>I can't go to the bathroom without missing atleast 1 phone call from someone about something breaking.
Don't worry about that. Hell, I straight up ignore my phone sometimes even when I'm right beside it. Priorities and such.
>if I need to start looking elsewhere for more pay to offset the stress
Not a bad idea. Always be cognizant of what's out there.
As others have said, bring it up professionally with your boss. His response will help sway the "should I look elsewhere" decision.
Another good suggestion is to work on time management skills. Here's a highly recommended book around here.
And you have vacation days for a reason. Use them. If you try to but they never approve it, then that's a big red flag.
For the lazy: https://wikileaks.org/ciav7p1/cms/page_26968090.html
Edit: According to Notepad++, the CIA could have taken advantage of this vulnerability by placing a bogus version of SciLexer.dll on a compromised target machine that Notepad++ would load.
>[HTTPS by default] will be happening. Rolling it out this way allows us to ramp up, get API clients on board, and fix any bugs which might pop up. Forcing it to be default for everyone immediately would be asking for catastrophic failure and rollback.
>Soon.
Theres a further part in the affidavit:
> According to a screenshoot that Capital One provided, and that I have reviewed, on or about June 27, 2019, the user "Paige*****" posted, "I've also got a leak proof IPredator router setup if anyone nneds [sic] it," as well as a GitHub link that included "paigea*****thompson" in the link.
So also posted dumps of router setups to GitHub under her real name OF THE VPN SHE WAS TRYING TO HIDE BEHIND.
Can we have an award for worst hacker of the ~~year~~ decade?
You might also try over-the-ear hearing protectors, like you might wear to operate a lawn mower or operate heavy equipment.
I usually advocate for cheap, disposable foam earplugs (I keep a small pack of these in my laptop bag in fact) but if you have some damage to your ear, jamming something in there might possibly cause problems of its own. So going over-the-ear is the safer path.
You said you are in Buenos Aires, so I'm sure you'll know better places to purchase than Amazon US.
These are just examples...
f.lux helps greatly!
There are also tinted glasses to help with monitor strain. Haven't used myself for any real length of time so can't actually recommend, but it may be worth looking into.
Beyond that, make sure that you are getting regular breaks from your screen! At least once/hour, just get up and walk around the office a bit. Grab some water, stretch your legs, and rest your eyes. Just 5 minutes every hour will do wonders!
I'm not an OVH customer anymore (still a few servers but not production) due to various stuff, but I still like how detailed their incident reports are (for major stuff). Like for this incident (in French) with a cooling system that killed a drive bay:
https://www.ovh.com/fr/blog/hebergements-web-post-mortem-incident-29-juin-2017/
I personally use an IODD 2531, it's works very similar but you use a menu on the screen to pick an ISO.
Link: https://smile.amazon.com/dp/B00TDJ4BJU
(Note: It's basically the same as the Zalman enclosures but apparently with better firmware)
As they both support Secure Boot it really doesn't matter which one you use, I prefer the IODD though as I can set it to be only the ISO with no access to the disk.
Yes, it's true that the private interface on Rackspace's Cloud Servers is on a network that is shared by others in your data center. I'm not going to take a stand on one side or the other about that; it is stated in multiple places on the website, but it's also still a bit misleading. What I will say, though, is that there are still security measures in place on the existing private network. IP/MAC spoofing is blocked, and there are some other measures in place that I'm not willing to divulge here.
However, our next-generation Cloud Servers, which are going into private beta on the 1st, will have private vlans for each customer by default using the OpenStack Quantum plugin. I believe that an API will also be available to configure and segment your private networks however you please.
Sounds like time to use some sysinternals tools to see what the app is trying to access and then set up the necessary custom permissions Process Monitor is your friend: http://technet.microsoft.com/en-us/sysinternals/bb896645
https://cloud.ibm.com/docs/overview?topic=overview-zero-downtime
> How does IBM Cloud ensure zero downtime?
Definitely not this month, fellas.
EDIT: Why I don't use that word on statuspage postings.
It's absolutely fucked right now. Literally just go to https://store.steampowered.com/account/ and you'll be shown a random users personal details.
Some sysadmin somewhere is probably having a heart attack.
Edit: They finally shut the servers down after nearly an hour of totally exposed account details.
Both APC and CyberPower make UPSs in your price range that they label as "pure sine wave" that should work with your active PFC PSUs.
https://www.amazon.com/CyberPower-CP1500PFCLCD-Sinewave-Outlets-Mini-Tower/dp/B00429N19W/
You can install fail2ban, which is a daemon that parses your logs and blocks all ip's that are trying to bruteforce you. (http://www.fail2ban.org/wiki/index.php/Main_Page) Alternatively, if you want a more simple and immediate solution, and it's currently only one ip, you can block it with iptables:
iptables -I INPUT -s 219.137.228.180 -j DROP
Which will drop all traffic from that ip.
UniFi equipment. Get some of the UniFi APs, toss them up, set it on a hosted controller on AWS, and forget it. It's so easy you'll swear you did something wrong when it's all set up. Here's a 3 pack. Looks like it includes the PoE injectors as well.
Get her one of those shoe mounted ground things and see if the problem goes away
Corporate VPNs protect your data from interception by 3rd parties that might happen to be on the same cafe/hotel network as you, and gives you secure access to data inside the corporate network. These are good things, and you most certainly should start using it for key staff.
IPVanish (and similar 3rd party VPN providers), on the other hand doesn't give you access to your corporate network, and also exposes you to a much more concentrated threat, as the IPVanish network would give a hacker a much higher value target pool.
IPVanish's target market is people who want to stream US Netflix from overseas and want to download torrents without getting caught.
I know it's expensive, but if it's critical to the job - https://www.amazon.com/StarTech-com-Console-Portable-Laptop-Adapter/dp/B002CLKFTQ
Fits in your pocket and doesn't require you to plug into a customer's PDU's.
This is a critical IT system...
You really should have 2N redundancy on your garden hose.
$10 will get you a checkvalve (well, you need one per hose) so that if one hose fails, the other one won't back-flow out the broken hose.
Storagecraft ShadowProtect. VM and physical solution, works perfect. Has awesome feature called VirtualBoot which allows you to boot up any backup as a VM on your laptop / desktop machine.
> hirensbootcd.org is being developed by the fans of Hiren’s BootCD. https://www.hiren.info/ is the official homepage of Hiren’s BootCD
This is not an official version, but whatever, if it works it's good. I've been using Medicat for these years, and it has served me really well.
My post from yesterday about just such scenarios seems highly relevant right now:
What's interesting is that many of the even worse events seem to boil down to systemic issues that a single employee gets blamed (scapegoated?) for.
For example, data with no backups, that's an issue that was going to reveal itself sooner or later. Just so happened that they'll blame the employee for it rather than WannaCry. But the result is ultimately the same. They lacked the systems and policies to correctly protect key information.
Or this:
> an authorized S3 team member using an established playbook executed a command which was intended to remove a small number of servers for one of the S3 subsystems that is used by the S3 billing process. Unfortunately, one of the inputs to the command was entered incorrectly and a larger set of servers was removed than intended.
And while credit to Amazon, they didn't scapegoat anyone (that we know of), it just goes to show that a lot of "big deal" problems are systemic in nature. Just quietly waiting to be brought out in a big way.
This is why I think we could all learn a lot from the NTSB's investigations into aircraft crashes. When they look into these things they aren't looking for an individual or scapegoat, they boil the problem down to how the system put that individual into a position where they could screw up (be it poor procedures, poor training, poor equipment, or a million other issues).
Every time a colleague or subordinate makes a mistake, the first question that should get asked is: How could broader department policy have prevented or mitigated this?
Stephen Covey said "treat your employees like your customers, and everything will work very good".
But people are stuck in their childhood and enjoy power.
Clarks makes good, comfortable stuff at a reasonable price. You may be interested in the Touareg
I wanted to add that if you're brand new to PowerShell then you should take a look at <em>PowerShell in a Month of Lunches</em>.
Also, take a look at /r/PowerShell. There are fantastic people in there, and they're incredibly knowledgeable.
Not quite 2 for $58, but for full-on malicious compliance: https://www.amazon.com/Colored-Striped-Tuxedo-Blazer-Jacket/dp/B0771KS62V/ and even better:. https://www.amazon.com/Piece-Notched-Floral-Button-Medium/dp/B01E88STN4/
Let me introduce you to Shodan
When I ran the scan it showed: 331,854 systems that reported it open
And yes there are people out there stupid enough to open ports like that to the internet, so is it possible? Maybe, we will need to wait for further information from the investigations im sure are happening as we speak
They linked their download to this:
http://www.downloadcrew.com/article/177-7-zip_64-bit
Horseshit download.com type of site. Absolutely no reason why they shouldn't have linked to the 7-zip source page.
Here is Microsoft's guidance.
The main takeaway is to use a subdomain of a publicly registered domain name. This protects you against domain name collisions and still allows you to separate your internal and external DNS.
>4 of them are dialed in via their cell phones AND on speakerphone, so we can hear everything going on behind them.
Four managers on the call? Ouch. In all seriousness the people I have found most often refuse to use a headset (or even a USB mic on the desk) are middle management too full of their own self importance.
> Why the f*** is anyone DIALING into a Webex meeting
Old habits and nobody has forced them to change.
Kubernetes? It was the future, yesterday. Now everything is serverless -- It's the future.
What I mean to say is that the landscape is constantly shifting. At the moment, it looks like the paths forward for the majority are to be comfy using other people's computers (cloud computing / DevOps / SRE), to be the people swapping disks / chassis / cables in a cloud provider's datacenter full-time, or to be help desk. But two years from now, who can say? The only constant is change. Keep your eyes open and stay on your toes.
We went Jeans & Polos everyday a year or three ago, so I no longer need to wear dress pants/shoes.
But those Rockports would last me about 3 years a pair. No, they aren't as fancy as a good pair of leather-bottoms. But they were pretty enough, comfortable as hell, and surprisingly water resistant.
I work on a campus of four buildings so walking from building to building in the rain was a sufficiently significant concern for me to roll with something waterproof.
I don't understand how this happened. I just tried the same thing, and the "ad" link takes you directly to https://www.google.com/chrome/
It doesn't take you to some sketchy 3rd party site to download Chrome. Sounds like OP already had soemthing funky in his brower that caused the redirect.
If I recall you can up that number although upping it has potential performance implications. I imagine that if she's the only one doing it then the performance hit shouldn't be a big deal but if everyone has a ridiculous number of folders...
Give me a minute and I'll see if i can find the article for you.
Edit: Here you go http://technet.microsoft.com/en-us/library/aa996193.aspx . You can either increase the limit or flat out remove it.
Backups may be constant now, I wouldn't know but there was a time when someone in Pixar typed "rm -r - f" on the sever and they lost all of Toy Story 2. The only backup they had was a copy on a hard drive given to a lady on maternity leave so she could work from home. https://thenextweb.com/media/2012/05/21/how-pixars-toy-story-2-was-deleted-twice-once-by-technology-and-again-for-its-own-good/
Amazon has some with same-day delivery, man. Otherwise maybe hit Wesco/CSC as soon as they open Monday AM?
I gave the entire document ( http://www.bleepingcomputer.com/frivolous-lawsuits/enigma-software/Enigma-Software-vs-BleepingComputer.com-Amended.pdf ) a read through. TL;DR version:
This is a complaint about their software not being used (imo for good reason) and they were not presented with the same opportunity as Malwarebytes to promote their product on Bleeping. The accusation of defamation is a little out there based on the evidence provided. The offending posts were not reviews, but a presentation of information which is well sourced.
If you scroll down to the exhibits, you can see the "offending posts".
The problem lies in that they're getting paid by Malwarebytes for promoting their product. If there was no payment involved there would be no problem.
End TL:DR
Sorry Enigma, there's just a better product out there with a snappier name to boot.
From a similar server fault question:
>bring a sound level meter and the OSHA guidelines, and show them that they are providing an unsafe work environment. This would require them to perform monitoring and sound control, supply affected employees with proper equipment for such a working environment, hold occasional training on sound exposure, etc, etc, etc. The cost would be much greater to support than providing a work area outside the server room.
We use DokuWiki https://www.dokuwiki.org
Works well, searchable, different user levels, attach documents or embed pictures, code boxes and other formatting fun to make your documentation pretty and readable
The cabinet should be grounded for starters.
No: the electrical grounding wire in each power cord is not what I'm talking about.
There should be a dedicated electrical grounding wire running from the cabinet to a proper electrical ground (as defined by electrical code in your area).
https://www.8solutions.com/wp-content/uploads/stories/PDFs/facilities_considerations.pdf
With that in place, the equipment is in no danger of static damage during operation.
The risks will only exist during hardware installation/removal.
Use of a grounding strap is the usual mitigation for any activity that requires you to open a chassis.
https://www.amazon.com/Kingwin-Anti-Static-Electricity-Comfortably-Electronics/dp/B00LQFWRMC
I just tested it, and it does it two ways:
1.) If you search Google Chrome, that ad link takes you to https://www.google.com/chrome/ (which is where we want to go).
2.) If you search "Download Chrome" that ad (even though it's highlighted that you've been there before if you've visited the page via the first way) takes you to www.newchrome2018.net
This is more than likely an Ad page hijacked and honestly has little to do with Microsoft Edge and more with Bing and/or its ad services. It's ad page is hijacked, and it redirects you to a fake page that looks awfully legit.
This isn't on Microsoft Edge (though I still strongly advise my people to not use it), even though they use Bing as its default search engine. This is all on Bing.
