Skip to content

Instantly share code, notes, and snippets.

View fstueber's full-sized avatar

Frank Stüber fstueber

View GitHub Profile
@fstueber
fstueber / feiertage.ps1
Created March 26, 2024 12:02
Generiert Feiertagskalender für alle 16 Bundesländer als iCal-Dateien
<#
.Synopsis
Generiert Feiertagskalender für alle 16 Bundesländer
.Description
Generiert für alle 16 Bundesländer jeweils einen Feiertagskalender im iCal-Format für den
vorgegebenen Zeitraum. Die Daten basieren auf dem OpenHoldaiys API Projekt.
.Parameter Ab
Startdatum im Format YYYY-MM-DD
@fstueber
fstueber / schulferien.ps1
Last active March 26, 2024 11:56
Generiert Schulferienkalender für alle 16 Bundesländer als iCal-Dateien
<#
.Synopsis
Generiert Schulferienkalender für alle 16 Bundesländer im iCal-Format
.Description
Generiert für alle 16 Bundesländer jeweils einen Schulferienkalender im iCal-Format für den
vorgegebenen Zeitraum. Die Daten basieren auf dem OpenHolidays API Projekt (https://www.openholidaysapi.org/).
.Parameter Ab
Startdatum im Format YYYY-MM-DD
@fstueber
fstueber / AssumeUDPEncapsulationContextOnSendRule.reg
Last active June 4, 2020 20:32
Configure an L2TP/IPsec server behind a NAT-T device in Windows 10
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PolicyAgent]
"AssumeUDPEncapsulationContextOnSendRule"=dword:00000002
@fstueber
fstueber / web.config
Last active February 17, 2020 14:42
web.config for increasing upload limit
<?xml version="1.0" encoding="utf-8"?>
<configuration>
<system.webServer>
<security>
<requestFiltering>
<requestLimits maxAllowedContentLength="2147483648" />
</requestFiltering>
</security>
</system.webServer>
</configuration>
@fstueber
fstueber / Disable-Weak-TlsCipherSuites.ps1
Last active March 9, 2020 20:34
Remove weak cipher suites and hashing algorithms in Windows 2019 and Windows 2016
Disable-TlsCipherSuite -Name "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"
Disable-TlsCipherSuite -Name "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"
Disable-TlsCipherSuite -Name "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"
Disable-TlsCipherSuite -Name "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"
Disable-TlsCipherSuite -Name "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"
Disable-TlsCipherSuite -Name "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"
Disable-TlsCipherSuite -Name "TLS_RSA_WITH_AES_256_GCM_SHA384"
Disable-TlsCipherSuite -Name "TLS_RSA_WITH_AES_128_GCM_SHA256"
Disable-TlsCipherSuite -Name "TLS_RSA_WITH_AES_256_CBC_SHA256"
Disable-TlsCipherSuite -Name "TLS_RSA_WITH_AES_128_CBC_SHA256"
@fstueber
fstueber / Upgrade-Diffie-Hellman-Prime.reg
Created October 14, 2019 08:15
Upgrade the Diffie-Hellman Prime to 2048bit on Windows 2012
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\KeyExchangeAlgorithms\Diffie-Hellman]
"ServerMinKeyBitLength"=dword:00000800
@fstueber
fstueber / EnableTLSv12ForWebDeploy.reg
Last active June 5, 2021 08:56
Enabling TLS 1.2 for IIS Manager and Web Deploy after disabling SSL3, TLS 1.0 and TLS 1.1
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319]
"SchUseStrongCrypto"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v4.0.30319]
"SchUseStrongCrypto"=dword:00000001
@fstueber
fstueber / DisableTLSv10+v11.reg
Last active October 29, 2019 12:07
Disable TLS 1.0 and TLS 1.1 on IIS 10
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client]
"Enabled"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server]
"Enabled"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client]
@fstueber
fstueber / DisableRC4.reg
Created October 6, 2019 19:49
Disable RC4 ciphers on IIS 10
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 128/128]
"Enabled"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 40/128]
"Enabled"=dword:00000000
@fstueber
fstueber / web.config
Created June 19, 2019 15:40
web.config for HTTP to HTTPS redirect
<?xml version="1.0" encoding="UTF-8"?>
<configuration>
<system.webServer>
<rewrite>
<rules>
<rule name="HTTP to HTTPS redirect" enabled="true" stopProcessing="true">
<match url="(.*)" />
<conditions logicalGrouping="MatchAll" trackAllCaptures="false">
<add input="{HTTPS}" pattern="^OFF$" />
</conditions>