Multizone | All our technotes
If we've published it, you can find it here.
Ammazon Coins are no longer available for purchase as of February 20, 2025. You'll need to use any unused Amazon Coins in your account before August 20, 2025. After August 20, 2025, Coins can no longer be used in the Amazon Appstore, and any Coins you have purchased that remain in your account after August 20, 2025 will be refunded.
TL:DR – The deprecation or sunset of the Amazon Coins product means you need to act now to use any you may have accumulated.
- Details
Read more: Grab some useful apps with Amazon Coins before they expire!
While initially appearing to be a minor configuration change, integrating Microsoft Remote Desktop Dervices (RDS) licensing via AWS Licence Manager with Windows Server in an Amazon EC2 environment with AWS Managed AD necessarily requires a quite complex Windows Server and AWS setup.
It demands precise configuration across both AWS services and Windows Server environments. A pre-requisite for attemting this is a deep understanding of the points at which these services from different vendors intersect. Proper configuration of AWS License Manager and adjustments in EC2 at the instance level and within AWS Managed Active Directory are critical to success. The end result is a robust and properly licensed installation of Remote Desktop Services for your Windows Servers which supports Microsoft Remote Desktop access, conveniently billed through AWS billing.
TL:DR – This is, I would say, moderately to very difficult. You'll need all the credentials for Windows and AWS. And patience. It took me quite a while, several days to make it work, and to document and test it for a client. Note: All the screenshots here are from my own AWS environment and the values are dummy values.
- Details
Read more: Microsoft RDS via AWS License Manager in EC2 with Managed AD
Digital security is so important today to your digital well-being today. Transitioning from one two-factor authentication (2FA) application is a royal pain in the ass, but necessary for Microsoft Authentictor users. This article explores why you need to switch from Microsoft Authenticator to Authy, an alternative that offers synchronisation across multiple devices added functionalities and a roadmap not a sunset. We will address the steps for a smooth transition, and discuss both the benefits and potential concerns associated with using Authy.
TL:DR – The switch from Microsoft Authenticator to Authy is straightforward, involving the temporary disabling of 2FA on your accounts, re-enabling it with Authy, and understanding how to manage device synchronisation. You need to move because Microsoft Authenticator is going away. Act now, before its too late and you are in a world of pain. "After August 2025, your saved passwords will no longer be accessible in Authenticator and any generated passwords not saved will be deleted" - Microsoft web site.
- Details
Read more: Why You Should Switch from MS Authenticator to Authy Today
FileCloud is powerful software, delivering a secure, enterprise-grade self-hosted file sharing and content collaboration platform that can be integrated with Amazon Web Services (AWS).
This article outlines the deployment of FileCloud using AWS infrastructure, specifically withn Amazon EC2 and using Amazon S3 for stroage. It discusses typical deployment scenarios, the necessary prerequisites, architecture illustrations, planning recommendations, security protocols, cost analysis, and operational procedures. To successfully implement FileCloud, understanding its architecture and how it interacts with AWS services is essential.
The community edition provides an annual licence for 5 full accounts, with 10 external accounts. Community edition can be self-hosted on your Windows or Linux servers or in your own account in a supported Infrastructure as a Service (IaaS) provider. For our review we installed it in Amazon EC2, using Amazon S3 for storage, using the FileCloud provided Amazon Machine Image (AMI) which is avaliable from AWS Marketplace.
The enterprise edition is the same software with a licence key unlocking more functionality. It has a variety of subscription tiers and hosting options and provides more advanced governance, Single Sign-On, Support for Duo or text based authentication and third party integration support for example for SalesForce.
You need to have a good knowledge of AWS, Linux, virtual machines and web applications to get FileCloud running and need to carefully consider, document and work through the prerequisites, security measures, operational guidance, updates, security and backup procedures.
TL:DR: FileCloud runs in AWS using encrypted Amazon S3. FileCloud Community Edition is free to use with some limitations, but a thorough understanding of AWS, Linux, and the potential cost is vital for a successful implementation.
- Details
Amazon has announced that it will discontinue its Appstore for Android devices effective August 20, 2025. This article investigates the implications of this decision on users, the broader market for digital applications, and offers guidance on transitioning away from the platform. As part of this transition, Amazon’s complementary service, the Amazon Coins program, will also cease to exist. For users seeking further information on this closing phase, the official announcement from Amazon provides more insight.
TL:DR – The Amazon Appstore will be discontinued on August 20, 2025, alongside the Amazon Coins program. Developers and users alike should prepare for this change by transitioning to alternative app stores and managing existing subscriptions and digital currency before the deadline. It is advisable to act promptly to ensure minimal disruption to app usage and purchases.
- Details
AWS Certificate Manager (ACM) is a service provided by Amazon Web Services (AWS) that enables users to efficiently provision and manage SSL/TLS certificates for specific AWS services and applications. The primary goal of ACM is to streamline the certificate acquisition process within AWS, ensuring a secure and seamless experience as organisations interact with web applications and services. This article will examine the key features and benefits of AWS Certificate Manager, integration with other AWS services, automated certificate renewal, and the process of establishing and managing certificates in the cloud environment. For a deeper understanding of ACM, consider reviewing the official documentation on AWS Certificate Manager.
TL: DR – AWS Certificate Manager manages SSL/TLS certificates, the automation of certificate renewals and is supported by the AWS services: Elastic Load Balancing, Amazon CloudFront, Amazon Cognito, AWS Elastic Beanstalk, AWS App Runner, Amazon API Gateway, AWS Nitro Enclaves, AWS CloudFormation, AWS Amplify, Amazon OpenSearch Service and AWS Network Firewall. Certificates are free, of you can import certificates obtained ouside of AWS. It makes sense to use AWS Certificate Manager if you are using these AWS services, otherwise Let's Encrypt would be a better choice, because you cannot install an ACM certificate directly on an AWS based website or application.
- Details
Read more: Automate SSL/TLS Renewals with AWS Certificate Manager
The proliferation of email communication over the past few decades has been an enabler for all kinds of communications for all of use but the technology behind email was designed for academics to talk to each other, not for everyone in the world to talk to anyone. In that simpler time nefarious use of email wasn't really considered and famously one of the authors of the email sending program said 'I just wanted a way to get my email'.
Nowadays phishing, where attackers employ cunning tactics to deceive users into disclosing sensitive information is a real problem for everyone. We can't just get rid of email as it is perhaps the most successful killer app category other than the web browser. This article explores the red flags associated with phishing emails, outlining key indicators that can help identify these malicious communications. We will examine the characteristics of such emails and provide actionable advice to bolster online security.
TL:DR – The primary objective in recognising phishing attempts is to remain vigilant against specific signs, including suspicious email addresses, inconsistent branding, and unusual requests for sensitive information. By familiarising oneself with these markers, one can significantly mitigate the risk of falling victim to such attacks. It is imperative to practice caution when engaging with unsolicited emails and to remain aware of the evolving tactics utilised by cybercriminals.
- Details
Read more: Top red flags in phishing emails that you should never ignore
- How to self verify using a domain with Bluesky
- How to get Google Developer Badges on your developer profile
- Buyers Guide: Google Pixel 7a, 8a, 9a - best value
- Updates to Standard Google Developer Program Membership
- Last Intel based Mac mini reaches Apple vintage support stage
- The absurd Complexity of Roaming Profiles v OneDrive Folders
- Step-by-Step AWS account setup with free tier access
- What is the best deal on Refurbished iPad Pros in the UK
- AWS Certified Solutions Architect SAP-C02 exam Key Facts
- Pass SAP-C02 - AWS Certified Solutions Architect
- Quality premium Apple photo books from Mimeo/Motif
- Gen Z may prefer Google Workspace to Microsoft 365