Tag: Authentication

Feb 13

BSD General Commands Manual: SCP

SCP(1) BSD General Commands Manual SCP(1) NAME         scp — secure copy (remote file copy program) SYNOPSIS         scp [-12346BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] [-l limit] [-o ssh_option] [-P port] [-S program] [[[email protected]]host1:]file1 … [[[email protected]]host2:]file2 DESCRIPTION         scp copies files between hosts on a …

Continue reading »

Jan 30

Resolve: Failed to establish a connection with host: the credentials supplied to the package were not recognized (0x8009030D).

Resolve: Failed to establish a connection with host: the credentials supplied to the package were not recognized (0x8009030D). When working with Hyper-V you might have the need to transfer a Virtual Machine from one host to another but might run into the following error message when trying: “Failed to establish a connection with host ‘TARGETVMHOST’: …

Continue reading »

Dec 09

How to: Secure a site using Apache

How to: Secure a site using Apache If I had to, I would probably say that most people who use Apache do it to publish sites that are publicly accessible and/or have built-in security (say WordPress which manages itself access to the application and data). So now that I wanted to publish a site that …

Continue reading »

Oct 18

How to Configure TMG for Office 365 (Exchange) Hybrid deployments

Obtained from: http://community.office365.com/en-us/wikis/exchange/1042.aspx   How to Configure TMG for Office 365 (Exchange) Hybrid deployments   The purpose of this article to give some general guidance on how to configure TMG for use with Office 365 Exchange related components. The idea is to give some general guidance mainly around authentication settings needed on the TMG rule …

Continue reading »

May 19

How to: Publish Exchange 2010 – Outlook Web Access (OWA) – with TMG

Publishing Outlook Web Access (OWA) using Microsoft’s Threat Management Gateway (TMG) Publishing Outlook Web Access (OWA) is a usual step in the enterprise. You want to be able to provide access to your corporate emails via a web interface users can access anywhere with an Internet Connection. Below are some steps and recommendations for making …

Continue reading »