Yes, Black People are in Information Technology (I.T.). the world.
I have always had an interest in Computers
I am a person of color at am a Systems/Network Administration, current working for Vulcans Logic Networks Enterprise, Inc.
This Website is focused on learning about computers, computer systems, and networks, as well as a computer system and network security. This website and blog is a place for me to post my notes, research, and tips for Information technology, computer programming, computer operations, computer science and hacking; and anything else technology related blog. It only to provide help and information.
I have been working in I.T. for 15 years and I don’t know everything. Like martial arts (I am also a Martial Artist), your skills as a Systems & Network only get better over time and with content practice and training. This is about the art and training of the I.T. Professional.
This website and blog is a place for me to post my notes, research, and tips for Information technology, computer programming, computer operations, computer science and hacking; and anything else technology related blog. It only to provide help and information.
I recently started working for a friend part-time, who uses best practices in his IT management services business, the month has been a reminder of what I learned when I got into the IT industry and it has also been an eye-opener to how lazy I have gotten over the last 13 years, because I have been working for people who were doing things wrong.
This website and blog are about me retraining myself and the continued growth in the area of computer systems and networks.
I found this list of default passwords used in routers the may help you taking control of systems and networking equipment from another admin I lot of system and network admins are either too busy or lazy to change the default logins to there devices (sometimes they can’t). Please, change your default passwords if you can.
CISCO Router Password List
BBSM 5.0 and 5.1
BBSD MSDE Client 5.0 and 5.1
BBSM Administrator 5.0 and 5.1
Netranger/secure IDS 3.0(5)S17
BBSM MSDE Administrator 5.0 and 5.1
Catalyst 4000/5000/6000 All
VPN Concentrator 3000 series 3
Ciso Aironet 1100 series Rev. 01
Cisco Wireless Location Appliance 2700 Series prior to 184.108.40.206
2 + last 4 of Audio Server chasis Serial case-sensitive + 561384
Recently, I have seen this a lot in windows environments; my follow windows admins try to solution DNS issues by putting their domain controllers in the environment in the forwarders tab.
The forwarders tab is for non-authoritative requests or queries for external addresses. Now in truth, I am simplifying this article. This really about a very basic domain or domains.
The are many types of forwarders, this config is just external DNS look-up. When end-users generally talk about the internet being slow, it is usually base the DNS servers by the ISP is slow and overload with a request.
This is the config I use for my dc’s forwarders in AD has saved a lot of headaches and complains about slow internet.
I hope it is helpful.
Forwarders should only really be used for external DNS lookup and if the root server is an unavailable and/or non-authoritative request.
I will do another article about network congestion.
I did write this article but it is the best article to write about this common problem.
When opening an attachment directly from within Outlook you could get an error message saying that it can’t create the file and to that, you need to check the permissions on the folder you want to save it in. In most cases, the permissions on the folder aren’t the issue but the fact that the folder is “full”. When you open an attachment directly from within Outlook it will first save a copy to a subfolder of the Temporary Internet Files folder.
Cleaning out the folder will solve the issue.
Outlook Secure Temp folder
Unfortunately, this is easier said than done. The subfolder name Outlook creates (on the installation of Outlook) in the Temporary Internet Files folder is quite random.
In Outlook 2003 and previous, the name starts with OLK and is followed by up to 4 random numbers or letters. In Outlook 2007, 2010 and 2013, this folder is called Content. Outlook and then has a subfolder which is named with 8 random numbers and letters.
In addition, by default, you cannot simply browse to the folder to clean it out. Getting to the Temporary Outlook Folder can still be accomplished in 2 easy steps though.
Step 1: Locate the folder
The folder location is stored in the registry in the following key;
Add a CommentAn aspiring hardware hacker at Twilio has used his company’s own telephony APIs as well as Node.js and Arduino to build the charming robot you see in the clip above.
We just about overloaded on developer buzzwords there, so let’s back it up a bit.
The bot was built by Twilio developer evangelist Jonathan Gottfried, to whom we say, nice work, Jon! There’s no quicker way to developers’ hearts than showing them how to build and code a robot, and no better way to evangelize for your company’s software than by using it in a said robot in an actually interesting way. Twilio overlords, give this man a raise!
