Unfortunately, not only is the option considered experimental, but the Ultra VNC documentation on how to “Send Custom Keys” is less than ideal, and remembering the decimal equivalent of each key on the keyboard is simply not an option for me. I currently have no want or need to know this information by heart, so I’m not even going to attempt to do so. So, when desperate times call for desperate measures, it’s time to start thinking on your feet and stop pouting like a little man-girl, you’ve still got options.
Luckily, if your running any newer version of Windows (I guess if you want to call it luck), you’re a slug-headed loser douche extraordinaire (present company included, I just wish the Linux desktop environments weren’t so damn slow) that doesn’t care about his or her right to computer privacy…Wait, I mean, luckily, you can use the On-Screen Keyboard as a workaround for this and you can send whatever custom key combinations you need. View Post
There are hundreds of articles on this subject, so I’m not going to spend any time on this. This is just for my own personal reference in the future.
Navigate to the following registry key:
Create/Edit the following keys as string values:
Find the key “AutoAdminLogon” and set the value to “1”.
I needed a way to track which Exchange users were remotely retrieving their emails outside of the office on their phones and other email clients, so I pieced together this batch/pseudo VB script that can be ran from the Windows Task Scheduler at midnight. The only dependency/third party app required is the MS Log Parser executable. Also, for the SQL query to filter out the proper internal networks from the log file, you will have to edit the LOCALSUBNET and CHARLENGTH variables.
This post is just for my own personal reference, but you can use it too if you like. Just make sure to change the “UserName” below to whatever that user’s home directory is. I’ve mashed the code together from the following sources, changed it to export in csv format (making it easier to import into Excel or Open Office for further manipulation), made it into a one-liner for sake of ease, put the data in ascending order based on last URL visit date, and converted the dates into human readable format. View Post
Sure there are several legitmate cases where the HP Support Assistant can be helpful, such as updating drivers or flashing the BIOS on the computer, but if you’re reading this, you’ve probably already established the fact that the software basically hijacks your computer and does a lot of shady shit in the background. I would absolutely classify the product as being spyware and would highly recommend that you take all steps necessary to disable it when it is not being used, and here are some reasons why.
My first problem is that by default, the HP Support Assistant does an intrusive scan of your network to search for “devices” every time the software runs and it appears you can’t turn that off. It doesn’t get much shadier than that folks, seeing as how you don’t really know what they are up to and why they are taking an inventory of your entire network.
In a busy network environment, it is critical to have some form of network monitoring on all your servers and equipment. Network monitoring comes in many different forms and flavors, whether it be to monitor critical system services and applications via SNMP, WMI, or some proprietary third party software, or just generically pinging some devices to make sure they are up.
Nowadays, it is getting more and more necessary to dig deeper to be able to track what end users are doing and what websites they are visiting and this is where the Cisco Netflow comes in handy. Essentially, netflow allows us to peer down into the network traffic streams and give us vital source, destination, and protocol information coming to and from our network hosts but isn’t quite as storage intensive as doing a full fledged pcap dump, which makes historical accounting of this data a whole lot nicer.
There’s several different things that can cause the trust relationship issue and there are hundreds of post or more online about the subject. Sometimes simply resetting the computer account in Active Directory can fix the problem. Other times, unjoining/rejoining the computer from the domain will fix the problem. If either of those isn’t the case, usually that is a good indication that there is some sort of corruption in the Active Directory database that can only be fixed by manual intervention.
Seriously man, fuck Microsoft, fuck Windows 10, and fuck you. No actually you are ok, as long as you don’t work for Microsoft or are some sort of freak MS enthusiast, but what kind of shithole stasi big brother state do we live in when your software vendor tells you what applications you can and can’t install on the operating system you purchased for your own PC? I mean I know they’ve been doing that shit for a long time, but tonight the stars revolt (seemingly misplaced Powerman 5000 reference).
I just had the joy of wasting an hour of my life getting the damn Cisco VPN client to work. When Windows 8 came out, there were a few workarounds to have to do, but now MS has stepped up their game of being total assclowns and won’t let you even run the installer. In your delight, you will receive the pleasantly authoritarian popup box that says, “This app can’t be run on this PC“. Fan-fucking-tastic.
Howdy folks, this is just another somewhat plagiaristic post for my own future reference. I found this info hyah and unfortunately I was unable to retrace my steps to find my original source on where to locate the .dmg file in the installer package.
Download the latest version of Yosemite/El Capitan from the App Store and make sure you’ve formatted your USB thumb drive with the Disk Utility. Then open up a terminal and issue the following commands: