Great tools, easy to use
Great tools, easy to use
********* ENGLISH VERSION *************
We would like to sensitize you on basic rules when you are receiving emails. It is important to understand that even if there is currently security rules in place, it is possible that infected emails arrive in your mailbox. People that will create that type of harmful email will use all sort of strategy to bypass security rules.
A recent study from Wikipedia on harmful software’s categorised as ( Ransomware ) in November 2012
( Mcafee provider of antivirus softwares , reports to have recorded over 120 000 new variations for this type of virus in 2012. Four times more then the year before )
Here is some basic rules you should consider:
1: If you are being contacted by mail and being asked for personal information , Call the company to be sure that it is legitimate or delete the email.
2: Even If it is easy to detect a fraudulent character of some emails, other mail appear to be from a valid and reliable online address. Do not trust the name and address listed in the “From” field, since it can be easily modified.
3: Never provide personal information that would have been asked in an unsolicited mail, even if the site to which you are redirected seems legit . Check with the company requesting the information before filling personal information online
4: Beware of email being sent asking you to make a payment in profit of banking companies
5: Before providing banking information like MasterCard or visa credit card numbers, be sure that you have proper online security requirement like the ( padlock ) before the fully qualified internet address.
6: Send back an email to any persons who you think could have sent you a weird ( attachments ) to be sure it is legit. If the email comes back to you immediately, delete it !
7: Beware of very short emails asking you to open the current attachment. Often you will never have asked for information about the email
8: Classic cases where people are being caught.
( Here is your bill ! you are being asked to make a payment from a company you don’t even know )
( Your Purolator or Fedex order has arrived )
( Here is my C.V. for a job )
( A list of product that could be sold to your company )
Beware of double extensions in attachments ( .pdf.exe – .doc.bat )
Beware of the following extensions ( .zip – .exe – .com – .bat – .vbs – .rar )
The intention of the people behind this type of email is to get you to open it without questioning yourself !!!
Best protection will be your judgement and vigilance
For more details:
********************** VERSION FRANÇAISE *******************************
Nous aimerions vous sensibiliser aux règles de base lorsque vous recevez des courriels afin d’éviter des ennuis. Il est important de comprendre que malgré toutes les règles de sécurités mises en place, il est toutefois possible que des courriels indésirables arrivent dans votre boite de courriel. Les personnes qui créer ce type de courriel utilise toutes sortent de façon de contourner les règles de sécurités.
Une petite statistique qui vient de Wikipédia sur des logiciels de Type « RansomWare »:
En novembre 2012, « McAfee, l’éditeur de logiciels de sécurité, rapporte avoir enregistré 120 000 nouveaux échantillons de ce genre de virus au deuxième trimestre 2012, soit quatre fois plus qu’à la même période l’année d’avant. »
Voici quelques règles à tenir compte :
o Des cas très classiques de sujet que les gens se font attrapés :
o Voici votre Facture et vous ne connaissez même pas la personne qui vous l’envoie.
o Votre livraison Fedex ou Puro est arrivée
o Voici mon C.V. pour l’emploi
o Liste de produit à vous vendre
L’intention des gens derrière ce type de courriel est de vous inciter à l’ouvrir sans vous questionner!!
La meilleure protection reste votre jugement et soyez vigilant.
Pour plus de détails :
When you boot your Linux Box and your mysqld doesn’t start auto, you try manually and you receive this error : Another MySQL daemon already running with the same unix socket.
Do this : (Root Account)
mv /var/lib/mysql/mysql.sock /var/lib/mysql/mysql.sock.bak
service mysqld start
I found when I recovered a VMs with Veeam version 8 update 2, the Nic card was not showing. This is related to the change of the MAC Address.
You need to ensure in this file :
You have only one ETH0 and also the MAC ADDRESS in this file, matches the MAC address of your NIC Card in the VMware Properties!
After to ensure your NIC configuration follow update you MAC address inside this file also.
Great feature, but required a QNAP with Intel CPU !
Great product :
With the newer sonicwall 5.9+ os, there’s minor differences when you setup the SSL VPN from previous OS.
Not so tricky, but, when I try to login from a windows 8.1 machine I face an SSL error with the self signed ?
please make sure the server has valid certificate …
You need to change the following settings :
SSL VPN -> Server Settings -> Check Enable Server Cipher Preferences -> Select : 3DES_SHA1.
Reconnect and work….. Cheers..
FYI on the Mac the connection was working with the default settings.
I’m using VMware for now nearly 10 years. I heard a lot of nice feature of Hyper-V. Now I will jump into it and share some discovery.
First, I’m Vmware, so I want to have Hyper-V run on my VMware workstation. Thanks to another tech – blogger, (I will not take the credit)
Also I wanted to create template, but I don’t have System Center Virtual Machine Manager (VMM).
First read it’s always “Best Practices”
Stay tune, all tips I found I will share.
You have a french OS, all in french, you download SQL Server in French, you start the setup and you face this error :
This SQL Server setup media does not support the language of the OS, or does not have the SQL Server English-language version installation files. Use the matching language-specific SQL Server media; or install both the language specific MUI and change the format and system locales through the regional settings in the control panel.
Don’t panic, you check all your regional settings, your in French (Canada)…. Why it’s not working….. I don’t know, but change all your regional settings to French (France). Start the setup, install and enjoy.
Put back your regional setting back to french canada after the setup.
If you want to have a workstation with (Linux or Mac) to SSH into a server without a passphrase, this is how you can do it.
On your workstation generate a “key” with ssh-keygen
This will create a id_rsa and id_rsa.pub under your home dir/.ssh
mac : /Users/your_account/.ssh/
linux : /home/your_account/.ssh/
id_rsa : this is your private key, you keep it safe on your machine!!
id_rsa.pub : this is the key you copy to each server you want to authenticate without a password.
Copy the id_rsa.pub to the server, you can use scp for that
scp /Users/your_account/.ssh/id_rsa.pub email@example.com:/root/.ssh/id_rsa_youraccount.pub
WARNING : the id_rsa.pub must be copy under the account you want to authenticate on the server. So if normally on your server you log in as root (not recommend), you will copy the id_rsa.pub under the root.
WARNING2 : I strongly suggest you rename the id_rsa.pub on the target for id_rsa_youraccount.pub because a file can already exist and might be overwritten.
Now. The id_rsa_youraccount.pub is on the server.
SSH to the server (yes with your credential, for the last time ;))
You need to import your key into a special file called authorized_keys
with the scp command I copied the file into the root.
now import the id_rsa_youraccount.pub into the authorized_keys
cat id_rsa_youraccount.pub >> authorized_keys
Quit your current ssh.
Retry ssh with :
No password should be asked.