Here is a batch script, using only DOS commands, to check if the current user is a member of a specific group. The way it is currently written, you can call a batch file containing this code using the CALL command and pass the short NetBIOS domain name (or possibly the computer name if it is a local account) and the group name to search for as arguments, and it will return a “1” if the user is a member of the specified group and “0” if they are not. Just be sure to put quotes around any group name that contains any spaces. Continue reading “Batch Script – How to Check if the Current User is a Member of a Group”
Here’s a cheap ass script to tar up and dump all of your MySQL databases to separate files using the Debian system maintenance account. Sure there’s plenty of room for improvement here, but hey, it gets the job done and is perfect for a midnight cron job.
Based off of this with a few of my own customizations.
Continue reading “Bash Script – Backup All Databases to Separate Files”
Let’s keep this short and sweet, here’s how to run x11vnc server on startup with your Raspberry Pi running the Raspbian OS. Obviously, if you don’t have x11vnc installed beforehand, then you’re a dumbass blankety blank blank and you should die.
Either SSH into the Pi (as pi) or open up a terminal and do one of the following:
Continue reading “Raspbian – How to Run X11vnc on Startup”
Unfortunately, not only is the option considered experimental, but the Ultra VNC documentation on how to “Send Custom Keys” is less than ideal, and remembering the decimal equivalent of each key on the keyboard is simply not an option for me. I currently have no want or need to know this information by heart, so I’m not even going to attempt to do so. So, when desperate times call for desperate measures, it’s time to start thinking on your feet and stop pouting like a little man-girl, you’ve still got options.
Luckily, if your running any newer version of Windows (I guess if you want to call it luck), your a slug-headed loser douche extraordinaire (present company included, I just wish the Linux desktop environments weren’t so damn slow) that doesn’t care about his or her right to computer privacy…Wait, I mean, luckily, you can use the On-Screen Keyboard as a workaround for this and you can send whatever custom key combinations you need. Continue reading “Ultra VNC – Send Custom Keys Workaround and ASCII Reference Chart”
There are hundreds of articles on this subject, so I’m not going to spend any time on this. This is just for my own personal reference in the future.
Navigate to the following registry key:
Create/Edit the following keys as string values:
Find the key “AutoAdminLogon” and set the value to “1”.
I needed a way to track which Exchange users were remotely retrieving their emails outside of the office on their phones and other email clients, so I pieced together this batch/pseudo VB script that can be ran from the Windows Task Scheduler at midnight. The only dependency/third party app required is the MS Log Parser executable. Also, for the SQL query to filter out the proper internal networks from the log file, you will have to edit the LOCALSUBNET and CHARLENGTH variables.
Continue reading “Batch Script – Parse MS Exchange IIS Log File, Filter All External Requests, and Email It”
This post is just for my own personal reference, but you can use it too if you like. Just make sure to change the “UserName” below to whatever that user’s home directory is. I’ve mashed the code together from the following sources, changed it to export in csv format (making it easier to import into Excel or Open Office for further manipulation), made it into a one-liner for sake of ease, put the data in ascending order based on last URL visit date, and converted the dates into human readable format. Continue reading “Mac OS X – Export Google Chrome Browsing History to CSV File from the Terminal”
Sure there are several legitmate cases where the HP Support Assistant can be helpful, such as updating drivers or flashing the BIOS on the computer, but if you’re reading this, you’ve probably already established the fact that the software basically hijacks your computer and does a lot of shady shit in the background. I would absolutely classify the product as being spyware and would highly recommend that you take all steps necessary to disable it when it is not being used, and here are some reasons why.
My first problem is that by default, the HP Support Assistant does an intrusive scan of your network to search for “devices” every time the software runs and it appears you can’t turn that off. It doesn’t get much shadier than that folks, seeing as how you don’t really know what they are up to and why they are taking an inventory of your entire network.
Continue reading “HP Support Assistant – The Epitome of Spyware and How to Disable It”
In a busy network environment, it is critical to have some form of network monitoring on all your servers and equipment. Network monitoring comes in many different forms and flavors, whether it be to monitor critical system services and applications via SNMP, WMI, or some proprietary third party software, or just generically pinging some devices to make sure they are up.
Nowadays, it is getting more and more necessary to dig deeper to be able to track what end users are doing and what websites they are visiting and this is where the Cisco Netflow comes in handy. Essentially, netflow allows us to peer down into the network traffic streams and give us vital source, destination, and protocol information coming to and from our network hosts but isn’t quite as storage intensive as doing a full fledged pcap dump, which makes historical accounting of this data a whole lot nicer.
Continue reading “Bash Script – Move Files into Subdirectories Based on Modified Date – OR – Moving Ntop Netflow Dumps into Subdirectories by Date”
There’s several different things that can cause the trust relationship issue and there are hundreds of post or more online about the subject. Sometimes simply resetting the computer account in Active Directory can fix the problem. Other times, unjoining/rejoining the computer from the domain will fix the problem. If either of those isn’t the case, usually that is a good indication that there is some sort of corruption in the Active Directory database that can only be fixed by manual intervention.
Continue reading “Cannot Log onto Windows – Trust Relationship Failed”