Jumatatu, 16 Mei 2016

Why are there so many religions?

Why are there so many religions?

Sometimes it seems that there are as many religions as there are people on the earth. Even those who belong to the same religion or denomination of a religion have disagreements about what is really important or "true" within those religions. How, then, can a rational person come to the conclusion that any one religion is the "true" religion? If those within the religion can't even agree, perhaps the logical conclusion is that no religion has Truth or that all religions have some Truth, but none is any better than the others. Some skeptics even use the existence of many religions as proof that there is no way to know God or that God really doesn't exist.

That God does exist is clear to everyone because God has made it clear and He has declared it to be so: "For his invisible attributes, namely, his eternal power and divine nature, have been clearly perceived, ever since the creation of the world, in the things that have been made. So they are without excuse" (Romans 1:20). The creation speaks to us in a loud, clear voice of God's existence. "The heavens declare the glory of God, and the sky above proclaims his handiwork" (Psalm 19:1). There is no culture, no language, no group of people who can deny this (Psalm 19:3). But equally clear is the fact that human beings often reject the truth about God (because accepting it means things like submission and obedience) and choose instead to go their own way, seeking God according to their own way of thinking, which is futile because no one finds God with his own reason (1 Corinthians 2:14). Attempting to find God and discern truth without the wisdom and guidance of the Holy Spirit is where we find the basis of the "many religions."

There are two characteristics shared by all cults and false religions. First, they deny the deity of Jesus Christ and His declaration that He is the only way to God (John 14:6). All religions and cults that deny this truth are false, and because the human heart rebels against the exclusivity of Jesus' claim, false religions abound. They may proclaim that Jesus was a "good teacher" or a "moral man," but could a good teacher or a moral man make the claim that He alone is the path to heaven? Either He was lying or He was deluded or He was telling the truth. In any case, He cannot be dismissed as simply a good teacher or man.

The second characteristic shared by all false religions is the idea that we can earn our way to heaven or to acceptance by God through our own efforts. Adherents of false religions have invented a false god who will accept them based on their "good works" or the amount of effort they have expended in trying to follow certain rules or obey certain laws, at least to the best of their ability. They simply cannot bear a holy God who declares that all their "righteousness is as filthy rags" before Him (Isaiah 64:6 KJV) and that the only righteousness they can ever attain is achieved not by works, but by faith in the One who exchanged His perfect righteousness for our sin on the cross (2 Corinthians 5:21). They reject that life-giving message and pursue their own path to a God they can control by their own efforts. The existence of so many religions is a testimony to humanity's rejection of the one true God. Mankind has replaced Him with gods that are more to their liking.

In a sense, all religions do lead to God, but not in the way most people think. All false religions lead to God's judgment. Only one—true, biblical Christianity—leads to eternal life through forgiveness of sin provided by Jesus' sacrifice on the cross for sin (Romans 6:23). All human beings will meet God after death (Hebrews 9:27) and all who trust their own religion will find His judgment harsh indeed. All who have rejected the only means of salvation—the means God has provided out of His love and mercy—will spend an eternity in hell. Only through His salvation through faith in Jesus Christ can anyone approach God with confidence.

Jumatatu, 9 Mei 2016

Configuring inbound mail flow for an Exchange Server 2016

Configuring inbound mail flow for an Exchange Server 2016 environment is reasonably simple, however there are several different parts involved. For your server to receive email from the internet and deliver it to internal recipients there needs to be:
  • An Accepted Domain configured for the organization
  • An email address assigned to the recipient
  • MX records in your public DNS zone
  • SMTP connectivity from external senders to your Exchange server, or a mail route that leads to your Exchange server
The Exchange server will accept SMTP connections using a receive connector. A receive connector that is suitable for incoming email from the internet is pre-configured for you by Exchange setup, so there’s no need for you to configure one yourself. The receive connector is named Default Frontend SERVERNAME.
exchange-2016-receive-connector-01
If you look at the properties of that connector you might notice that “Anonymous Users” is enabled as a permission group. Yes this is the correct configuration for the connector, and no that does not mean it can be abused as an open relay.

CONFIGURING ACCEPTED DOMAINS

Accepted domains define which domain names your Exchange servers will accept email for. When you install a new Exchange 2016 server the DNS name of the Active Directory forest is automatically added as an accepted domain for the Exchange organization. If your Active Directory forest DNS name happens to match the SMTP domain you plan to use for email, then there’s no additional work required here. Similarly, if you’re installing Exchange 2016 into an existing Exchange organization, the accepted domains are likely already configured.
You can view your accepted domains in the Exchange Admin Center. Navigate to mail flowand then choose accepted domains. In my test environment the accepted domain of exchange2016demo.com is already present.
exchange-2016-accepted-domain-01
If you need to add a new accepted domain click the “+” icon, which launches a wizard for the task. Enter a name for the accepted domain, then the domain name itself (I always just configure those two values to be the same).
exchange-2016-accepted-domain-02
Notice the three options for the type of domain. The explanations are very clear, but to summarise:
  • Authoritative – a domain for which your servers host the only recipients. For most scenarios this will be the correct choice.
  • Internal relay – a domain for which your servers host some, but not all of the recipients. A typical use case for this type of accepted domain is a shared SMTP namespace, which is often required when two companies are merging or separating.
  • External relay – a domain for which your server receives email, but hosts none of the recipients.
Add any domain names that you need for your organization, then move on to the email address policies.

CONFIGURING EMAIL ADDRESS POLICIES

The next step is to add email addresses to recipients in your organization. You can do this on a per-recipient basis, by simply opening the properties of the recipient (such as a mailbox), selecting email address, and adding the desired SMTP address.
exchange-2016-email-address-policy-01
Of course this is not a very efficient way to manage multiple recipients, and even though PowerShell is available for automating this step, the more effective method is to use email address policies. An email address policy is configured by default when you install a new Exchange 2016 server, or it will simply use the existing policy if you’re installing into an existing organization. Email address policies are found in the mail flow section of the Exchange Admin Center.
exchange-2016-email-address-policy-02
In my test environment the default email address policy configured by Exchange setup already contains the default accepted domain that was also configured by setup. The default address format is alias@domain, and we can either change that or add more address formats or addresses for different domain names to the policy if required.
exchange-2016-email-address-policy-03
Earlier you may have noticed the check box on the mailbox user that says:
Automatically update email addresses based on the email address policy applied to this recipient.
In effect this means that the email address policy shown above will stamp the SMTP addresses on that recipient (and all the other recipients with that check box enabled), without me having to add them manually.
Review or modify your email address policies and confirm that recipients have the desired SMTP addresses, then move on to DNS records.

CONFIGURING MX RECORDS IN DNS

With the accepted domains and email addresses configured the next thing to look at is theMX records in the public DNS zone. At least one MX record is required for other email systems to be able to locate yours in DNS. The steps to add the MX record to your DNS zone will vary depending on the DNS control panel your provider gives you access to. Basically you will need to configure:
  • An MX record that resolves to an A record, for example mail.exchange2013demo.com
  • The A record that resolves to an IP address
exchange-2016-mx-01
You can test your MX record using PowerShell and the Resolve-DnsName cmdlet.
PS C:\> Resolve-DnsName -Type MX exchange2016demo.com

Name                                     Type   TTL   Section    NameExchange                              Preference
----                                     ----   ---   -------    ------------                              ----------
exchange2016demo.com                     MX     3600  Answer     mail.exchange2016demo.com                 40
Or you can use tools such as MXToolbox.com to test your MX records.

configure mail flow in exchange server 2016

REATING A SEND CONNECTOR FOR EXCHANGE SERVER 2016

Log on to your Exchange Admin Center and navigate to mail flow and then send connectors.
exchange-2016-send-connectors-01
Give the new send connector a meaningful name and set the Type to Internet.
exchange-2016-send-connectors-02
Next you’ll need to decide how the outbound emails will be delivered. There are two choices – by MX record, or via smart host. MX record delivery involves your Exchange server looking up the MX records of the recipient’s domain in DNS, and then connecting directly to their email server via SMTP to deliver the email message. Smart host delivery involves your Exchange server sending the messages to a specified IP address or host name for another system (typically an email security appliance or cloud service) that is then responsible for the further delivery of that email message.
exchange-2016-send-connectors
For this example I’m going to use MX records to deliver the message. My server already has outbound firewall access on TCP port 25, and can resolve MX records on the internet using DNS, so at a basic level this should work fine. There are other considerations such as SPF and IP reputation in the real world that may impact the delivery of email messages from your server.
exchange-2016-send-connectors-03
Set the address space for the send connector. An address space of “*” means “any domain” and is suitable if you have one send connector that is used for all outbound mail flow. You can use this address space option if you later need to configure specific send connectors for different domains.
exchange-2016-send-connectors-04
Finally, set the source server for the send connector. If you have multiple servers that you want to be responsible for outbound mail flow you can add more than one server to this list.
exchange-2016-send-connectors-05
Click Finish to complete the wizard.