"The Design and Implementation of the Unix Operating System", by ~~J.S.~~ Maurice J. Bach
"The Unix Programming Environment" by Kernighan and Pike.
"The C Programming Language, Second Edition", Kernighan and Ritchie
"Operating Systems Design and Implementation", Tannenbaum
"The Chicago Manual of Style", University of Chicago Press
A dozen or so of the AT&T Unix SVR4 manuals (half purchased, half rescued from a dumpster on cleanout day)
"How to win friends and influence people", Dale Carnegie
"The Awk Programming Language", Weinberger, Aho and Kernighan
Edit: now that I'm back at my desk, I see a couple others:
"Unix Network Programming" -- W. Richard Stevens
"Advanced Programming in the Unix Environment" -- W. Richard Stevens
"Oracle Programming -- A Primer" -- Rajshekhar Sunderraman
And the list is not complete without: "Sendmail" (O'Reilly). Of course my copy is from 1993, and only 792 pages long.
Hi deadbunny! We actually do have a team of in-house writers (I'm one of them!), in addition to the great work our editors do with community authors. I actually got the job after writing as a community author for a little while, and it was a great experience.
If anybody reading this knows some interesting tech and wants to get paid to write about it while working with some wonderful editors, give our Write for DOnations program a look. We recently revamped our payouts and also added in a donation to a tech-focused charity of your choice.
To quote the owner of the site: > They are saying that BleepingComputer is giving a bad review because we want to drive sales to Enigma's competitors (Malwarebytes). That we are purposely orchestrating a smear campaign. This is all a load of crap and they are just trying to bully us into removing a review that doesn't make them look good. They are bullies, simple as that.
The main reason for them suing is because of this "review" (actually not a review) and the fact that it appears so high in search rankings when searching for Enigma/Spyhunter related stuff: http://www.bleepingcomputer.com/forums/t/550005/spyhunter-vs-malwarebytes-vs-iobit/?p=3491488
They have sent cease and desist letters and law suits to other companies, and they all pretty much say the same thing so this is nothing new for Engima.
You might want to look at Franz Supports 34 clients (mostly by wrappers around web interfaces) and works quite well for me.
I have Slack, whatsapp, gmail, google hangouts, steam and skype all going in the same client.
Obviously not as fully featured as the full clients but it's very convenient.
Edit: it also supports most of the suggestions suggested elsewhere in this thread.
ScreenToGIF is currently my favorite "new" tool. Discovered this gem a few months ago. Super easy to edit your capture (i.e. granular control over the transition speed between each frame, edit/delete frames, mouse-click recognition etc.).
We use IT Glue for all of our documentation and occasionally send how-tos to our clients. IT Glue support embedding GIFs so a few well-scripted captures can eliminate the need for 10+ individual screenshots with explanations.
Ninite isn't free for commercial anymore.
>The free version of Ninite is only licensed for home use and as a trial for Ninite Pro. If you get paid for running Ninite (like in an IT department, PC shop, managed service provider, school, non-volunteer helpdesk, etc.) you must upgrade to Ninite Pro. https://ninite.com/terms
I'm not arguing against your point, because it's certainly valid and not every website has a need to be on HTTPS.
But you can get a free cert from startssl.com right now, and then this summer get one from Let's Encrypt
I think you have it spot on but the response from amazonians to NYT cracks me up.
>There is no intricate machine, and I have no idea what Jeff’s ambitions are, other than to continue to grow Amazon. Most of us work here because we want to solve the world’s most challenging technology problems.
Like really? You are solving global impoverishment, violence, or how to get the most out of a 100 ton spinning steam turbine? Or maybe how to send a man to Mars. Its written as if he works in some company that is literally writing the future. No, fuck you, you are solving how to get a god damned waffle maker in under an hour to someone in America while still making money. The disillusion here is troubling, sorry but no way.
I got my copy of Windows 8.1 from Dreamspark, and I haven't received a notification for reserving Windows 10. Is there a way to force it?
EDIT: I found out that you have to have an update installed to get the notification. It's an optional update, so I had to go into Windows Update and install it manually. I still haven't gotten a notification, but I'm trying out some things. I used this tutorial
Sysinternals is the tool set that I turn to the most outside of PowerShell.
Process Monitor:
Process Explorer
AutoRuns:
ProcDump:
ZoomIt:
PSExec:
Invoke-Command
AccessEnum:
PSPing:
Test-NetConnection
Handle:
There are a lot more great utilities in this suite. These are just the ones that I have found myself using the most.
As someone who has worked extensively with non-profits, as a volunteer and as a paid employee, let me give you some advice.
There are always a few "what did you do?" posts also, followed by one from a year or so later saying that "you followed up to a 6yo post?".
On the subject, this is my favorite. :) Original post was made December 29, 1990. I followed up on September 16th, 2009.
My coding process is pretty bad. Write somewhat usable code, debug all the tiny mistakes I make. Thursday night, some pushes to github started failing. When you push as often as I do, this is a huge pain.
I woke up Friday to find out that this was likely the result of the Chinese government, or their supporters (regardless, the gov should still get the blame for the environment they have created).
This really rubs me the wrong way. I personally don't really know what I'm doing, but as pointed out by an astute hackernews reader, pissing off a bunch of talented programmers is probably not a wise move.
Hope the GitHub ops team is doing okay, sounds like it has been a rough few days!
EVE Online devs have said one of the criteria they use when designing new features is the Time To Penis (TTP) metric - how long it will take someone to use the new feature to create a penis in game. It is frighteningly short in many cases.
I give a lot of credit to Gitlab for their transparency and this is another example. They also publish an open salary calculator. I hope they recover quickly and make the necessary resiliency improvements - we've all been there.
SnipeIT - Users get an email notifiying them that they have been issued equipment and can have them accept a liabliltiy if you want. Also - its free. Takes about 1 - 2 hours if you are comfortable with *nix enviornments or you can do a hosted version. https://snipeitapp.com/
Eh, you probably won't on account of they'll make you sign a ridiculously broad NDA. This guy got fired just for posting that they hired him.
The shitty Sourceforge that was injecting malware was owned by "Slashdot Media" , which was owned by DHI/DICE.
BIZX bought Slashdot Media from DHI/DICE on January 28th 2016 - http://www.sdbj.com/news/2016/jan/28/slashdot-media-acquired-bizx-undisclosed-price/
And brought in new management which got rid of the malware on February 9th 2016 - https://sourceforge.net/blog/sourceforge-acquisition-and-future-plans/
Making such a change barely a week after taking over an organisation shows what their priorities are and should get them at least the benefit of doubt that they do wish to change things.
Somebody here mentioned these the other day https://www.amazon.com/Magnetic-Adapter-Connector-Transfer-Compatible/dp/B07TT6NGBC/ref=sr_1_3?dchild=1&keywords=Snapnator
That will at least protect the port.
Search around there are various types and styles of magnetic connectors.
Are they running Windows 7 Enterprise? If so, the KB does not apply to that version, and the users will never see notification.
EDIT: You can find nearly all your answers about this update at the link below. Microsoft gives very detailed information regarding applicable versions. https://www.microsoft.com/en-us/windows/windows-10-faq
I have no idea why you are getting the down votes; I imagine it is from Cisco purist or someone that has never worked with the wonderful RouterOS and the hardware built around it. I do hope that others might take a look at this awesome networking equipment. Link to Router OS Info
*** Also - the equipment he is suggesting is also a Firewall.. ***
South Korea has a pretty bizarre history with microsoft, specifically. See: http://www.zdnet.com/south-koreans-use-internet-explorer-its-the-law-7000022827/
That said, oh boy am I glad im nowhere near that or any job supporting that.
while not an answer as to a possible problem, use this to get an evulation and possible infos on problems
https://mxtoolbox.com/spf.aspx
btw: masking the spf records is pretty funny since it is public to anyone
I'm a developer, but I have the same issue of staring at a screen for upwards of 12 hours a day. I cannot recommend f.lux enough; without it, I get headaches within five minutes. It sets the temperature of your screen, basically, so it's not so glaringly blue.
Mine's configured to 4600K in daytime, falling to like 3400K at night, which is a deep orange. I fully believe that without f.lux, I wouldn't be able to work the shifts I do, so it should help you out.
BleepingComputer is a website which offers information about how to remove malware and downloads for popular tool like Combofix, Rkill, Adwcleaner and Malwarebytes. They also have a forum where a global moderator (not paid) wrote a "review" (it was more of a opinion) on Spyhunter, which BleepingComputer is now being sued for defamation over.
Enigma is the company which owns Spyhunter, an anti-spyware product which was previously considered a rogue. Many people do not recommend it and you have to pay to fix anything it finds.
Engima was suing BC over defamation because of the above "review" and because BC makes a commission off anyone who buys Malwarebytes through one of their malware removal guides, and therefore they are attempting to make them look bad so more people will buy MBAM or something. BC are suing them back because Enigma registered websites containing parts of BC's source code, and claiming their programs are malware and that you can run spyhunter to remove them. Essentially looking to tarnish and make money off BC's name.
