It would appear that more and more companies and home users are becoming victim to bad actors intruding on their network. Weather it be a targeted attack or drive by malware, network security is a hot topic in today’s IT landscape. In this article I will describe how you can build a low cost Honey Pot that can help alert you to an intrusion before its too late.
What is a Honey Pot?
In simple terms a Honey Pot is a device on your network that looks appetizing to a hacker. Like drawing a bear to a pot of honey. This device will advertise services that appear vulnerable and maybe draw an attacker in for further investigation. At a minimum it can simply be used as an internal “trip wire” to alert you someone poking around.
Why does a honey pot work?
I’m Joe hacker and I have just installed malware on one of your employees workstations. I have quickly gained access and I am now able to execute code and commands. What is the first thing I’m going to do? If you said start poking around you would be correct. After I look for anything of value on my host computer I will quickly begin scanning the subnet looking for hosts that are alive. I will also begin mapping the network for services that are possibly vulnerable to attack. This is where the Honey Pot fits in. It has been patiently siting on your network waiting for someone to direct a packet of data in its direction and alert you to possible trouble.
I’m in! How much does a honey pot cost?
Continue reading “Protect Your Internal Network With A LOW COST Honey Pot”
I am the proud owner of a new Dell 5290 2-in-1 laptop and its actually pretty cool. Touch screen, detachable keyboard and pen put together in a nice package for me to take my work on the go. Shortly after configuring the laptop and applying the latest Windows updates I notice the WiFi performance to be really poor. The laptop was almost unusable. My first thought was maybe the laptop chip-set was having an issue with my Ubiquity Access points, but this was NOT the case.
Why do I have poor WiFi performance?
I ran a speed test to see how bad the throughput was.
As you can see from the image above the download speed is less than 1Mbps while the upload speed is close to 100Mbs. What is going on here and how do I fix this? Continue reading “Help My Laptop Has Really Poor WiFi Performance!”
I have been working with youth hockey teams for about 15 years now. Both my boys play ice hockey on multiple teams, and I have been volunteering as team manager for all of them. Part of the managers job is to keep score and supply rosters to the home and away score keeper. Its a huge pain to write in each players name on game day so I generally like to make a score sheet sticker. It simplifies the process and makes the sheet nice and neat.
Which stickers labels work best?
We have a great example of a youth hockey score sheet above showing both teams using 2×4 stickers. From what I have seen there are many organizations using this format for paper score keeping. Continue reading “Best stickers / labels for youth hockey score sheets!”
I feel as if I have been a technology geek for as long as I can remember. I often wonder why as a child of the 80’s I gravitated toward electronics and not sports. I guess I would lay some of the blame on my father who seemed to push me toward electronics and would bring me all sorts of fun gadgets from Radio Shack.
Early Kits – Radio Shack Science Fair 160 in ONE
I have very fond memories of the Radio Shack Science Fair 160 in ONE Electronic Project Kit. As a kid I didn’t appreciate the components, but simply followed the instruction “cook” book and wired the circuits with the included jumpers. I can remember making a crystal radio, touch sensors, sound generators (or color organs as they were called) It wasn’t long before I started making my own creations.
As I got older, I noticed the kits had started to vanish from Radio Shack. In my late teens and early twenties I even worked at Radio Shack for a while and the kits were all but gone!
30 Years later and WOW – These kits are amazing!
Continue reading “Yesterday Radio Shack Electronics Project Kit – Today Elegoo on Amazon”
In the office we use a SonicWall to allow remote VPN users to access local resources. For the most part it works great, allowing access to our Outlook / Exchange server, mapped drives and other important network resources.
Recently I upgraded the SonicWall to a new device and recreated the rules from scratch (rather than roll old stuff over) a few days after the upgrade SonicWall users started to experience this odd error message:
ODD OUTLOOK ERROR MESSAGE:
Outlook cannot log on. Verify you are connected to
the network and are using the proper server and mailbox name.
The Mailbox Exchange information server in your profile
is missing required information.
Modify your profile to ensure that you are using the
correct Microsoft Exchange information service.
At first I thought the users profile had just gone corrupt, so I deleted the Outlook profile and just recreated it and all was well in the world. However next time that particular user took their laptop out of the office the message eventually returned. I was able to put two and two together and figured it had to do with something the VPN tunnel on the sonicwall was doing to cause this issue.
Continue reading “Outlook cannot log on. Verify you are connected to the network and are using the proper server and mailbox name”
I am one of the few on the planet that still hosts my own servers in house. Sorry, but I don’t really see the benefit of moving everything to the cloud when keeping it in house allows me the control and flexibility I want. I especially like having an Exchange OWA server in house.
With that said, hosting your own systems can be troublesome as well. Maintaining the hardware, infrastructure and security are items that would get farmed out in a cloud environment. This post focuses on the security end, or rather attempting to track hack attempts.