TESTING THE SEND CONNECTOR

A simple test to verify that the send connector is working is to send an email from a mailbox on the server to an external address. If the email message is received by the external mailbox you can then check the message headers by copying them from the message and pasting them into the Message Analyzer at ExRCA.com. This will verify for you that the email message took the intended route (via your new server) instead of some other existing outbound route in your organization.
headers
If the email message was not received check the transport queue on the Exchange 2016 server.
[PS] C:\>Get-Queue

Identity                   DeliveryType Status MessageCount Velocity RiskLevel OutboundIPPool NextHopDomain
--------                   ------------ ------ ------------ -------- --------- -------------- -------------
EXSERVER\3                 DnsConnec... Ready  0            0        Normal    0              gmail.com
EXSERVER\Submission        Undefined    Ready  0            0        Normal    0              Submission
If you see message stuck in the queue for the next hop domain that you’re trying to send to you can see more details about them by piping the command to Get-Message.
[PS] C:\>Get-Queue | Get-Message | fl
In particular look for the LastError attribute of the queued messages, which will often contain a status code that will tell you why the messages are not being delivered.
Since outbound mail flow depends on DNS and firewall access you can also check those items. For example, to verify that MX records can be resolved in DNS by the Exchange server use the Resolve-DnsName cmdlet.
[PS] C:\>Resolve-DnsName gmail.com -Type MX
You can also test SMTP connectivity from the server using Telnet. Because the Telnet client is not installed by default on Windows Server you may need to install it first.
[PS] C:\>Install-WindowsFeature Telnet-Client

Success Restart Needed Exit Code      Feature Result
------- -------------- ---------      --------------
True    No             Success        {Telnet Client}
From a CMD prompt try to telnet to one of the MX records you resolved earlier.
C:\>telnet gmail-smtp-in.l.google.com 25

220 mx.google.com ESMTP bv3si49894863pbd.105 - gsmtp
If you do not see the 220 response and banner you may have an outbound SMTP connectivity issue that you need to look into further on your firewall.
Finally, if SMTP connectivity looks fine but the emails are still not being delivered you can enable protocol logging on your send connector and then use the log data to assist your troubleshooting.
[PS] C:\>Set-SendConnector "Internet Email" -ProtocolLoggingLevel Verbose
The protocol logs are stored by default in C:\Program Files\Microsoft\Exchange Server\V15\TransportRoles\Logs\Hub\ProtocolLog\SmtpSend and can be opened and read in a text editor such as Notepad. The protocol log will show the SMTP conversation between your server and the external recipient’s server, so any SMTP errors should appear in the log.
protocol-log

Jumatano, 4 Mei 2016

NTFS Permissions

Share and NTFS Permissions on a File Server

Applies To: Windows 7, Windows Server 2008 R2
Access to a folder on a file server can be determined through two sets of permission entries: the share permissions set on a folder and the NTFS permissions set on the folder (which can also be set on files). Share permissions are often used for managing computers with FAT32 file systems, or other computers that do not use the NTFS file system.
Share permissions and NTFS permissions are independent in the sense that neither changes the other. The final access permissions on a shared folder are determined by taking into consideration both the share permission and the NTFS permission entries. The more restrictive permissions are then applied.
The following table suggests equivalent permissions that an administrator can grant to the Users group for certain shared folder types. Another approach is to set share permissions to Full Control for the Everyone group and to rely entirely on NTFS permissions to restrict access.

 

