging discussion Log4j,Slf4jRajiv Gupta
 
jsf2 Notes
jsf2 Notesjsf2 Notes
jsf2 Notes
Rajiv Gupta
 
Tola.leng sa nagios
Tola.leng sa nagiosTola.leng sa nagios
Tola.leng sa nagios
Tola LENG
 
Jsp Notes
Jsp NotesJsp Notes
Jsp Notes
Rajiv Gupta
 
Basic security & info
Basic security & infoBasic security & info
Basic security & info
Tola LENG
 
Struts2 notes
Struts2 notesStruts2 notes
Struts2 notes
Rajiv Gupta
 
Ansible automation tool with modules
Ansible automation tool with modulesAnsible automation tool with modules
Ansible automation tool with modulesmohamedmoharam
 
File Share Server, FTP server on Linux SuSE and Windows
File Share Server, FTP server on Linux SuSE and WindowsFile Share Server, FTP server on Linux SuSE and Windows
File Share Server, FTP server on Linux SuSE and Windows
Tola LENG
 
How to configure IPA-Server & Client-Centos 7
How to configure IPA-Server & Client-Centos 7How to configure IPA-Server & Client-Centos 7
How to configure IPA-Server & Client-Centos 7Tola LENG
 
Configure DHCP Server and DHCP-Relay
Configure DHCP Server and DHCP-RelayConfigure DHCP Server and DHCP-Relay
Configure DHCP Server and DHCP-Relay
Tola LENG
 
Lab work servlets and jsp
Lab work servlets and jspLab work servlets and jsp
Lab work servlets and jsp
Rajiv Gupta
 
Ad, dns, dhcp, file server
Ad, dns, dhcp, file serverAd, dns, dhcp, file server
Ad, dns, dhcp, file server
Tola LENG
 
Tola.leng mail server (sq_mail & rcmail)_q5_
Tola.leng mail server (sq_mail & rcmail)_q5_Tola.leng mail server (sq_mail & rcmail)_q5_
Tola.leng mail server (sq_mail & rcmail)_q5_
Tola LENG
 
Linux and Samba in 75 Minutes
Linux and Samba in 75 MinutesLinux and Samba in 75 Minutes
Linux and Samba in 75 Minuteswebhostingguy
 
Introduction to jsf2
Introduction to jsf2Introduction to jsf2
Introduction to jsf2Rajiv Gupta
 
System Engineer: OpenLDAP and Samba Server
System Engineer: OpenLDAP and Samba ServerSystem Engineer: OpenLDAP and Samba Server
System Engineer: OpenLDAP and Samba Server
Tola LENG
 
Basic command to configure mikrotik
Basic command to configure mikrotikBasic command to configure mikrotik
Basic command to configure mikrotik
Tola LENG
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...webhostingguy
 

Viewers also liked (20)

How to be a good presentor by tola
How to be a good presentor by tolaHow to be a good presentor by tola
How to be a good presentor by tola
 
Java Logging discussion Log4j,Slf4j
Java Logging discussion Log4j,Slf4jJava Logging discussion Log4j,Slf4j
Java Logging discussion Log4j,Slf4j
 
jsf2 Notes
jsf2 Notesjsf2 Notes
jsf2 Notes
 
Tola.leng sa nagios
Tola.leng sa nagiosTola.leng sa nagios
Tola.leng sa nagios
 
Jsp Notes
Jsp NotesJsp Notes
Jsp Notes
 
Basic security & info
Basic security & infoBasic security & info
Basic security & info
 
Struts2 notes
Struts2 notesStruts2 notes
Struts2 notes
 
Ansible automation tool with modules
Ansible automation tool with modulesAnsible automation tool with modules
Ansible automation tool with modules
 
File Share Server, FTP server on Linux SuSE and Windows
File Share Server, FTP server on Linux SuSE and WindowsFile Share Server, FTP server on Linux SuSE and Windows
File Share Server, FTP server on Linux SuSE and Windows
 
How to configure IPA-Server & Client-Centos 7
How to configure IPA-Server & Client-Centos 7How to configure IPA-Server & Client-Centos 7
How to configure IPA-Server & Client-Centos 7
 
Configure DHCP Server and DHCP-Relay
Configure DHCP Server and DHCP-RelayConfigure DHCP Server and DHCP-Relay
Configure DHCP Server and DHCP-Relay
 
Lab work servlets and jsp
Lab work servlets and jspLab work servlets and jsp
Lab work servlets and jsp
 
Auxiliary : Tomcat
Auxiliary : TomcatAuxiliary : Tomcat
Auxiliary : Tomcat
 
Ad, dns, dhcp, file server
Ad, dns, dhcp, file serverAd, dns, dhcp, file server
Ad, dns, dhcp, file server
 
Tola.leng mail server (sq_mail & rcmail)_q5_
Tola.leng mail server (sq_mail & rcmail)_q5_Tola.leng mail server (sq_mail & rcmail)_q5_
Tola.leng mail server (sq_mail & rcmail)_q5_
 
Linux and Samba in 75 Minutes
Linux and Samba in 75 MinutesLinux and Samba in 75 Minutes
Linux and Samba in 75 Minutes
 
Introduction to jsf2
Introduction to jsf2Introduction to jsf2
Introduction to jsf2
 
System Engineer: OpenLDAP and Samba Server
System Engineer: OpenLDAP and Samba ServerSystem Engineer: OpenLDAP and Samba Server
System Engineer: OpenLDAP and Samba Server
 
Basic command to configure mikrotik
Basic command to configure mikrotikBasic command to configure mikrotik
Basic command to configure mikrotik
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
 

Similar to Configure active directory & trust domain

Asynchronous programming 20180607
Asynchronous programming 20180607Asynchronous programming 20180607
Asynchronous programming 20180607
Yifan Xing
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
Cisco Mobility
 
