How to modify the Default Domain Policy GPO
Part 1: What is Group Policy?
Part 2: Open the GPMC and find the Default Domain Policy
- In the GPMC (Group Policy Management Console), right-click the Default Domain Policy and click Edit…
- How to open the GPMC (Server 2003/2008_R1)
- Expand Forest: contoso.com, Domains, contoso.com (you should now see Default Domain Policy below contoso.com)
Part 3: Disable the Password must meet complexity requirements policy
- Expand Computer Configuration, Polices, Windows Settings, Security Settings (Account Policies will appear below Security Settings)
- Select Account Policies (Password Policy will appear in the right window)
- Double-click Password Policy (various policies will appear in the right window)
- Double-click Password must meet complexity requirements (the Properties dialog box appears)
- Click the Explain tab and read the explanation of this policy
- Click the Security Policy Setting tab, click Disabled and click OK
to be continued…
IPv6 Neighbor Discovery Process
- Determines the link-local address of a neighbor-devices (all devices on the same link/LAN)
- Verifies the reachability of a neighbor
- Keeps track of neighboring devices
IPv6 Neighbor Solicitation Message
- Sent on the local link when a node wants to determine the link-layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node.
IPv6 Link-layer addresses appear to be the same as Link-local addresses (are they TECHNICALLY the same?)
Surveillance Self-Defense (SSD), a project of the Electronic Frontier Foundation (EFF), exists to answer two main questions: What can the government legally do to spy on your computer data and communications? And what can you legally do to protect yourself against such spying?
The Surveillance Self-Defense site aims to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it.
Can the first and last subnet be used? Absolutely.
In the past, using the first subnet (subnet zero) and the last subnet (all-ones subnet) was not supported. However, modern routers support both. For more information, see Subnet Zero and the All-Ones Subnet from Cisco.
Markdown is an easy alternative to HTML. It’s also a great way to organize notes, to-do lists, and other things. This article is a great introduction.
You can learn even more at https://guides.github.com/features/mastering-markdown/
and with this interactive tutorial
With Project Naptha (a free extension for the Google Chrome browser), you can highlight, copy/paste, edit, even translate text within images.
Children of all ages need help with memorization. This article on Edutopia has five suggestions for improving memorization skills.
Better Money Habits, powered by Bank of America in partnership with Khan Academy, delivers free world-class financial literacy for anyone, anywhere. The Khan Academy approach is focused on enabling people to learn what they want to know – in their own way and at their own pace.