|
|
cool tip too! thanks
|
|
|
|
|
This sometimes works:
Open a CMD prompt as administrator
At the prompt type this:
netsh winsock reset
You'll need to restart after this.
|
|
|
|
|
I'll try tonight when I get home, thanks!
|
|
|
|
|
You installed dishonest software and then complained that things aren't working right?
Social Media - A platform that makes it easier for the crazies to find each other.
Everyone is born right handed. Only the strongest overcome it.
Fight for left-handed rights and hand equality.
|
|
|
|
|
We have a numbered directory for every project, set up automatically when the project is accepted. There is a standard subdirectory tree.
I am constantly finding project directories missing and eventually find them under another directory - someone has carelessly dragged and dropped them. I'm trying to find a solution to stop them (short of committing a major crime).
So far I have thought of changing permissions on the project directory so that only the Administrator can move them, and then changing permissions on all subdirectories so that they are not inherited but Everyone has RW rights.
This will be complicated to do, as staff must, on occasions, be able to create special purpose subdirectories and they will default to inheriting the folder properties.
Is there a better way to lock down directories but allow access to everything below them?
|
|
|
|
|
This is where you need to be using some sort of version control software/system.
By using version control, your directory structure and contents will be versioned which means that it will be easy to trace and restore when anything changes or moves.
I have seen others struggle with the same issue you are describing and they never came to a solution, however as soon as I started working in tightly version controlled environments what you describe was no longer an issue.
You could create one main repository or a repository for each second level directory - the only downside is that it will take a bit to educate people and set it up but it will allow you control and transparency over actions taken of individual files.
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
|
|
|
|
|
How many project directories are we talking about? Are these on a Windows Server?
Make each Project Directory a share that is mapped as a separate drive for each user, that will stop the top level directories bsing moved.
Subdirectories can still be faarrrkkkked, but you can use Share/NTFS permissions to limit what users can screw up.
Michael Martin
Australia
"I controlled my laughter and simple said "No,I am very busy,so I can't write any code for you". The moment they heard this all the smiling face turned into a sad looking face and one of them farted. So I had to leave the place as soon as possible."
- Mr.Prakash One Fine Saturday. 24/04/2004
|
|
|
|
|
The high-mucky-mucks want people to provide a PIN when printing. Binging (I don't like Googling) shows me how to do it on the desktop on a per-job basis, but we have like 400 printers in the network and they want every one of them to require the user to enter a pin at the printer before the job prints.
Semi-easy, right? But they don't want the user to set up a PIN for each job, they want them to have to use their SmartCard at the printer to kick off the job, i.e. it doesn't start until they are physically at the printer. (Basically, they'd have to "log in" via AD for the job to print.)
Is this possible to configure at the Print Server? Or will we have to configure each printer to require it (like it already does for scanning)?
|
|
|
|
|
Usually you make an inventory of what is possible, instead of making it up and checking if it is at all feasible.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Not in the Government!
|
|
|
|
|
We use a solution from Nuance (NSI) called Output Manager to achieve exactly this, for a similar number of MFPs. We optioned it as part of our MFP contract, it might be worthwhile talking to whomever handles the printer contracting to see if you have access to a tool like that as a part of the contract itself.
If you guys use Scan to Folder, you might already have a tool that can be configured for this purpose.
"Never attribute to malice that which can be explained by stupidity."
- Hanlon's Razor
|
|
|
|
|
I wish. I think they're crazy not to have the printers under contract, like every sensible organization in the world.
But NOooooo. Not contracted; just bought.
|
|
|
|
|
I'am a sysadmin beginner
I need to install some applications like Mailtrain , WordPress and Vtiger CRM.
I want to know :
What are all the services needed (apache ...)?
I want to use MySQL , Can all applications use the same mysql server ?
What is the best linux server that I need (ubuntu vps , other ...) ?
How to secure this new server and it's applications ?
Thanks
|
|
|
|
|
Wow.
Member 14292504 wrote: What are all the services needed (apache ...)?
So, for starters, basically any application that you install should provide a list of dependencies. Most distros will attempt to auto-resolve dependencies, but there might be some (such as your SQL instance or, as you mention httpd) that you want to directly manage.
Member 14292504 wrote: I want to use MySQL , Can all applications use the same mysql server ?
Yes, that's part of the point. The concern is partially capacity, but mostly utilization.
Member 14292504 wrote: What is the best linux server that I need (ubuntu vps , other ...) ?