TLDR; Enigma sues BC for defamation over a "review". BC sues Enigma for using their name and part of their source code without permission, registering websites claiming BC and their programs are malicious in an attempt to profit and tarnish BC's reputation.
Aside from all the performance and reliability reasons, this is a very bad idea because of perimeter security.
Lets assume WPA2 is 'uncrackable'. Are your employees smart enough not to lose their passwords? Or do you have some kind of 2 factor authentication thing planned?
Also, I can shut down your business from my car across the street by simply jamming the signal or sending de-auth packets.
Just kidding, i don't have a car.
It appears to still be dependent on AppData, so the CyrptoPrevent rules should still catch it. If you haven't done CryptoPrevent (or Software restriction in Group Policy), I suggest you do so. It saved my ass once already from CryptoLocker (a user ended up getting infected by it, but it was prevented from running).
Edit: For all those asking, http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information
Time to export your data
You can go to your LastPass Icon > More Options > Advanced > Export in order to export your usernames and passwords to a .csv file (comma separated value)
Let's not spread FUD on what's "acceptable" like it's some arbitrary, shadowy term. They outline exactly what an acceptable ad is and every company requesting is manually verified. You can also disable the feature that allows unintrusive ads so it'll block everything.
My general feeling on ads is, if it's a content creator you enjoy and want to support, there's no reason to not allow them to make money from ad revenue.
The guy that built this needed native Mac hardware for software testing, and his company required that he followed the EULA.
Here's his explanation: http://hackaday.com/2012/12/09/160-mac-minis-one-rack/#comment-900394
Heck, DEF CON even told the feds they outright weren't welcome in 2013.
That was also the same year that General Keith Alexander gave the keynote at Black Hat. Props to the guy for continuing with his talk (there were rumors that he was going to cancel it), but it wasn't exactly the most... supportive crowd that year.
Definitely have to put in my two-cents for ScreenConnect. Their licenses are cheap, one-time cost and can be used for both support sessions and unattended access. I've used GoToAssist, Logmein, Bomgar, and Teamviewer and prefer this solution (and the cost!) to all of those listed. The MSP I used to work for was using logmein rescue and teamviewer and screenconnect replaced both.
I'm not sure I'd consider Powershell devops than a core Windows administration tool. Devops to me would be like Chef, Puppet, Ansible, Salt, etc. (Puppet I think would be good for a Windows person to learn.)
You can do Powershell in a month of lunches: https://www.amazon.com/Learn-Windows-PowerShell-Month-Lunches/dp/1617291080
You can do the Microsoft Virtual Academy as well: https://mva.microsoft.com/en-us/training-courses/getting-started-with-powershell-3-0-jump-start-8276
Powershell is very object oriented and pipelined, it's not a bunch of "++1, !, +3," style of true programming. It's more of a "get-aduser doej"
A lot of the commands are the same syntax prefixes, like "get" and "export".
Don't be discouraged, envision yourself knowing this inside and out in a year, and your mind will work you toward this goal.
What, specifically, do you work with that you think can benefit from scripting?
Heck, they record the IP addresses of every download of this one option pack for VirtualBox, and then try to map back the addresses to companies so they can drop minimum-100-seat mandatory-licensing bills on you.
Funnily enough some cheap unamanged ones actually are managed, presumably because silicon is so cheap there is no point making separate chipset for unmanaged one
I believe you have what's called Poweliks:
https://blog.gdatasoftware.com/blog/article/poweliks-the-persistent-malware-without-a-file.html
It's a cool piece of malware for sure. I believe a Windows Update fixes the exploit it uses.
Malwarebytes Anti Rootkit should detect and remove it. Bleepingcomputer has a guide too:
http://www.bleepingcomputer.com/virus-removal/remove-poweliks-trojan
Here you go. It needs to run as the user in question before Pidgin runs. Obviously you'll need to change the config file to reflect your own server name and replace the certificate with your own (if necessary)
Easiest way to do this is log into Pidgin on your own machine and view/compare the files in your own AppData directory.
Edit: Someone else mentioned this further down, if the user chooses to remember their password it will be stored IN PLAIN TEXT in their AppData directory. This is a hacker's wet dream if you do AppData redirection and they get a hold of your file server data somehow.
https://drive.google.com/file/d/0B4iYYkIa416GOW1xeVJaTVVmeTQ/edit?usp=sharing
I work for DigitalOcean. We absolutely let you export your data, dns, etc - just not backups and snapshots. This is because they wouldn't really be of any use to you - they're customized for our system. We even have a published tutorial about backing up outside of DigitalOcean
Check out our API - https://developers.digitalocean.com/documentation/v2/. You can export your DNS, firewall settings, etc from there. Want to move to another provider? Use our API to get your DO settings and then the new provider's API to set them up.
