Yes, Black People are in Information Technology (I.T.). the world.
I have always had an interest in Computers
I am a person of color at am a Systems/Network Administration, current working for Vulcans Logic Networks Enterprise, Inc.
This Website is focused on learning about computers, computer systems, and networks, as well as a computer system and network security. This website and blog is a place for me to post my notes, research, and tips for Information technology, computer programming, computer operations, computer science and hacking; and anything else technology related blog. It only to provide help and information.
I have been working in I.T. for 15 years and I don’t know everything. Like martial arts (I am also a Martial Artist), your skills as a Systems & Network only get better over time and with content practice and training. This is about the art and training of the I.T. Professional.
This website and blog is a place for me to post my notes, research, and tips for Information technology, computer programming, computer operations, computer science and hacking; and anything else technology related blog. It only to provide help and information.
I recently started working for a friend part-time, who uses best practices in his IT management services business, the month has been a reminder of what I learned when I got into the IT industry and it has also been an eye-opener to how lazy I have gotten over the last 13 years, because I have been working for people who were doing things wrong.
This website and blog are about me retraining myself and the continued growth in the area of computer systems and networks.
I found this list of default passwords used in routers the may help you taking control of systems and networking equipment from another admin I lot of system and network admins are either too busy or lazy to change the default logins to there devices (sometimes they can’t). Please, change your default passwords if you can.
CISCO Router Password List
BBSM 5.0 and 5.1
BBSD MSDE Client 5.0 and 5.1
BBSM Administrator 5.0 and 5.1
Netranger/secure IDS 3.0(5)S17
BBSM MSDE Administrator 5.0 and 5.1
Catalyst 4000/5000/6000 All
VPN Concentrator 3000 series 3
Ciso Aironet 1100 series Rev. 01
Cisco Wireless Location Appliance 2700 Series prior to 220.127.116.11
2 + last 4 of Audio Server chasis Serial case-sensitive + 561384
Recently, I have seen this a lot in windows environments; my follow windows admins try to solution DNS issues by putting their domain controllers in the environment in the forwarders tab.
The forwarders tab is for non-authoritative requests or queries for external addresses. Now in truth, I am simplifying this article. This really about a very basic domain or domains.
The are many types of forwarders, this config is just external DNS look-up. When end-users generally talk about the internet being slow, it is usually base the DNS servers by the ISP is slow and overload with a request.
This is the config I use for my dc’s forwarders in AD has saved a lot of headaches and complains about slow internet.
I hope it is helpful.
Forwarders should only really be used for external DNS lookup and if the root server is an unavailable and/or non-authoritative request.
I will do another article about network congestion.
I did write this article but it is the best article to write about this common problem.
When opening an attachment directly from within Outlook you could get an error message saying that it can’t create the file and to that, you need to check the permissions on the folder you want to save it in. In most cases, the permissions on the folder aren’t the issue but the fact that the folder is “full”. When you open an attachment directly from within Outlook it will first save a copy to a subfolder of the Temporary Internet Files folder.
Cleaning out the folder will solve the issue.
Outlook Secure Temp folder
Unfortunately, this is easier said than done. The subfolder name Outlook creates (on the installation of Outlook) in the Temporary Internet Files folder is quite random.
In Outlook 2003 and previous, the name starts with OLK and is followed by up to 4 random numbers or letters. In Outlook 2007, 2010 and 2013, this folder is called Content. Outlook and then has a subfolder which is named with 8 random numbers and letters.
In addition, by default, you cannot simply browse to the folder to clean it out. Getting to the Temporary Outlook Folder can still be accomplished in 2 easy steps though.
Step 1: Locate the folder
The folder location is stored in the registry in the following key;
Add a CommentAn aspiring hardware hacker at Twilio has used his company’s own telephony APIs as well as Node.js and Arduino to build the charming robot you see in the clip above.
We just about overloaded on developer buzzwords there, so let’s back it up a bit.
The bot was built by Twilio developer evangelist Jonathan Gottfried, to whom we say, nice work, Jon! There’s no quicker way to developers’ hearts than showing them how to build and code a robot, and no better way to evangelize for your company’s software than by using it in a said robot in an actually interesting way. Twilio overlords, give this man a raise!
“Robots have fascinated me for as long as I can remember,” writes Gottfried on the company blog. He then proceeds to go into great, and we mean great, detail on how the bot was made “using Twilio, Arduino, Node.js, and the RN-XV WiFly module.”
The result is a robot you can control from your phone’s keypad. The post includes step-by-step images and lots of code snippets.
You might be asking, “Why, why in heaven’s name, would anyone use Node for such a task?” The Hacker News army asked the same thing, to which Gottfried replied, “It was the easiest way I found to set up a simultaneous HTTP server and TCP socket to the bot.”
In the HN thread, Gottfried also said, “The hardest part for me was getting the Wi-Fi module to work,” and, “It’s pretty fun to play with, honestly. Hasn’t tried to kill me yet….”