Home

Hey everyone! Thanks for finding my Blog! You, must not have anything to do! So, let’s talk about something that really gets my heart racing... technical Blogs! I mean, who doesn’t love a good read about Active Directory, coding, and the occasional rant about Security? You ever notice that technical blogs are like the IKEA manuals of the internet? They promise you a beautiful piece of furniture, but they give you a thousand confusing steps in a language that seems to be a mix of English and JSON. You’re sitting there, reading about ‘Linux’ and thinking, ‘Is this an Operating System’, or am I trying to understand my last relationship?’ And what's with the jargon? You’re reading along and suddenly you hit a phrase like ‘Chown.’ Hope he doesn’t want me to go down into the sewer. You know, I once tried to follow a technical blog tutorial on building a website. I thought I’d come out of it a digital Picasso. Instead, I ended up with a broken link and at the Museum of Bad Art. My website looked less like a portfolio and more like a crime scene. And don’t get me started on the comments section! You have these tech-savvy geniuses arguing over who has the better programming language like it’s the World Cup of Coding. ‘C++ is better!’ ‘No, Python for the win!’ I’m just sitting here like, ‘Can I just get a blog about cat videos instead?’ But here’s the thing – technical blogs are essential! They give us the knowledge to navigate a world dominated by technology. They teach us to troubleshoot when our Wi-Fi goes down. Seriously, if you can’t fix your Wi-Fi, are you even living in 2023? So, let’s raise a glass to the technical bloggers out there! May your posts be error-free, your codes be clean, and your metaphors make sense. And if you ever need a break from coding, just remember: there’s always a cat video waiting to make you feel better! Thanks for being here! I’m off to troubleshoot my own life!

 About

Luis' Technical Blog

Hello everyone, first of all, thank you for this opportunity to introduce myself to you. My name is Luis, I am a Active Directory engineer with over 20 years of experience in various technologies. I have worked in teaching people the CCNA, A+, Net+ and Microsoft Server technologies. Of course, I have worked in various aspects of Windows technologies, Security, Active Directory Administration and maintenance, Azure Administration, Windows Server Administration, Networking, Scripting, Linux Administration, Macintosh Systems Administration and Project Management. I have wanted to start writing about some of the issues and experiences I have encountered during my times working and post some of the documentation I have written.

Hopefully, someone might some of this information useful.

Blogs

AI is like a genie in a lamp… but instead of rubbing the lamp, you have to type a perfectly worded essay called a prompt. Miss a detail, and instead of giving you a masterpiece, it hands you a three-paragraph explanation of why it can’t draw a cat wearing a spacesuit riding a unicycle through Times Square.

Hey everyone! Great to be here! So, let’s talk about the Windows operating system. Ah, good ol’ Windows. The only OS that makes you question your life choices every time you boot up your computer. Seriously, it’s like jumping into a time machine and ending up in a dysfunctional tech family reunion.

Security compliance is like playing a board game where the rules keep multiplying—PCI says roll a six, ISO says only with encryption, and HIPAA wants you to sanitize the dice first. The guidelines aren’t optional—they’re the guardrails that keep you from tumbling into a costly audit pit

I mean, Linux is like the hipster of operating systems, right? You know, the kind that got there first but insists it was *always* better because it was “open-source.” Yeah, open-source! It’s like they’re saying, “Hey, I’m not just free; I’m also a little confusing on purpose!”

Getting hacked as a business is like inviting a vampire in—once they cross the threshold, they don’t just suck your data dry, they throw a party with your clients’ credit cards, change your CEO’s LinkedIn title to ‘Chief of Poor Security Decisions,’ and leave you holding the lawsuit confetti.

But in all seriousness, folks, computer security is important. So make sure to protect yourself. Use strong passwords, stay aware, and if you see a suspicious email, remember: the only thing you should open are snacks! Stay safe out there, and remember—laughter is the best antivirus!

DevOps is like trying to get developers and operations to share a kitchen—devs want to cook with experimental spices, ops want the smoke alarms turned off, and somehow the recipe ends up in production half-baked at 2 a.m.

Security and IAM automation is like teaching a robot to guard the castle—half the time it locks out your own knights, the other half it politely waves attackers through because they spelled their password with a capital letter.

Designing infrastructure for both on-prem and cloud is like building a bridge that connects your basement to outer space—you need old cables, new clouds, and a plan that won’t collapse when someone plugs in a coffee maker.



Azure: the cloud platform that’s always got your back… unless it’s doing “scheduled maintenance” at 3AM. Need to scale your app? No problem. Want to set up a VM? Easy. Accidentally spin up 37 VMs and forget to turn them off?  

But hey, it’s Microsoft—so if you’ve ever wanted your cloud infrastructure to feel like Excel on a rocket ship, Azure’s your ride.



Monitoring your infrastructure for security is like babysitting a room full of toddlers—turn your back for two minutes, and someone’s clicking suspicious links, sharing cookies, or drawing on the firewall with crayons.

Let’s talk about project management. Yeah, that magical land where optimism goes to die.
You ever notice that project managers have the incredible ability to turn a simple email into a full-blown meeting? “We need to send an email.” “Okay, let’s draft a checklist, set a calendar invite, and hold a meeting to discuss the email.”

Information

7 PAM Best Practices

Are you using the cloud or thinking about transitioning? Undoubtedly, multi-cloud and hybrid environments offer numerous benefits for organizations. However, the cloud's flexibility, scalability, and efficiency come with significant risk — an expanded attack surface. Read More...

Securing Domain Controllers Against Attack

Domain controllers provide the physical storage for the Active Directory Domain Services (AD DS) database, in addition to providing the services and data that allow enterprises to effectively manage their servers, workstations, users, and applications. Read More...

Code snippets and how to use them

Code snippets are small blocks of reusable code that you can add to a code file. Snippets usually contain often-used code blocks such as Try...Finally or If...Else blocks. You can also use code snippets to add entire classes or methods. Read More...

The Basics of Project Management

The managers you pick to run new projects have a lot of responsibility. The basics of project management are to roll out new products or processes on time, under budget and within the framework you’ve set for the job. Read More...

 

News

HumanX is a premier global AI conference taking place April 6–9, 2026, at Moscone Center South in San Francisco. This high-profile event brings together industry leaders, researchers, investors, and innovators to discuss the latest advancements in artificial intelligence, digital transformation, and human-centered design. Learn More

CES, the Consumer Electronics Show, is where the world’s wildest gadgets and most over-the-top tech demos descend on Las Vegas every January—think robot bartenders, self-driving fridges, and enough smart toothbrushes to make a dentist blush. It’s the annual circus of innovation, where companies try to outdo each other with flashy keynotes, questionable product launches, and the occasional keynote disaster (remember Bill Gates’ infamous Xbox 360 crash?). If you want to see the future of tech—whether it’s actually useful or just a glorified paperweight—CES is the place to be, complete with free swag, endless coffee, and the occasional robot stripper. Learn More

Black Hat USA: the one cybersecurity conference where a laptop is never just a laptop—it’s either a badge of honor, a potential weapon, or a ticking privacy time bomb. Every August, thousands of hackers, CISOs, and security researchers descend on Las Vegas to endure extreme Wi-Fi paranoia, stare suspiciously at communal USB ports, and hunt for vulnerabilities with the fervor of bargain shoppers on Black Friday. The only conference swag more popular than stickers is a personal Faraday cage—and if your badge doesn’t get pwned by breakfast, you deserve a medal (but don’t trust anyone enough to touch it). Learn More

NVIDIA GTX graphics cards: for when you absolutely, positively need to melt your power supply, cook your breakfast on your case, and get more FPS than your monitor can physically display. Boasting names that sound like sci-fi starships (GTX 1080 Ti, anyone?), these cards transform humble PCs into RGB-lit rocket ships, while inspiring wallet-induced sadness worldwide. Whether you’re gaming, mining coins, or just showing off at a LAN party, GTX cards are the only hardware that can make your electricity bill as extreme as your frame rate. Learn More

Contact Us