Folder type Share permissions NTFS permissions
Public folder. A folder that can be accessed by everyone.Grant Change permission to the Users group.Grant Modify permission to the Users group.
Drop folder. A folder where users can drop confidential reports or homework assignments that only the group manager or instructor can read.Grant Change permission to the Users group.
Grant Full Control permission to the group manager.
Grant Write permission for the Users group that is applied to This Folder only. (This is an option available on the Advanced page.)
If each user needs to have certain permissions to the files that he or she dropped, you can create a permission entry for the Creator Owner well-known security identifier (SID) and apply it to Subfolder and files only. For example, you can grant the Read and Write permission to the Creator Owner SID on the drop folder and apply it to all subfolders and files. This grants the user who dropped or created the file (the Creator Owner) the ability to read and write to the file. The Creator Owner can then access the file through the Run command by using \\ServerName\DropFolder\FileName.
Grant Full Control permission to the group manager.
Application folder. A folder containing applications that can be run over the network.Grant Read permission to the Users group.Grant Read, Read & Execute, and List Folder Contents permissions to the Users group.
Home folder. An individual folder for each user. Only the user has access to the folder.Grant Full Control permission to each user on his or her respective folder.Grant Full Control permission to each user on his or her respective folder.
Additional considerations
  • Granting a user Full Control NTFS permission on a folder enables that user to take ownership of the folder unless the user is restricted in some other way. Be cautious in granting Full Control.
  • If you want to manage folder access by using NTFS permissions exclusively, set share permissions to Full Control for the Everyone group.
  • NTFS permissions affect access both locally and remotely. NTFS permissions apply regardless of protocol. Share permissions, by contrast, apply only to network shares. Share permissions do not restrict access to any local user, or to any terminal server user, of the computer on which you have set share permissions. Thus, share permissions do not provide privacy between users on a computer used by several users, nor on a terminal server accessed by several users.
  • By default, the Everyone group does not include the Anonymous group, so permissions applied to the Everyone group do not affect the Anonymous group.

Jumatano, 27 Aprili 2016

List of rich people in the World


10. Bernard Arnault

  • Net worth : $29 Billion
  • Source : LVMH
Bernard Jean Etienne Arnault is a French businessman and art collector. He had a net worth of $41 USD in 2012 and was fourth richest person in the world. He was born on 5 march 1949 in Roubaix. He joined his father’s company LVMH in 1976 and became CEO in 1977.


9. Liliane Bettencourt

  • Net worth : $30 Billion
  • Source : L’Oreal
Liliane Henriette Charlotte Schueller is a French philanthropist, socialist and businesswomen. In March she was listed in Top wealthiest Women in the World. She is Founder of L’Oreal (one of the largest cosmetic and beauty companies). She is 90.


8. Li Ka-Shing

  • Net worth : $31 Billion
  • Source : Diversified
Li Ka-Shing is the richest person in Asia. He is a Hong-Kong businessman, investor and philanthropist and dropout from school. Born on 13 June 1928. He is currently Chairman ofCheung Kong HoldingsHutchison Whampoa and Li Ka Shing Foundation.

7. Charles Koch

  • Net worth : $34 Billion
  • Source : Diversified
Charles de Ganahl Koch is an American businessman and philanthropist. He was born on 1st November 1935. He is chairman and CEO of Koch industry and one of the top 40 powerful people in the world.


6. David Koc

  • Net worth : $34.5Billion
  • Source : Diversified
David Hamilton Koch is an American businessman , chemical engineer and philanthropist. He was born on 3rd May 1940. He is currently executive vice president of Koch industry and board member of Aspen InstituteCato InstituteReason Foundation.


5. Larry Ellison


  • Net worth : $43 Billion
  • Source : Oracle
Larry Ellison is a self made man and also a college dropout. He is an American businessman , Cofounder and CEO of Oracle corporation. Born on 17 August 1944. In 1970 his company was named relation software inc. And later it is renamed as Oracle.


4. Warren Buffett


  • Net worth : $53 Billion
  • Source : Berkshire Hathaway
Warren Buffett is an American businessman , investor and philanthropist. He was born on 30 August 1930. He is considered as a most successful investor of 20th centurary. He is currently chairman and CEO of Berkshire Hathaway (Self made).


3. Amancio Ortega


  • Net worth : $57 Billion
  • Source : Zara
Amancio Ortega is a Spanish fashion executive. Born on 28 march 1936. He is a founding chairman and CEO of  Inditex fashion group also known as Zara. (Self made). He moves to the world’s top 3 richest person first time.

2. Bill Gates

  • Net worth : $67 Billion
  • Source : Microsoft
Bill Gates is a self made person. His full name is William Henry Bill Gates III and born on 28 October 1955. He is an American businessman , investor, programmer, inventor and philanthropist. He is CEO of the world’s largest software company Microsoft which he cofounded with his friend Paul Allen. He is also Co-Chairman of the Bill & Melinda Gates Foundation, CEO of Cascade Investment Chairman of Corbis and board of members of Berkshire Hathaway. He was the richest person in the world from 1999-2010.
Carlos Slim
  • Net worth : $73 Billion
  • Source : Telcom
Carlos Slim is a Mexican businessman , investor and philanthropist. He is the Richest Person In World since 2010. He is also one of the top 10 most powerful people in the world. Currently he is Chairman and CEO of TelmexAmerica MovilSamsung Mexico and Grupo Carso.
Total Sum up of these Top 10 wealthiest personality is $454.5 Billion.