I have not seen this error before and there were no other users in the environment experiencing this issue. My first troubleshooting step was to see if there were any unique applications that were specific to this user.
This particular user is the CFO of the company and logs into a number of banking websites. To enhance security many banks force customers to download additional software to supplement logins in order to prevent intrusion and hack attempts. This user was using a product from IBM
It’s been a while since I have written a blog posting. I guess you can say life sometimes gets in the way and things we enjoy doing get pushed aside. I have a few spare moments today to sit down and write so here goes nothing.
First and foremost Webcommand blog has just turned ONE! I started writing exactly one year ago today. When I built this server I was setting a goal to write 5 blog posts a week about 260 in a year. Well I realized its harder to come up with content then I thought. I also realized it is even harder to monetize the site as well (your donations are welcome) However I did manage to write 100 blog posts in the first year and I deem that a success!
Today on the anniversary of Webcommands birth and 100th post I would like to pay tribute to my favorite blogs and give each of them a brief shout out.
Cleaning out the basement yet again I stumbled on an old 20″ iMac. By today’s standards this thing is a huge piece of junk. 250GB hard drive, 1GB RAM, Core 2 processor. At 11 years old its better suited as a boat anchor then a functional computer. However the standard equipment iMac Keyboard does function as a blue tooth keyboard and can be used with other devices.
I happen to like the iMac keyboard, it feels a little small at first, however once you get accustomed to the feel it makes a great companion to any device.
The keyboard is relatively easy to pair to your device if you follow these simple steps.
I found this USB key to my heart while surfing the Internet the other day and thought it was a very unique item. A fun loving gesture to tell that special geek in your life how much you care about them.
Malware and viruses are always just a wrong click away, and to keep yourself protected you need to be on top of the latest trends that are targeting home and business users. This past month I have been noticing an increase in PDF attachment attacks around the office. As with previous email based attacks this is simply the latest attempt to infiltrate your network security by using the weakest link. YOU! Yes, in my opinion humans are the most vulnerable vector to attack and successfully enter a network.
How the latest PDF Phishing scam works.
A friend, coworker or client has already been infected with malware. At this point the attacker has taken control over their system and would like to spread his virus via email. The malware quickly enumerates the victims address book and fires off emails to unsuspecting targets with the viral payload attached as a PDF document. As the recipient you open the PDF, jump through a few hoops and the attacker now has control of your computer as well as your email credentials and more.
How to spot a bogus attachment, and prevent infection.
Well folks here’s another retro gaming platform revitalized into a mini computer. The C=64 was and still is my all time favorite platform and this Mini version may be on my purchase list once its released in March. First we saw the NES Classic Editionhit stores before Christmas 2016 and it was an immediate sell out, followed by the Super NES was released last year for $199.99 at Amazon The next logical step was to release the Commodore 64 Mini!
Commodore 64 Mini – will be released with 64 games!
Laptops and Notebook computers cost a fraction of what they did years ago. A decent general purpose laptop can be had today for around $500. However as time marches on our older computers can begin to feel slower due to more resource demanding applications and operating systems.
Maybe its not time to toss out that used laptop! With some easy modifications you can spruce up your laptop and get a few more years of good service life out of it.
One of the dreaded jobs of the Sys. Admin is getting the call, I’m locked out. Its the same call every time:”I don’t know what happened, I’m just locked out.” You say something to the effect of, “Did you forget your password? Did you type it in wrong? Caps lock on?” No matter what the case wouldn’t it be nice to know a user was locked out before they called you. Plus it would be great to know if someone was hacking away internally or externally at your network.
In an effort to combat the Specter/Meltdown vulnerability Microsoft has rushed a few patches out into the wild that have been creating some odd issues on workstations and servers alike. I want to address the Unspecified Error when attempting to shadow a session in Remote Desktop 2012r2.
This is what happens when you rush a patch into the wild:
During my college days I worked in Radio Shack part time to help pay the bills. Its unfortunate Radio Shack has gone extinct, however when you are unable to adapt to the changes in the market only the strong will survive. During my career at The Shack one of the products that fascinated me was the police scanner. I spent hours behind the counter dialing up different frequencies and listing to calls all over New York City.
It was the dawn of the digital tuner age where a listener could punch up a frequency for police or fire and be right in the action. 476.3875 – BOOM.. you’re listening to NYPD! 482.04375 – Fire dispatch on the air! A few more clicks of the keypad and 482.2437 EMS is coming in loud and clear