I suggest CentOS for these purposes. Opinions will obviously vary.
Member 14292504 wrote: How to secure this new server and it's applications ?
I have a one week class that I teach that covers about 1/3 of what it could/should for DoD RMF security compliance for Linux. You're not going to get an adequate summary in a forum post.
But, this being the interwebs and knowing you're unlikely to buy a book:
Assign file/folder permissions based on Least Privilege
Password complexity via PAM Cracklib
Learn to use iptables or firewalld and close everything you aren't actively using
Lock down root, utilize sudoers, and require passwords for sudo
Don't switch SELinux to permissive; learn to use semanage instead
Get a real TLS cert and enforce strong standards (TLS 1.1+, AES256, etc)
Setup an update script with a post-update notification for systemctl --failed
Extra Credit:
If at all possible, containerize all apps
Use a jump box and limit ssh access to that box (no VNC or DM, that's for plebs)
Do not let apps run as root, segment permissions
Learn to leverage AIDE
Encrypted data partitions to avoid side-channel exfiltration
Backup strategy
Logs...dear god don't forget the logs...
By no means take this list as comprehensive; it's the baseline for what I'd consider a "security attentive" system that is exposed to the public internet today.
"Never attribute to malice that which can be explained by stupidity."
- Hanlon's Razor
|
|
|
|
|
Use should be using nginx on Ubuntu with iptables for security
|
|
|
|
|
How can we verify Email addresses before sending emails?. Generally we can verify email address through Email verify tools. But Im asking it should be done automatically through Mail server or smtp server means it should verify emails addresses automatically before sending email to them .which to avoid sending emails to junk and invalid and blacklisted ..
Please help me ASAP
|
|
|
|
|
There is no easy way to verify email addresses apart from the basic name@domain check. You could keep a list of known illegal domain names, but even that is not guaranteed.
|
|
|
|
|
teki parimala wrote: which to avoid sending emails to junk and invalid and blacklisted .. You can't, simply because you don't know whether I have blacklisted you in my email-app.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
you should already have list of illegal email domains. However you can check dkim records might be they will help you
|
|
|
|
|
I'm all Googled out on this one - the Win10 settings that are supposed to hide your tray icons don't work on my new machine. I can hide or show system icons, like the volume control, but application icons will not hide. No matter what I do, I can't get the system tray expansion area to appear.
Any one else had this and figured it out?
modified 21-Nov-18 19:28pm.
|
|
|
|
|
I assume you've checked that "Always show all icons in the notification area" is set to "Off"?
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Yes...it doesn't seem to matter what I set the visibility settings to, the only thing that makes a difference to the tray is the showing/hiding of system icons.
Does it depend on something else I wonder? I have all the 'extra' taskbar things turned off and/or uninstalled (toolbars, taskview, people, search, Cortana, OneDrive, all the system icons, bar volume), I'm also running Classic Shell and UltraMon with extra taskbars on my secondary monitors.
|
|
|
|
|
Kyudos wrote: UltraMon with extra taskbars on my secondary monitors. |
Why are you doing that? Win 10 provides a taskbar for every monitor already.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Hello all,
Introduction:
A customer has called me to help him with a computer that doesn't starts...
CA = Company A
CB = Company B
CC = Company C
CA has a computer from CB, CB has disappeared a long time ago... CA computer controls an expensive machine that's producing almost 24x7.
CA has contacted CC to repair the computer and CC have contacted me to help .
CA have no backups (This is Sparta!).
While booting, CA computer shows the windows 2000 logo and the progress bar grows but at a certain point the computer restarts... and this infinite loop continues once and again...
CC have found another computer from CB! That computer is not working well, but it's hard disk boots another copy of Windows 2000 embedded.
I want to help them as they can give me proper work in the future and they helped me starting my freelancing job...
Question 1:
I'm wondering if it would be worth trying to just copy all the system files from the booting windows hard disk into the non booting windows hard disk...
Question 2:
CB (the disappeared company) used to put safety measures to avoid the program to be copied into different computers, this usually includes storing a key into the registry and checking if that key is there or not...
In order to avoid this to explode, does any of you knows which files contain the registry in a windows 2000 embedded OS?
I would copy all the OS files except the ones containing the registry...
Question 3:
I don't have the administrator password, CB computers seem to log in automatically... but the recovery console ask that password...
What would you do in order to solve that boot problem?
PS: please refrain from recommending running as far as possible from the computer... I truly want to help them...
Thank you all for reading and sorry for this long post.
|
|
|
|