Greenshot is abandonware with no updates in 4 years.
It is still good, but ShareX (free, open source) appears to be its successor, with video capture and more: https://getsharex.com/
I just wish ShareX had more features to remove the "Share To" menu options, though I can and do turn that feature off.
>At my company, we all use Gtalk for casual conversation
DuckDuck Go Public XMPP Server
There are all kinds of options out there, I would not go with Hangouts though, no since rewarding Google for creating Wall Gardens. Google should be working to OPEN things not close them off.
You'd want to follow a framework so you don't get overwhelmed and to make it editable by anyone in the future. Future systems will be added/removed from your documentation at least yearly.
The NIST 800-34 is a larger beast that does BCP (DR is just 2/5th of the BCP documents you make) however it sheds so much light on your org that if people take it seriously it whips your company into shape real quick.
First you'd want to build an BIA Business Impact Analysis report which you go department to department asking what tech they use both internally and externally and ask about workflows and how long can that workflow/tech not work. From there you take those maximum downtimes and build charts per department which helps you assess backup and restore times.
Next you'd be making a IT Disaster Recovery Contingency Plan (IT DRCP) which lists those systems that your org depends on based on your previous document, minimum requirements, services it provides, activation & notification, Recovery/Reconstitution procedures. This document basicly can be handed to another MSP should you be hit by a bus. It should also be paired with an encrypted FIPS compatible USB stick (never use bitlocker other solution that requires software to be installed) that will hold all the orgs passwords,certificates, PGP,SSH keys to assist in repair or reconstitution of the systems as well as test cases to verify success.
I just ran through our BCP by hiring a 3rd party and they did a fantastic job writing and helping us build a BCP program to keep the documents up-to-date.
Okay there's a bunch of misinformation going on here.
This screen shows up when you activate an email account that uses the Exchange ActiveSync protocol. ActiveSync (AS) was designed to let corporate phones sync email/calendar/contacts/etc with a MS Exchange server. It also allows management of the device in question, including the ability to set a security policy (require a lock screen for example) and do a remote wipe.
Every single time you setup an Exchange ActiveSync account you will see this screen. Every time. There's not some power mad admin in your school's IT department who wants control over your phone, it's just a function of the protocol they use.
Now you have two choices.
Use a protocol other than Exchange ActiveSync. Ask your school to enable access via IMAP.
Use a different Exchange ActiveSync client, other than the one built into your phone. For example, TouchDown for Exchange is a 3rd party Exchange client with all the features (mail/calendar/contacts/etc). It will access your school's Exchange function, but with one big difference- a remote wipe only wipes the data in TouchDown, NOT the whole phone. I use TouchDown myself and I highly recommend it.
There's also Outlook for Android, but I've never used that so I can't comment with any authority.
Given your situation, I think you should give TouchDown or something like it a try.
> This article seems to be completely missing the point that if she had taken the time to develop her own personal identity outside of work rather than trying to fit in with her coworkers she would have been much better off as an individual. You don't need to have fun with your coworkers, you just need to work well with them.
I think in the end, ultimately this individual realized just that. Understandably some will disagree with her reasoning on how she came to this conclusion. However if you take anything away from the article, IMHO it should be basically what you have just said. $JOB == $JOB in the end, you should still live your own life and have your own identity.
This small response epitomizes why some people will forever remain in a support role. Some really smart people. Unfortunately, they let their ego get in the way. This isn't about verbal judo or The Art of War, this is about relationships with people outside of your narrow zone.
I don't know how many really sharp guys I've worked with who just don't get it or refuse to get it. You need to develop relationships with these people, and those relationships are hierarchical from the executives down. Such a simple relationship would have afforded this person the benefit of the doubt right away. I chat with my directors regularly, and almost never about my work. But before I end our conversation, "oh hey by the way, I've been working on a replacement file server that's just about ready. It'll be a little faster, people might not notice it but that's not a bad thing. Take care, John."
EDIT: Just wanted to finish a thought, those people that don't get it - that's fine! You just have to understand that while you're complaining about end users, you're probably just enjoying complaining about end users. Or you probably don't want to work your way up. Or whatever, maybe I'm totally off. The takeaway here is that there are always opportunities for improvement. In OP's story, a simple non-working relationship with his exec would have saved him a lecture and generally made life better for him.
Speaking of relationships - Christmas parties are coming up. Don't hole up with IT in the corner. Go talk to people if you don't already. Let them tell you stories and laugh at them. Share some of your own non-tech/work stories. People's eyes glaze over with IT talk (and they're the real nerds but whatever). Take these parties as a way to develop relationships and connect with people.
