Access SupportAssist web interface from another computer

If you are running SupportAssist Enterprise, the remote port is 5700 over https and the local port is 9099 over http


Cara hapus disconnected mailboxes di Server Exchange 2010

List mailbox databases guid
> Get-MailboxDatabase |ft Name, Guid

List disconnected mailboxes in a specific database
> Get-MailboxStatistics -Database | Where-Object {$_.DisconnectDate -Notlike $NULL} | FL DisplayName, DisconnectDate, MailboxGuid

Delete a specific disconnected mailbox
> Remove-Mailbox -Database “” -StoreMailboxIdentity -confirm:$false

Delete all disconnected mailboxes in a specific database
> $users = Get-MailboxStatistics -Database “” | where-object { $_.DisconnectDate -ne $null } | Select DisplayName,MailboxGuid,Database

> $users | ForEach { Remove-Mailbox -Database $_.Database -StoreMailboxIdentity $_.MailboxGuid -confirm:$false }

Let’s Encrypt SSL Certificate di Webserver NGINX (Ubuntu & Debian)

apt-get -y install git
cd /usr/local/
git clone
git clone
cd /usr/local/certbot/
./certbot-auto certonly –agree-tos –rsa-key-size 4096 –renew-by-default -m –webroot -w /var/www/ -d –renew-by-default


– Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/ Your cert
will expire on 2016-10-20. To obtain a new or tweaked version of
this certificate in the future, simply run certbot-auto again. To
non-interactively renew *all* of your certificates, run
“certbot-auto renew”
– If you lose your account credentials, you can recover through
e-mails sent to
– Your account credentials have been saved in your Certbot
configuration directory at /etc/letsencrypt. You should make a
secure backup of this folder now. This configuration directory will
also contain certificates and private keys obtained by Certbot so
making regular backups of this folder is ideal.
– If you like Certbot, please consider supporting our work by:

Donating to ISRG / Let’s Encrypt:
Donating to EFF:


Konfigurasi di Webserver NGINX

vi /etc/nginx/sites-available/default

ssl on;
ssl_certificate /etc/letsencrypt/live/;
ssl_certificate_key /etc/letsencrypt/live/;
ssl_session_timeout 5m;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_prefer_server_ciphers on;
ssl_dhparam /etc/nginx/ssl/dhparams.pem;

mkdir /etc/nginx/ssl
cd /etc/nginx/ssl
openssl dhparam -out dhparams.pem 2048
/etc/init.d/nginx restart

Kemudian testing SSL di

FDSocket closed dari Bacula Server ke Bacula Client

Gue bingung bacula-client config normal dan gak ada error, ditelnet ke localhost port lokal juga masuk tapi kok error koneksi ke bacula-client dari server bacula.

Dari client ke localhost

# telnet localhost 9102
Trying ::1…
Connected to localhost.
Escape character is ‘^]’.
telnet> quit
Connection closed.

Dari server ke client

# telnet 9102
telnet: Unable to connect to remote host: Connection refused


Setelah diselidiki ternyata LISTENnya cuma bukan

root@hris:/etc/bacula# netstat -tulpn | grep LISTEN | grep 9102
tcp 0 0* LISTEN 20526/bacula-fd

Akhirnya biar jadi (All IP address), kasih komentar aja bagian FDAddress nya

FileDaemon { # this is me
Name = hris-fd
FDport = 9102 # where we listen for the director
WorkingDirectory = /var/lib/bacula
Pid Directory = /var/run/bacula
Maximum Concurrent Jobs = 20
# FDAddress =