Search for files greater than 1GB
size:>1GB
What's next in Tech
Search for files greater than 1GB
size:>1GB
You receive the error message in SQL Server Management Studio
Database 'msdb' cannot be opened. It has been marked SUSPECT by recovery.
1. Stop SQL Server service.
2. Rename or remove old files named MSDBData.mdf, MSDBLog.ldf in directory [SQL Server Instance name]\MSSQL\DATA (exsample C:\Program Files\Microsoft SQL Server\MSSQL10_50.SQLEXPRESS2008\MSSQL\DATA).
3. Copy files named MSDBData.mdf, MSDBLog.ldf in [SQL Server Instance name]\MSSQL\Template Data\ (exsample C:\Program Files\Microsoft SQL Server\MSSQL10_50.SQLEXPRESS2008\MSSQL\Template Data).
4. Restart SQL Server Service.
Please check the blog below which describes how to repair it.
http://www.sqlservercurry.com/2011/03/repair-sql-server-database-marked-as.html
And the similar threads below:
Top 20 Free Disk Tools for SysAdmins
https://techtalk.gfi.com/top-20-free-disk-tools-for-sysadmins/
After installing WordPress on IIS you get prompted for ftp server and credentials when trying to upgrade WordPress. To fix this error just do the following steps.
In IIS manager
Just give read/write permission to “Authenticated users”
Then on Sites,
WordPress should update without prompting for ftp credentials.
You may have to enter this into the wp-config.php as well to work properly.
define('FS_METHOD', 'direct');
My test Exchange Server with Exchange 2013 on Windows Server 2012 R2, I was able to achieve an A rating from SSLLabs by disabling SSL 3.0, removing RC4 ciphers, and enabling AEAD encryption . This is nearly as good as one can achieve at this time.
Disable support for SSL 3.0 on the server:
Remove RC4 Ciphers:
Ciphers available on Windows Server 2012 R2:
The following cipher suites supports AEAD encryption on Windows Server 2012 R2:
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
To enable the required encryption, download IISCrypto from Nartac software. I had to enable the following Ciphers:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Then move them to the top of the Ciphers list.
SSLLabs message: This server supports weak Diffie-Hellman (DH) key exchange parameters. Grade capped to B.
To fix it, you can increase the DHE key size to 2048 adding the registry key below:
https://docs.microsoft.com/en-us/security-updates/securityadvisories/2016/3174644
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\KeyExchangeAlgorithms\Diffie-Hellman] "ServerMinKeyBitLength"=dword:00000800
Using this setting you will have a AEAD cipher that is not classified as “weak” and SSLLabs will give you an A Grade.