Another old meter to add to my collection. This Sencore FE160 meter was manufactured in 1973 and has aged quite well. I connected the meter to a wall outlet and it fired up and is working great! The only reconditioning was to give the exterior and interior a through cleaning.
When cleaning equipment I like to use as mild a cleaner as possible and work my way up to something stronger if necessary. I find automotive products to be very mild and since I’m always cleaning and polishing my cars I have many different types of cleaners at my disposal.
It would appear that more and more companies and home users are becoming victim to bad actors intruding on their network. Weather it be a targeted attack or drive by malware, network security is a hot topic in today’s IT landscape. In this article I will describe how you can build a low cost Honey Pot that can help alert you to an intrusion before its too late.
What is a Honey Pot?
In simple terms a Honey Pot is a device on your network that looks appetizing to a hacker. Like drawing a bear to a pot of honey. This device will advertise services that appear vulnerable and maybe draw an attacker in for further investigation. At a minimum it can simply be used as an internal “trip wire” to alert you someone poking around.
Why does a honey pot work?
I’m Joe hacker and I have just installed malware on one of your employees workstations. I have quickly gained access and I am now able to execute code and commands. What is the first thing I’m going to do? If you said start poking around you would be correct. After I look for anything of value on my host computer I will quickly begin scanning the subnet looking for hosts that are alive. I will also begin mapping the network for services that are possibly vulnerable to attack. This is where the Honey Pot fits in. It has been patiently siting on your network waiting for someone to direct a packet of data in its direction and alert you to possible trouble.
I am the proud owner of a new Dell 5290 2-in-1 laptop and its actually pretty cool. Touch screen, detachable keyboard and pen put together in a nice package for me to take my work on the go. Shortly after configuring the laptop and applying the latest Windows updates I notice the WiFi performance to be really poor. The laptop was almost unusable. My first thought was maybe the laptop chip-set was having an issue with my Ubiquity Access points, but this was NOT the case.
Why do I have poor WiFi performance?
I ran a speed test to see how bad the throughput was.
There have been numerous studies that sitting behind a desk all day is bad for your health. This must be true because my Apple Watch reminds me to stand up and walk around every hour like clock work. Therefore the Varidesk Pro Plus must be a good thing.
Seriously, I’m not sure if we need a study to tell us that sitting around all day like a couch potato is not good for you, just like we don’t need a study to tell us vaping and smoking is bad for your health too. With that said lately the trend in the office is to convert our conventional office space into standing office space as cost effective as possible. At first we were deploying these to staff that had back issues and doctors notes, but now we are pretty much giving them to anyone that asks.
Meet The Varidesk Pro Plus 30
We did a bit of research before purchasing our first stand up desk and found some cheap junk all the way up to very expensive electric desks with electric drive motors.
The desk we chose was the Varidesk Pro Plus 30. Its not the cheapest running about $325.00 on Amazon but I can say you do get a really nice sturdy desk for your money.
The desk arrives in an oversized box. You really should have a helper on hand to assist with the unboxing and setup.
I feel as if I have been a technology geek for as long as I can remember. I often wonder why as a child of the 80’s I gravitated toward electronics and not sports. I guess I would lay some of the blame on my father who seemed to push me toward electronics and would bring me all sorts of fun gadgets from Radio Shack.
Early Kits – Radio Shack Science Fair 160 in ONE
I have very fond memories of the Radio Shack Science Fair 160 in ONE Electronic Project Kit. As a kid I didn’t appreciate the components, but simply followed the instruction “cook” book and wired the circuits with the included jumpers. I can remember making a crystal radio, touch sensors, sound generators (or color organs as they were called) It wasn’t long before I started making my own creations.
As I got older, I noticed the kits had started to vanish from Radio Shack. In my late teens and early twenties I even worked at Radio Shack for a while and the kits were all but gone!
The latest hacker / email scam has been roaming the internet for a few months now. This one is pretty ingenious because it is more of a social email hack playing on your fears rather than an actual attack on your computer.
How does it play out?
An email arrives from you, yes your own email address. The subject of the email will be related to “Account Issue” , “Security Warning” or some variation. The email will further explain that you were hacked by an International Hacker Group and demand you pay $800 USD in bit coin in 48 hours or they will release video of you in a compromising position while watching porn! The hacker further tries to prove his legitimacy by providing you with your password.
The first time I saw this attack I was taken back for a moment because the password in the email was REAL. It was actually one of my “throwaway” passwords and kind of freaked me out.
Lets break the email down and see exactly what they did
I am one of the few on the planet that still hosts my own servers in house. Sorry, but I don’t really see the benefit of moving everything to the cloud when keeping it in house allows me the control and flexibility I want. I especially like having an Exchange OWA server in house.
With that said, hosting your own systems can be troublesome as well. Maintaining the hardware, infrastructure and security are items that would get farmed out in a cloud environment. This post focuses on the security end, or rather attempting to track hack attempts.
In January, I sent up a trigger to alert me every time a user is locked out. -> Know instantly when a user is locked out<- Its a good read if you’re interested. This trigger reads the event logs, looks for the lockout event and sends the info to me via email. A great help in being proactive with my users. It also alerts me to hack attempts. Too many incorrect login attempts on OWA would trigger a lockout event. During a recent weekend, I was receiving lockout emails every 30 minutes. So who was doing this? What did they want?
Every year I try to pick out that unique Fathers Day gift that your Dad can use and probably will find interesting and fun. Lord knows Dad has plenty of aftershave, cologne, and wine. This year I am recommending the Serafim Keybo.
I have not seen this error before and there were no other users in the environment experiencing this issue. My first troubleshooting step was to see if there were any unique applications that were specific to this user.
This particular user is the CFO of the company and logs into a number of banking websites. To enhance security many banks force customers to download additional software to supplement logins in order to prevent intrusion and hack attempts. This user was using a product from IBM