In January, I sent up a trigger to alert me every time a user is locked out. -> Know instantly when a user is locked out <- Its a good read if you’re interested. This trigger reads the event logs, looks for the lockout event and sends the info to me via email. A great help in being proactive with my users. It also alerts me to hack attempts. Too many incorrect login attempts on OWA would trigger a lockout event. During a recent weekend, I was receiving lockout emails every 30 minutes. So who was doing this? What did they want?
How to check Exchange OWA IIS logs
Continue reading “Who’s Hacking My Exchange OWA? Check with Log Parser 2.2”
As an IT professional for over 20 years I have run into a lot of strange errors in my time. I also have an extensive home “production” lab so I can stay up to date on changes in tech and its fun! Recently I installed Exchange 2016 in a Hyper-V virtual machine. It was a simple migration from 2013. I was in the process of decommissioning an older Hyper-V host. Some of my guest vm’s were migrated while others were built from scratch.
I had completed my migration and Exchange, OWA, & ECP were working just fine. About a month later I tried to access the ECP and was greeted with a 500 Error!
Tracking Down The Error
Continue reading “Exchange 2016 – ECP ERROR 500 – OWA Working Fine!”
Welcome to part two of my post. Previously I spoke about building a security system using a Raspberry Pi Zero and MotioneyeOS. (Read Here) I built and installed the system in February and it was working great. I even caught some Ass-Hat driving over my lawn and trash (Read Here). I ran into one issue with this system. Once Summer was here and the outside temperatures hit 90° (32°c) The processor temperature of the Pi Zero was topping 161° (72°C) and lack of cooling was causing my Pi Zeros to crash
According to the Raspberry Pi foundation the boards are specked to approach 80°C but mine were failing in the mid 70’s. So now to work on a solution.
How to cool your outdoor Motioneye camera
My first attempt was an obvious one – Paint the camera white.
The waterproof boxes I was using to house the camera had a clear cover. To reduce the amount of sunlight, I simply painted the box white
Painting the box was helpful and kept the system cooler , but it still wasn’t enough. The next step was to vent the box simply by drilling a few small holes at the bottom. I know this compromises my “waterproof” concept, but I am hedging my bets if any rain water was to enter the box, it would remain at the bottom and not touch the electronics.
Still not good enough! I want to add a fan, but I only want the fan to run when the CPU hits a specific temperature. There is no need to run the fan on cool nights or during the winter. So I decided to use the GPIO pins on the PI Zero to control the fan.
Controlling the cooling fan via GPIO pins
- 5 Volt cooling fan
- 1 NPN Transistor
- 1 1KΩ Resistor (or equivalent)
- Small breadboard
- Soldering iron / solder
How to assemble
Its probably not a good idea to connect a fan directly to one of the GPIO pins, so I used a simple transistor and resistor to help limit the current being drawn via the pin
Continue reading “Cooling your Motioneye Pi Zero Security Camera”
I had a user this week call me complaining that Microsoft Edge would freeze on launch and then crash and close. After investigating her event logs it was determined the faulting module was emodel.dll
Faulting application name: MicrosoftEdge.exe, version: 11.0.16299.371, time stamp: 0x5abdaed4
Faulting module name: EMODEL.dll, version: 11.0.16299.371, time stamp: 0x5abdaf79
Exception code: 0xc0000409
Fault offset: 0x000000000018bcae
Faulting process id: 0x2900
Faulting application start time: 0x01d3e794d12ebc95
Faulting application path: C:\WINDOWS\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
Faulting module path: C:\WINDOWS\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EMODEL.dll
Report Id: 560abf0f-e6c8-4b45-8b96-d448f9aa934d
Faulting package full name: Microsoft.MicrosoftEdge_41.16299.371.0_neutral__8wekyb3d8bbwe
Faulting package-relative application ID: MicrosoftEdge
I have not seen this error before and there were no other users in the environment experiencing this issue. My first troubleshooting step was to see if there were any unique applications that were specific to this user.
This particular user is the CFO of the company and logs into a number of banking websites. To enhance security many banks force customers to download additional software to supplement logins in order to prevent intrusion and hack attempts. This user was using a product from IBM
IBM Trusteer Rapport & Microsoft Edge EMODEL.DLL
Continue reading “Microsoft Edge Crashes On Launch – Faulting Module EMODEL.DLL”
Laptops and Notebook computers cost a fraction of what they did years ago. A decent general purpose laptop can be had today for around $500. However as time marches on our older computers can begin to feel slower due to more resource demanding applications and operating systems.
Maybe its not time to toss out that used laptop! With some easy modifications you can spruce up your laptop and get a few more years of good service life out of it.
Add a Solid State Hard Drive – SSD
Continue reading “Spruce up your laptop with SSD”