It’s been a while since I have written a blog posting. I guess you can say life sometimes gets in the way and things we enjoy doing get pushed aside. I have a few spare moments today to sit down and write so here goes nothing.
First and foremost Webcommand blog has just turned ONE! I started writing exactly one year ago today. When I built this server I was setting a goal to write 5 blog posts a week about 260 in a year. Well I realized its harder to come up with content then I thought. I also realized it is even harder to monetize the site as well (your donations are welcome) However I did manage to write 100 blog posts in the first year and I deem that a success!
Today on the anniversary of Webcommands birth and 100th post I would like to pay tribute to my favorite blogs and give each of them a brief shout out.
Coming soon in another post I’m going to detail how I made a home surveillance system using a few Pi Zero’s, MotioneyeOS and some odds and ends around the house. The system is partially up and running with one camera on the house since the beginning of January and I have already captured a few interesting clips.
This particular one is of an ass hat making a k-turn in my driveway, driving over my lawn and then proceeding to run down my trash.
Cleaning out the basement yet again I stumbled on an old 20″ iMac. By today’s standards this thing is a huge piece of junk. 250GB hard drive, 1GB RAM, Core 2 processor. At 11 years old its better suited as a boat anchor then a functional computer. However the standard equipment iMac Keyboard does function as a blue tooth keyboard and can be used with other devices.
I happen to like the iMac keyboard, it feels a little small at first, however once you get accustomed to the feel it makes a great companion to any device.
The keyboard is relatively easy to pair to your device if you follow these simple steps.
As a company grows it forgets how to deal with its two most important assets. The first being the customer and second its employees. In a mom & pop scenario the principals of the business can deal directly with their customers and empower their employees to do the same in their absence. However at large Brick & Mortar corporate stores many employees and even local store managers are unable to effectively help their customers.
My recent Brick & Mortar Experience.
My Kenmore clothes dryer of 19 years is on its last leg, and as much as I would love to do a “weekend project” blog posting on repairing it, I’m afraid its just not worth the time or money. I headed out to purchase a new unit.
First Stop – Brick & Mortar Sears
I know Kenmore (like most of the appliance brands today) are just name plates, however since I had good luck with the last one I figured I would be brand loyal. My Wife and I strolled around the appliance center in our local sears and found a Kenmore 8.8 Cu ft dryer that looked like it would do the job. A sale associate approached and we began the purchase process. Continue reading “Why Brick & Mortar stores are suffering.”
I found this USB key to my heart while surfing the Internet the other day and thought it was a very unique item. A fun loving gesture to tell that special geek in your life how much you care about them.
Malware and viruses are always just a wrong click away, and to keep yourself protected you need to be on top of the latest trends that are targeting home and business users. This past month I have been noticing an increase in PDF attachment attacks around the office. As with previous email based attacks this is simply the latest attempt to infiltrate your network security by using the weakest link. YOU! Yes, in my opinion humans are the most vulnerable vector to attack and successfully enter a network.
How the latest PDF Phishing scam works.
A friend, coworker or client has already been infected with malware. At this point the attacker has taken control over their system and would like to spread his virus via email. The malware quickly enumerates the victims address book and fires off emails to unsuspecting targets with the viral payload attached as a PDF document. As the recipient you open the PDF, jump through a few hoops and the attacker now has control of your computer as well as your email credentials and more.
How to spot a bogus attachment, and prevent infection.
Well folks here’s another retro gaming platform revitalized into a mini computer. The C=64 was and still is my all time favorite platform and this Mini version may be on my purchase list once its released in March. First we saw the NES Classic Editionhit stores before Christmas 2016 and it was an immediate sell out, followed by the Super NES was released last year for $199.99 at Amazon The next logical step was to release the Commodore 64 Mini!
Commodore 64 Mini – will be released with 64 games!
Laptops and Notebook computers cost a fraction of what they did years ago. A decent general purpose laptop can be had today for around $500. However as time marches on our older computers can begin to feel slower due to more resource demanding applications and operating systems.
Maybe its not time to toss out that used laptop! With some easy modifications you can spruce up your laptop and get a few more years of good service life out of it.
One of the dreaded jobs of the Sys. Admin is getting the call, I’m locked out. Its the same call every time:”I don’t know what happened, I’m just locked out.” You say something to the effect of, “Did you forget your password? Did you type it in wrong? Caps lock on?” No matter what the case wouldn’t it be nice to know a user was locked out before they called you. Plus it would be great to know if someone was hacking away internally or externally at your network.
In an effort to combat the Specter/Meltdown vulnerability Microsoft has rushed a few patches out into the wild that have been creating some odd issues on workstations and servers alike. I want to address the Unspecified Error when attempting to shadow a session in Remote Desktop 2012r2.
This is what happens when you rush a patch into the wild: