Vol. 23, #36 - September 10, 2018 - Issue #1198

WServerNews Spotlight: Your IT career 

Free Tool for Monitoring Exchange Server Status & Performance 


SolarWinds® Exchange Monitor is a free tool that allows users to monitor Microsoft® Exchange™ Server 2013 and 2016. Get basic information about the server’s metrics, services, and database availability group (DAG) status. Add as many Exchange Servers as you wish. Simply click the “Add Server” button and fill IP address/domain name and credentials.

Download Free Tool

Editor's Corner

I've been doing IT now in some shape or fashion for almost 25 years and have gone through several career changes along the way. And I'm sure many of you who subscribe to our newsletter have experienced similar changes in your careers. So we decided this week to focus on IT pro career trends, options, and tips with the hope that some of the articles we've shared below will help you prepare for the next dramatic change you're going to face, whether it's learning a new platform or technology, assuming additional responsibilities, changing your role in your company's org chart, or working for an entirely new business or organization. I encourage you to read some of these articles, and be sure to send me feedback if you have some tips or observations of your own about succeeding in IT as a career. Email me today at [email protected] with your questions and comments. And if you work in the cybersecurity field please be sure to take a look at the new Ask Our Readers question in this issue of WServerNews and shoot us a response if you have one. Thanks! 


 IT job trends/outlook

2018 IT Career Outlook: One-third of IT pros plan to seek new jobs (SpiceWorks)


5 top-paying IT jobs in 2018 (TechGenix)


Hottest IT jobs and job trends in 2018-19 (TechGenix)


Want to know which IT jobs are on the highway to extinction? Read on (TechGenix)


Data scientist: Yes, you can get 'the sexiest job of the 21st century' (TechGenix)


2018's most crucial job: How to hire a data protection officer (TechGenix)



Succeeding in your IT career

Career Advice for IT Professionals in 2018 (Paul Cunningham)


If not now, when? Taking your IT career to the next level (TechGenix)


7 essential soft skills you must have to excel in your IT career (TechGenix)


CCNA certification: How it can open doors and boost your career (TechGenix)




Finding an IT job

Snag that job: Top career sites for IT professionals (TechGenix)


How to Find a Job in IT With No IT Work Experience (Business News Daily)


A crazy idea: Is psychologist the next hot IT job? (TechGenix)


How to get a job in cybersecurity (TechGenix)


IT job guide: In-demand Blockchain career options for anyone with tech skills (TechGenix)


IT job guide: Want to build a successful AI career? Build up these skills first (TechGenix)




Tip of the Week

Got any IT pro tips you'd like to share with other readers of our newsletter? Email us at [email protected]

Reset Windows Update Agent

If you ever have problems downloading security fixes from Windows Update this script from the TechNet Script Repository may help. It's a shell script that resets the Windows Update Agent on the computer you run it:



Admin Toolbox

Admin Tools We Think You Shouldn't Be Without 

GOT ADMIN TOOLS or other software/hardware you'd like to recommend? Email us at [email protected]

Free tool – Veeam Explorer for Microsoft Active Directory – easy, fast, granular recovery of individual AD objects and entire containers.


Using VMware or Hyper-V? Grab your FOREVER Free copy of Altaro VM Backup!


WBEMTest can be used to test connectivity to remote systems, validate your WMI queries and explore WMI:


SQL Nexus is a tool that helps you identify the root cause of SQL Server performance issues:


Sysinternals Process Monitor now includes a /runtime switch to control headless capture duration, correctly shows picoprocesses, displays details for file system APIs introduced in Windows 10, and includes numerous minor improvements:




Ask Our Readers - Why are brute force crackers still used? (new question)

A reader named Michael has a question for those of our readers who work in the cybersecurity field:

Something that I do not understand, why brute force password crackers are still a thing. All that a website needs to do is institute a small time out between unsuccessful logins. As an example, for the first 5 login attempts, there is a 15 second delay between each attempt. After that, for the next five attempts, a 30 second delay between each attempt. You don't need to lock down the account, just keep increasing the time out delay until one is waiting a couple of minutes or more between each attempt. This gives the true owner of the account time to figure out what was miss typed, support does not need to use time to unlock accounts, and people with nefarious intentions will give up because the wait time just keeps getting longer and longer between single attempts at guessing a password. Maybe I'm naive, but perhaps some one in the security field would know why this time out strategy is not used.

Can anyone respond by answering that? Email us at [email protected]


Factoid - EU may ditch Daylight Savings Time

Last week's factoid and questionwas this:

Fact: SMS seems to be undergoing a revival

Question: Would you say this is true? Why or why not?

This one generated a couple of responses from our readers. For example Antonio, a Systems Administrator in Sydney, Australia said:

I have to agree with this. My office network is not WhatsApp friendly, it means I would not be able to receive WhatsApp messages while in the office, unless I connect to mobile data all the time instead. By the time I am out of the office coverage, I am already behind the wheel and won't be reading text messages until I arrive to my next destination. There were incidents that people sent me WhatsApp messages about the change of arrangement and did not bother to check if I did receive them at the right time at all, and I only found that messages at the time of arrival. Since then, I insisted all changes must be communicated via SMS (or email) on the same day of the activity.

Fascinating, thanks for sharing. And another reader named Don responded more humorously as follows:

I would say an astounding yes. I use it every day sometime hourly for accessing servers and websites with two factor authentication. Until they come up with something better it's a must-have for me. Although I wish I could shut it off when the boss texts "Where are you?"

