﻿<?xml version="1.0" encoding="utf-8"?><!--RSS Genrated: Tue, 14 Apr 2026 04:35:34 GMT--><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:ev="http://purl.org/rss/1.0/modules/event/"><channel><title>Taur Productions</title><link>https://www.taurproductions.com:443/blog/rss/1443</link><atom:link href="https://www.taurproductions.com:443/blog/rss/1443" rel="self" type="application/rss+xml" /><description>RSS document</description><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Azure App Service backup failure]]></title><link>https://www.taurproductions.com/blog/azure-app-service-backup-failure</link><description><![CDATA[ Scenario 

 It had been one of those days when nothing had gone right so it should have been no surprise that a routine module upgrade on a DNN installation running as an Azure App Service would ...]]></description><pubDate>Thu, 04 Jun 2020 21:06:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/azure-app-service-backup-failure</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-3602]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Upgrading a DNN Installation]]></title><link>https://www.taurproductions.com/blog/upgrading-a-dnn-installation</link><description><![CDATA[ Scenario 

 A customer needed their DNN installation upgraded. As the DNN installation was running as an Azure App Service, I thought it might be interesting to see if it could still be done “old ...]]></description><pubDate>Thu, 02 May 2019 19:20:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/upgrading-a-dnn-installation</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2889]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[ADFS Certificate Maintenance Part 2]]></title><link>https://www.taurproductions.com/blog/adfs-certificate-maintenance-part-2</link><description><![CDATA[ The solution 

 Some research indicated that the process of exporting the certificate to a pfx file and reimporting the file would do the trick but that clearly hadn’t worked in this case. ...]]></description><pubDate>Mon, 04 Jun 2018 19:23:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/adfs-certificate-maintenance-part-2</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2890]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[ADFS Certificate Maintenance Part 1]]></title><link>https://www.taurproductions.com/blog/adfs-certificate-maintenance-part-1</link><description><![CDATA[ Scenario 

 It seemed like a straightforward job – update the service communications certificate for an ADFS farm with web applications proxies in front of it but, somewhere along the line ...]]></description><pubDate>Tue, 29 May 2018 20:32:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/adfs-certificate-maintenance-part-1</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2928]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Setting up DKIM and DMARC records Part 3]]></title><link>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-3</link><description><![CDATA[ DMARC   Adding the DMARC record    DMARC  (Domain-based Message Authentication, Reporting & Conformance) records are rather more interesting as they are additional to SPF and DKIM – as in you need ...]]></description><pubDate>Thu, 26 Apr 2018 19:24:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-3</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2891]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Setting up DKIM and DMARC records Part 2]]></title><link>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-2</link><description><![CDATA[ 4. Setting up DKIM and DMARC records Part 2 In the second part, the DKIM records for the solution are deployed 

 Part 2 

 The Solution 

 It was decided therefore to separate the corporate – ...]]></description><pubDate>Mon, 16 Apr 2018 19:27:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-2</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2892]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Setting up DKIM and DMARC records Part 1]]></title><link>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-1</link><description><![CDATA[ The scenario 

 Another interesting one where the solution ended up being more complex than initially thought, it was determined, after a successful migration from an inhouse Exchange based email ...]]></description><pubDate>Sun, 15 Apr 2018 19:28:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-1</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2893]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Bad Day in Kerberos Land]]></title><link>https://www.taurproductions.com/blog/bad-day-in-kerberos-land</link><description><![CDATA[ The Symptoms 

 At a remote site, users began losing their connections to file shares and some internal web sites. A few users were seemingly unaffected however. The remote site had a single ...]]></description><pubDate>Thu, 23 Nov 2017 20:29:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/bad-day-in-kerberos-land</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2894]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Data Security and The Small Business Part 3]]></title><link>https://www.taurproductions.com/blog/data-security-and-the-small-business-part-3</link><description><![CDATA[ Now that you have determined where all that personal data is in the myriad of file shares and databases that you use, what do you do next? You will remember that, way back in the first part, I ...]]></description><pubDate>Mon, 20 Nov 2017 20:31:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/data-security-and-the-small-business-part-3</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2895]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Data Security and the Small Business Part 2]]></title><link>https://www.taurproductions.com/blog/data-security-and-the-small-business-part-2</link><description><![CDATA[ Identifying that personal data 

 Firstly, let’s clarify what data were are trying to protect. The forthcoming EU GPDR legislation is only concerned with personal data so, in terms of your future ...]]></description><pubDate>Tue, 31 Oct 2017 20:33:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/data-security-and-the-small-business-part-2</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2896]]></dc:identifier></item></channel></rss>