はじめて学ぶバージョン管理とGit
はじめて学ぶバージョン管理とGitはじめて学ぶバージョン管理とGit
はじめて学ぶバージョン管理とGit
Hiromu Shioya
 
みゆっき☆Think#9「はじめて学ぶバージョン管理とGit」
 みゆっき☆Think#9「はじめて学ぶバージョン管理とGit」 みゆっき☆Think#9「はじめて学ぶバージョン管理とGit」
みゆっき☆Think#9「はじめて学ぶバージョン管理とGit」techtalkdwango
 
BlaBlaCar et la mise en place d'une fonctionnalité FlagFeature
BlaBlaCar et la mise en place d'une fonctionnalité FlagFeatureBlaBlaCar et la mise en place d'une fonctionnalité FlagFeature
BlaBlaCar et la mise en place d'une fonctionnalité FlagFeature
CocoaHeads France
 
Andrea Pompili - The Dark Side of Malware Analysis
Andrea Pompili - The Dark Side of Malware AnalysisAndrea Pompili - The Dark Side of Malware Analysis
Andrea Pompili - The Dark Side of Malware Analysis
Codemotion
 
The Joys of Clean Data with Matt Dowle
The Joys of Clean Data with  Matt DowleThe Joys of Clean Data with  Matt Dowle
The Joys of Clean Data with Matt Dowle
Sri Ambati
 
Containerize vs Virtualize? NGDC 2009
Containerize vs Virtualize? NGDC 2009Containerize vs Virtualize? NGDC 2009
Containerize vs Virtualize? NGDC 2009Andy d
 
TASBot - the perfectionist
TASBot - the perfectionistTASBot - the perfectionist
TASBot - the perfectionist
Ange Albertini
 
The Evolution of the R Software Ecosystem (CSMR 2013)
The Evolution of the R Software Ecosystem (CSMR 2013)The Evolution of the R Software Ecosystem (CSMR 2013)
The Evolution of the R Software Ecosystem (CSMR 2013)
Bram Adams
 
Shift Remote: Mobile - Devops-ify your life with Github Actions - Nicola Cort...
Shift Remote: Mobile - Devops-ify your life with Github Actions - Nicola Cort...Shift Remote: Mobile - Devops-ify your life with Github Actions - Nicola Cort...
Shift Remote: Mobile - Devops-ify your life with Github Actions - Nicola Cort...
Shift Conference
 
Functional IoT: Hardware and Platform
Functional IoT: Hardware and PlatformFunctional IoT: Hardware and Platform
Functional IoT: Hardware and Platform
Kiwamu Okabe
 
MySQL Manchester TT - Replication Features
MySQL Manchester TT  - Replication FeaturesMySQL Manchester TT  - Replication Features
MySQL Manchester TT - Replication Features
Mark Swarbrick
 

Similar to Configure active directory & trust domain (14)

Asynchronous programming 20180607
Asynchronous programming 20180607Asynchronous programming 20180607
Asynchronous programming 20180607
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
 
はじめて学ぶバージョン管理とGit
はじめて学ぶバージョン管理とGitはじめて学ぶバージョン管理とGit
はじめて学ぶバージョン管理とGit
 
みゆっき☆Think#9「はじめて学ぶバージョン管理とGit」
 みゆっき☆Think#9「はじめて学ぶバージョン管理とGit」 みゆっき☆Think#9「はじめて学ぶバージョン管理とGit」
みゆっき☆Think#9「はじめて学ぶバージョン管理とGit」
 
BlaBlaCar et la mise en place d'une fonctionnalité FlagFeature
BlaBlaCar et la mise en place d'une fonctionnalité FlagFeatureBlaBlaCar et la mise en place d'une fonctionnalité FlagFeature
BlaBlaCar et la mise en place d'une fonctionnalité FlagFeature
 
Andrea Pompili - The Dark Side of Malware Analysis
Andrea Pompili - The Dark Side of Malware AnalysisAndrea Pompili - The Dark Side of Malware Analysis
Andrea Pompili - The Dark Side of Malware Analysis
 
The Joys of Clean Data with Matt Dowle
The Joys of Clean Data with  Matt DowleThe Joys of Clean Data with  Matt Dowle
The Joys of Clean Data with Matt Dowle
 
Containerize vs Virtualize? NGDC 2009
Containerize vs Virtualize? NGDC 2009Containerize vs Virtualize? NGDC 2009
Containerize vs Virtualize? NGDC 2009
 
TASBot - the perfectionist
TASBot - the perfectionistTASBot - the perfectionist
TASBot - the perfectionist
 
The Evolution of the R Software Ecosystem (CSMR 2013)
The Evolution of the R Software Ecosystem (CSMR 2013)The Evolution of the R Software Ecosystem (CSMR 2013)
The Evolution of the R Software Ecosystem (CSMR 2013)
 
Install notes!
Install notes!Install notes!
Install notes!
 
Shift Remote: Mobile - Devops-ify your life with Github Actions - Nicola Cort...
Shift Remote: Mobile - Devops-ify your life with Github Actions - Nicola Cort...Shift Remote: Mobile - Devops-ify your life with Github Actions - Nicola Cort...
Shift Remote: Mobile - Devops-ify your life with Github Actions - Nicola Cort...
 
Functional IoT: Hardware and Platform
Functional IoT: Hardware and PlatformFunctional IoT: Hardware and Platform
Functional IoT: Hardware and Platform
 
MySQL Manchester TT - Replication Features
MySQL Manchester TT  - Replication FeaturesMySQL Manchester TT  - Replication Features
MySQL Manchester TT - Replication Features
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Configure active directory & trust domain