Yep! When it comes to your work as an IT pro you can run but you can't hide ;-)

Now let's move on to this week's factoid:

Fact: The European Commission is going to ask the EU parliament and member states to ditch the system of twice-yearly changes of Daylight Savings Time.


Question: This one is directed to you readers who are IT pros living in EU countries: Are you looking forward to having to deal with the consequences of such a change? 

Email your answer to [email protected]


Conference calendar

North America

>> Got an IT conference happening in North America that you'd like to promote in our newsletter? Email us at [email protected]

Microsoft Ignite -- September 24-28, 2018 in Orlando, Florida USA


IoT Security Summit -- Oct 15-18 in Dallas, Texas


IT/Dev Connections -- Oct 15-18 in Dallas, Texas USA




>> Got an IT conference happening in North America that you'd like to promote in our newsletter? Email us at [email protected]

Gartner Catalyst Conference -- Sept 26-27 in London, England


VMworld Europe -- Nov 5-8 in Barcelona, Spain


Cybersecurity Leadership Summit -- Nov 12-14 in Berlin, Germany


European SharePoint, Office 365 & Azure Conference -- Nov 26-29 in Copenhagen, Denmark




>> Got an IT conference happening in Australia or Asia that you'd like to promote in our newsletter? Email us at [email protected]

No conferences listed at present.


New on TechGenix.com

Ryuk ransomware proving extremely lucrative for creators

Ryuk is a ransomware that is doing significant damage in a short time-frame. It is understandable considering that it is an offspring of Hermes.


Security factors you cannot ignore when planning your cloud transition

So you're finally planning your cloud transition! Before you depart, make sure you take into account these security factors to ensure a safe trip.


Soleo IP Relay footprint flaw discovered, being patched

Millions of disabled Canadians are at risk due to a severe flaw in the Soleo IP Relay, a technology they rely on for telecommunication.


How Microsoft's ill-fated Project Andromeda may shape future mobile devices

Project Andromeda was Microsoft's next attempt to make noise in the smartphone market. Andromeda is probably dead, but its concepts will live on.


Using Azure Automation Inventory and Change Tracking services

While the complexity of deploying Azure Change Tracking service is removed when using a cloud approach, admins still must understand how the service works.



Fun videos from Flixxy

Real Life Tricks

Texas-based trick shot group 'Dude Perfect' perform amzing and impressive real life tricks with everyday tasks:


Nailing To The Rhythm Of The Band

What do you do, when the wedding celebration has started, but the roof still needs to be nailed?


Acrobatic Gymnastics World Champions 2018

An incredible gold-medla winning performance by the Russian team at the Acrobatic Gymnastics World Championships in Antwerp (Belgium).


Range Rover Climbs 999 Steps To 'The Gate Of Heaven'

A Range Rover hybrid electric car has become the first vehicle to reach the summit of Tianmen Mountain in China, climbing up 999 steps to Heaven's Gate:



 More articles of Interest

Use SQS to trigger functions in Lambda - finally 

The wait is over, as you can now trigger Lambda functions with SQS messages. Follow these steps to get up and running with this new capability.


Evolve IT staff, skill sets for a multi-cloud strategy

To effectively implement and manage a multi-cloud architecture, enterprises first need IT team members who hold a unique mix of technical and business skills.


Docker and Kubernetes monitoring tools for microservices

Learn more about what it takes to manage your containers, and explore a wide range of monitoring tools specifically suited for Docker and Kubernetes.


Jenkins Git integration: GitHub pull request via the Git plugin

This Jenkins Git integration tutorial demonstrate how to create a freestyle build job that performs a Jenkins GitHub pull request. It's an example of the Jenkins Git plug-in in action.




Need help from the IT pro community?

WServerNews goes out each week to more than 500,000 IT pro subscribers worldwide! That's a lot of expertise to tap into. Do you need help with some technical problem or are looking for expert advice on something IT-related? Ask Our Readers by emailing your problems and/or questions to us at [email protected]


Send us your feedback!

>> Got feedback about anything in this issue of WServerNews? Email us at [email protected]


WServerNews - Product of the Week

Free Tool for Monitoring Exchange Server Status & Performance 


SolarWinds® Exchange Monitor is a free tool that allows users to monitor Microsoft® Exchange™ Server 2013 and 2016. Get basic information about the server’s metrics, services, and database availability group (DAG) status. Add as many Exchange Servers as you wish. Simply click the “Add Server” button and fill IP address/domain name and credentials.

Download Free Tool

WServerNews - Editors

Mitch Tulloch is Senior Editor of WServerNews and is a widely recognized expert on Windows administration, deployment and virtualization. Mitch was lead author of the bestselling Windows 7 Resource Kit and has been author or series editor for almost fifty books mostly published by Microsoft Press. Mitch is also a ten-time recipient of Microsoft's Most Valuable Professional (MVP) award for his  outstanding contributions in support of the global IT pro community. Mitch owns and runs an information technology content development business based in Winnipeg, Canada. For more information see www.mtit.com.

Ingrid Tulloch is Associate Editor of WServerNews and was co-author of the Microsoft Encyclopedia of Networking from Microsoft Press. Ingrid is also manages research and marketing for our content development business and has co-developed university-level courses in Information Security Management for a Masters of Business Administration program.