> Take aways: I never thought about the fact that even though I get emails from my UPS and the monitoring company text me, they all come from generic addresses I can't add to my phones "Do Not Disturb Bypass List" so I didn't get any of them.
If you're using Android, install klaxon. You can configure it to alert on specific senders, or specific content in messages. It'll need to read your text messages, but make a shitton of noise regardless of your DND state. Has been a lifesaver for me several times.
lol
:(){ :|:& };:
http://explainshell.com/explain?cmd=%3A%28%29%7B+%3A%7C%3A%26+%7D%3B%3A
It's detailed... and tells you what all the elements do but I doubt someone who needs explainshell.com would be able to interpret it even still... it would be a lot easier to answer with one line "This is a fork bomb, don't run this."
This article is inaccurate, OEM/System Builder licenses will still be sold.
>So you will be able to buy a System Builder copy of Windows 8.1 in certain locations, such as Amazon. However, you will not find that code at Best Buy or any other normal retailer. There you will only find the two normal versions of Windows 8.1.
>HELP_RESTORE_FILES.txt
Normally Associated with TeslaCrypt
Edit: Link to Cisco Service.
http://blogs.cisco.com/security/talos/teslacrypt
This only works on one of the Variants though, there are at least 3, and I believe 4 now in the wild, AlpaCrypt will not work with the Cisco Service.
>decrypt close to 150GB worth of data?
You could not afford to have long term backups of 150GB?, rotating 2- 320 hard disks locally would have been less than $100 in expenses. that would have provided for 4 copies of the data.
While that may be not be best solution, any offline copy is better than no offline copy at all. "It costs too much" should never be an acceptable answer, if you company can not afford a $200 external harddrive to keep a cold copy of data then they likely can not afford to pay you in the first place.
Also use IIS' backup tool. It takes backups of each server change prior to changing it. Bindings are captured in that.
Check out Matrix. It's still not at 1.0, but it's an open standard, federates between servers (no "get on my IRC network" problem, more like email or SMS), is all FOSS, and has all the nice Slack-y features. It even has integration bots into IRC and most of the modern silo chats.
Fun fact: at one time HP faced 25% RMA within 3-year lifecycle on their laptops ... so you're still beating yesteryear's average by a healthy margin. Lifehacker 2013
What's happening here is libc's readdir() method uses the system call getdents() with a very small buffer size. This causes extremely poor performance on ext3 in a directory with lots of files. In fact, if you try to strace rm -rf directory_with_a_million_files
, what you'll see is that calls to unlink() are extremely quick, while calls to readdir() pause for several seconds every 8-10 unlinks().
Unfortunately, it's very hard to get around this with any common tool, because whatever tool you try to use - rm, find, ls, perl, python, ruby, java, whatever - is behind the scenes making calls to libc's readdir() method, which is fundamentally slow on large directories.
The solution is to write a custom C application which deletes the files with direct system calls, rather than relying on the abstraction from libc.
For a much more in-depth discussion of this, including sample code, please see this (lowest-rated, but absolutely spot-on) comment at ServerFault.
If you're blacklisted at Spamhouse, you're likely to be blacklisted other places as well.
You can use https://mxtoolbox.com/blacklists.aspx to figure out which ones. Make sure to search both by hostname and IP - I've occasionally seen different results coming up.
That'll help you figure out WHERE you are blacklisted. Some of these guys that have blacklisted you will have an automatic thing on their site that may tell you why you were blacklisted.
You can get hints on WHY you are blacklisted by using email-tester.com - it will give you a spamscore and some pointers on what to improve to make your emails look less like spam.
Good luck.
Chef: Chef is a solid automation tool that's geared toward people without a lot of programming background.
Splunk: Splunk is big data aggregation software...It's cool, but wait until someone pays for it before you try and use it. You can fix the same problems by setting up log rotation or using rsyslog and exporting your logs to a NAS or something.
Autofs is a base linux package these days. Pretty simple. Really reduces your headaches as opposed to just cramming stuff in the fstab.
Really the most valuable skill is laziness. Would you rather spend 1000 hours fixing the same problem over and over, or 10 hours fixing it for all eternity? Whenever you see the same problem twice, write it down, and start looking online to see how people solved it. Someone always knows how to solve it.
I tried my best to get the Lansweeper report out as soon as possible for everyone, so here is the July 2021 Patch Tuesday Report. Complete with color-coding to quickly check which machines have the updates.
What?!? Are we talking about https://www.wireshark.org/ ?!?
The completely free and limitless tool? That captures every protocol you dump on the line?
​
There is no pro, or you sir, are a very good troll :)