Arch/Deploy/Secure/Admin

OPEN SOURCE/STANDARDS
GitHub
BitBucket
CodePlex
Microsoft Open Tech

DESIGN
Fallacies of distributed computing
Microsoft UX guidelines for custom user interactions
3 Ways to Define a JavaScript Object
The Difference Between “Block” and “Inline”
Multi-Device Layout Patterns
Dropdowns Should be the UI of Last Resort
A Guide to FlexBox
HTML5 Sectioning Elements
How to Draw Quadratic Bézier Curves on HTML5 SVGs
Introduction to SVG
Make the Web Fast: Google Web Fonts (Podcast)
12 HTML5 Tricks for Mobile
20 Stunning Examples of Minimal Mobile UI Design
Principles for Building Touch Interactions with David Washington (Webcast)
David Washington – Github Repository of Touch Interaction Code
Deciding what Responsive Breakpoints to use
Utilities
HTML Colour Codes
Google Web Fonts

DEPLOYMENT
Octopus
Docker
Docker Installation on Windows
4 questions to ask before Dockerizing your applications
Docker Blog
10 things you should know about Docker
Azure
How to Deploy a SQL Server database to Azure SQL Database
Azure Table Storage
Azure Table Storage 101 with Jai Haridas
Utilities
SQL Database Migration Wizard v3.15.6, v4.15.6 and v5.15.6
Unique Id Generator
Azure Scripting
Azure Scripting
Bootstrap
BootStrapBay
Scott Helme (CSP)

SECURITY
Microsoft Security Development Lifecycle
Security Best Practices to Protect Intranet Servers
C Is for Cookie H Is for Hacker
Troy’s ultimate list of security links
Krebs on Security
The complete guide to loading a free SSL certificate into an Azure website
Enable HTTPS for an app in Azure App Service
.NET Security Cheat Sheet
Cloud Security with Orin Thomas (RunAs Radio Podcast)
Seven Web Server HTTP Headers that Improve Web Application Security for Free
Kali Linux
Domain Validated SSL vs High Assurance
Find your domain registrar or DNS hosting provider
InterNIC WhoIs Search
Domain Privacy
Information
The Password Project
Utilities
SSL Labs
NetSparker
NetBurp
HTTrack
DBAN
PassiveTotal
HTTPRecon (Server Fingerprint)
Wigle
Shodan
NMap
OWASP Security Shepherd
OWASP Zed Attack Proxy Project (ZAP)
Sigcheck v2.5
ModSecurity for Azure Websites
OWASP
Hashcat
Reference
National Vulnerability Database
Microsoft Certificate Errors FAQ
DefaultPassword.Com
Common Vulnerabilities and Exposures
NorseCorp
OWASP XSS Filter Evasion Cheat Sheet
IIS
Easy IIS SSL Hardening
Services
PhishTank
How to get your SSL for free on a Shared Azure website with CloudFlare
UpGuard
Certificates/Services
LetsEncrypt
StartSSL.Com
HSTS Preload List – Submit
Last Pass
CSP
Understanding CSP, the video tutorial edition

ADMINISTRATION
Powershell
Get information about creating certificates in Powershell
help with_signing
Signing Powershell Scripts
MakeCert
Creating Self Signed Certificates with PowerShell
Finding Out About Powershell
Get-Module -ListAvailable
#list cmdlet members
Get-Command {Cmdlet} | gm
#(formatted list)
Get-Command {Cmdlet} | fl *
Get-Help {Cmdlet} -full
Install-Help
“Option Explicit” Equivalent
Set-PSDebug -Strict
Please note: I have not tested this properly, but apparently it picks up cases where a variable is declared but never assigned; it doesn’t require a variable to be declared, so typos will still cause you problems
Common Parameters
Reference
-Debug (db)
-ErrorAction (ea)
-ErrorVariable (ev)
-OutVariable (ov)
-OutBuffer (ob)
-PipelineVariable (pv)
-Verbose (vb)
-WarningAction (wa)
-WarningVariable (wv)
Risk Mitigation Parameters
-WhatIf (wi)
-Confirm (cf)
List All Commands from the Current Powershell Session
Get-History

CAPTURING OUTPUT
Start-Transcript -Path -Append -Force
Stop-Transcript

FILES AND FOLDERS
#create new folder
$Path = {New Folder}
if(!(Test-Path $Path)){New-Item $Path -ItemType Directory}

Links
Understanding Output

Sql Server
sqlps
sqlcmd

FIREWALL
Enable Rule
New-NetFirewallRule –DisplayName "Allow Ping" –Direction Inbound –Action Allow –Protocol icmpv4 –Enabled True
DISABLE RULE
Set-NetFirewallRule –DisplayName "Allow Ping" –Enabled False
Remove Rule
Remove-NetFirewallRule –DisplayName "Allow Ping"

WINDOWS BACKUP
Windows Server Backup Cmdlets in Windows PowerShell

BLOGS/COLUMNS
System Administration
John Savill Blog
MS WINDOWS
Gabe Aul

MISCELLANEOUS
Special Characters
A Plethora of Powershell Pitfalls
Microsoft Download Center
Asafaweb
The Chartered Institute for IT
Microsoft Connect
Humanitarian Toolbox
Internet Archive
TechTarget
Razor
Microsoft Application Architecture Guide, 2nd Edition
Transaction Processing Performance Council
Sql Server UK User Group
ActOnline
The Six Principles of Resilience to Manage Digital Security

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s