“Robots have fascinated me for as long as I can remember,” writes Gottfried on the company blog. He then proceeds to go into great, and we mean great, detail on how the bot was made “using Twilio, Arduino, Node.js, and the RN-XV WiFly module.”
The result is a robot you can control from your phone’s keypad. The post includes step-by-step images and lots of code snippets.
You might be asking, “Why, why in heaven’s name, would anyone use Node for such a task?” The Hacker News army asked the same thing, to which Gottfried replied, “It was the easiest way I found to set up a simultaneous HTTP server and TCP socket to the bot.”
In the HN thread, Gottfried also said, “The hardest part for me was getting the Wi-Fi module to work,” and, “It’s pretty fun to play with, honestly. Hasn’t tried to kill me yet….”
Popular web hosting management software, Plesk Panel, is under attack, being used as a point of entry to compromise websites.
The software, created by virtualization and automation firm Parallels, has been targeted in the past, using a vulnerability in Plesk that allowed hackers to remotely compromise the Plesk server. This vulnerability affected versions 7.x, 8.x, 9.x and 10.0 to 10.3.1 of Plesk. When it closed the hole, Parallels recommended that administrators reset the passwords of all users.
Although the fix was put in place in February this year, Plesk users believe that the hackers who compromised user sites at that time, appear to have returned. They have voiced theories on Parallels’ own forums, suggesting that hackers harvested data from Plesk while it was vulnerable and then took advantage of admins or users not resetting passwords, following the hack. This would explain why admins who updated Plesk and were meant to be secure, are seemingly being compromised by an old vulnerability.
ZDNet Australia contacted Parallels over the claims of a zero-day exploit in the wild, but the firm had not responded at the time of writing.
Regardless, Plesk is definitely attracting attention from hackers. There is now a large surge in unsolicited port scans that are looking for Plesk installations, according to data from the SANS Internet Storm Centre and as noted by Sucuri Malware Lab’s Daniel Cid, during an interview with SC Magazine. Cid said that there are more than 50,000 websites compromised, as part of a hacking campaign.
Yesterday, there were reports of attacks using WordPress and other plug-ins to compromise sites, however, from Cid’s later discussions with Krebs, the common factor among all of the compromised sites appears to actually be Plesk, meaning users don’t have to be running content management systems like WordPress to become a victim.
Well, I going to start to finally use this blog; most likely as a journal and to post stuff learned at work. So let’s get started. I didn’t write this article, it was written May 11, 2012, by Joseph Hanna. This is a common problem that has a popped up with my end users and clients using Microsoft Outlook especially from using Google Apps as the email provider.
Otaku IT Guy!
Having many folders with many messages in Microsoft Outlook, especially if they have attachments, can be slow. This issue is because Microsoft Outlook downloads all messages every time including attachments versus a normal email IMAP application where only headers are synced to present crucial information only, and messages and attachments are ONLY downloaded and cached upon viewing the message or if the mail application is explicitly told to download all messages. Remedy this situation as follows:
After setting up your IMAP email account in outlook, right click on your email account and select “IMAP Folders…”
Click on the “Subscribed” tab and click the “Query” button.
Select all items in the list as follow:
Select the first item in the list and scroll all the way down.
Hold shift and click the last item in the list.
Click the “Unsubscribe” button.
It may prompt about folders that cannot be unsubscribed, just click “OK” here.
Select the “All” tab as we are now going to sync folders we wish or need to sync.
Select “Drafts” and click subscribe.
Select “Inbox” and click subscribe.
Select “Junk” and click subscribe.
Select “Sent” and click subscribe.
Select “Templates” and click subscribe.
Select “Trash” and click subscribe.
Do this for any other folders you wish to sync with the server.
Uncheck the option “When displaying hierarchy in Outlook, show only subscribed folders.” at the bottom of the window.
Click “OK” to close the window and commit the options.
This will resolve extremely slow synchronizations with Microsoft Outlook platforms. This issue can still be noticed if you have a very large Inbox folder, Sent folder, Trash folder, or any subscribed folder. The recommended method of avoiding this outlook issue is to simply file away messages from these subscribed folders into archived/unsubscribed folders (this also keeps your email organized!). Also, you can simply archive messages in outlook to clean them out of your mailbox (be careful as this WILL remove the messages from the server). Lastly, be sure to empty the Trash folder frequently enough to avoid a constantly growing Trash folder.