Skip to main content

Posts

Cars with computers.

Since the days of cars that were mechanical there were little tricks you could do to achieve some goal with tuning your car. I recently got a pre-owned mazda 3 sport and while you're always told it works amazing having never seen it - a few months of driving will certainly ensure that a few problems rear their heads. My particular issue was with the acceleration of the car. With the advent of Electronic Control Units (ECU) tuning has become pretty easy and also ensures the car creates a profile of what is needed for its particular environment. Mine had come without being reset from its previous owner and I found it to be quite sluggish when accelerating, in a country where the traffic is neck and neck that can be a good thing but when you need to move in the same traffic it can be a hazard to others. So I did some research and found that you could simply reset the ECU and ensure that the car creates a new profile for its various metrics. For the Mazda  I needed to unplug the b
Recent posts

Exchange 2013 - Two OWA sites one with AD restrictions. Forward and Backward facing.

I had to take on a project that would restrict access to OWA from certain users that would access the external address of Exchange. There were many ways on how to do this using an application firewall such as MS TMG or FortiGate FortiGuard and even ADFS, these solutions would certainly work once configured properly but I had to make these changes with as little of an impact as possible to the current architecture and there were certain licence restrictions in place that would prevent the use of a third party tool. Microsoft had a great blog post on their site by the Exchange Team  on how to create the secondary site. In this post they highlighted that a particular security group needed to be added to the OWA directory to give IIS the proper permissions to allow it to access the folder. And that sparked an idea that went back to my MCITP readings. Deny permissions take precedence over allows.   If this was so then if we were to create a security group and add all the users we w