Deleting directories/files with paths too long for Windows delete

Windows Source Path Too Long

In Windows API the maximum length for a path is defined by MAX_PATH  which is 260 characters. A local path is structured using drive letter, colon, backslash and folder names separated by backslashes, followed by a null terminator….

Read More »

Using .htaccess to redirect a .co.uk domain to .com for all pages

No Picture

Customers often register .co.uk , .com  and .uk  domains to protect their brand. Domains can be left dormant or configured to redirect to the active site. A redirect is useful if visitors try to guess your top level domain…

Read More »

Unable to enter password at the disk decryption splash screen (Surface Pro)

Ubuntu Please Unlock Disk

Ubuntu 18.04 LTS is a good choice for Linux on the Surface Pro 3 if you decide to replace Windows. Without disk encryption the installation process took about 20 minutes without any patches. With disk encryption I was…

Read More »

How to convert a virtual hard disk file (VHDX to VHD)

Hard Disk

If you have the Hyper-V role installed you can convert a virtual hard disk file using PowerShell or the GUI. Why would you do this? You are moving to a new server which requires the old format You…

Read More »

Using a U2F Yubikey with Linux Mint 19 Tara

YubiKey U2F Security Key

Universal 2nd Factor (U2F) is an open authentication standard that strengthens and simplifies two factor authentication (2FA) using USB or NFC devices. It enables internet users to securely access any number of online services using a single security…

Read More »

How to copy data over SSH with secure copy (scp)

Linux scp command

scp  or  secure copy is a command used for sending files over SSH. You can copy files between computers, say, from your local PC to a server or vice versa. It’s a very secure method of copying files…

Read More »

How do I copy file names starting with a dot in Linux?

No Picture

UNIX / Linux file systems do not have a hidden file attribute. A file or folder is typically hidden by using a period as the first character in the file name i.e.  .hiddenfile . In order to list all files…

Read More »

Dell PowerEdge R210 II hardware RAID monitoring (Dell PERC H200 RAID controller)

No Picture

Moore’s Law marches on relentlessly but the there is plenty of life left in the old PowerEdge R210 / R210 Gen II servers. The cost of cloud versus bare metal still makes physical machines a no-brainer if you’re comfortable…

Read More »

How to delete files and directories using the Linux command line

No Picture

The rm  (remove) command is used to delete files and directories. Deleting files is a fundamental operation for a sysadmin. Be careful with the command because it does not prompt for a confirmation unless the -i  option is…

Read More »

How to install Samba server and configure a network share

No Picture

Samba is a very useful tool. It provides file and print services between computers running Microsoft Windows and computers running Linux. It can integrate with a Windows domain too.  Samba is a re-implementation of the SMB / CIFS…

Read More »