• Hosted Data Solution

    5
    1 Votes
    5 Posts
    911 Views
    scottalanmillerS

    @Joel said in Hosted Data Solution:

    The downside to Dropbox and similar solutions is that we'd need to download & sync their 200GB to each computer including 1 external user.

    That size puts them at a pretty small Vultr tier, too.

  • "You don't just restore a server"

    14
    6 Votes
    14 Posts
    2k Views
    scottalanmillerS

    @Mike-Davis said in "You don't just restore a server":

    I would poke around it long enough to figure out if the server had been logged in to, or if a user's computer encrypted all the files. You don't want it coming right back. Like others said, figure out how it got infected and then restore back before the infection.

    If you want to do that, in 95% of cases, take a fresh backup, isolate it and do that offline in a forensics lab after you deal with getting production back. Just leaving it alive could result in more data leaving the environment.

  • Proposed Session: SELinux Deep Dive

    11
    4 Votes
    11 Posts
    3k Views
    scottalanmillerS

    @NerdyDad said in Proposed Session: SELinux Deep Dive:

    I'm resurrecting this topic for suggestion to discussion for the DFW Mango Meetup.

    Oh nice.

  • Restoring SBS after cryptoware infection

    11
    2 Votes
    11 Posts
    923 Views
    Mike DavisM

    @momurda said in Restoring SBS after cryptoware infection:

    Wasnt there an SBS version where the only way to join a doimain was using IE on a client?

    With SBS, you can do things the "normal" way, but if you use their tools like the dashboard, it does some extra stuff in the background. For example, if you run the web based join program, it sets your DNS statically so that the server is the first DNS server. This is useful if your router is doing DHCP and you can't turn it off. It helps someone that is not a full time admin take care of the basics.

  • 1 Votes
    5 Posts
    3k Views
    EddieJenningsE

    @JaredBusch said in OpenSSL CSR with Subject Alternative Name:

    @EddieJennings said in OpenSSL CSR with Subject Alternative Name:

    @JaredBusch Correct. The "ye olde way" is how I've typically made a CSR and private key. The link I included talks about making a configuration file, which allows you to include SAN in your CSR.

    Ah, did not read the link. Yes, using a config file is the only method to get any SAN on a cert with OpenSSL.

    And after re-reading my post, I realized how terrible it was :(. I was hoping to find a one liner kind of thing, but alas. That particular article made it clear how to do it.

  • Renaming all user profiles to *.old

    12
    1 Votes
    12 Posts
    2k Views
    Reid CooperR

    @wirestyle22 said in Renaming all user profiles to *.old:

    @Reid-Cooper said in Renaming all user profiles to *.old:

    You could... accidentally run a script that would make you required to rebuild everything.

    Nah, it's not my job to force them to make the right decisions. Not even my friend

    Well then, do whatever bills the most.

  • StarWind Virtual Tape License Error

    8
    3 Votes
    8 Posts
    2k Views
    ObsolesceO

    @KOOLER said in StarWind Virtual Tape License Error:

    OK, there are good news and bad news.

    Bad news: VTL is NOT included in the free version.

    Good news: we'll add some LIMITED availability of it soon, just didn't;t decide on a restriction set.

    Excellent news: I can give away to Tim_G an unlimited VTL license free of charge "just because" 🙂 So he's welcomed to drop me a line to

    anton AT starwind DOT com

    ...and I'll engage him with the responsible persons here to move on.

    P.S. Just a link to VTL thing:

    StarWind Virtual Tape Library (VTL)

    https://www.starwindsoftware.com/virtual-tape-library-feature

    Sounds great, email sent!

    This should get my project testing going once the license is ready.

  • Migrating Logs

    14
    1 Votes
    14 Posts
    810 Views
    wirestyle22W

    @scottalanmiller said in Migrating Logs:

    Really, log shipping with local storage is a thing of the past as well. Not what you are looking for with your use case, but long ago people did this. Today if you want to store logs beyond what fits on the local system you look at remote log servers like syslog, rsyslog, Kiwi, Graylog, ELK, loggly, Splunk and so forth. They have more useful platforms for dealing with centralized logs, archiving and backups.

    Then we get into why you would use each. What product benefits what situation 😄

  • Is Active Directory Really Needed Today?

    31
    0 Votes
    31 Posts
    3k Views
    scottalanmillerS

    Easy way to identify LAN dependencies... consider opening a branch office. Do you feel that you need a VPN for a service? Guess what, that's a LAN dependency 🙂

  • Let's play name that computer

    16
    0 Votes
    16 Posts
    1k Views
    scottalanmillerS

    @jrc said in Let's play name that computer:

    @Tim_G

    The machines you see in the picture are mostly 286 and 386 machines, so 1987 - 1991 or so. That said, 5.25' drives were still used in computers well into the early 90s.

    Yes, I'm guessing VERY late 80s or early 90s from the looks of it. Not that that means much, but the style and materials feel like that era.

  • A Small Orange - bandwidth limit exceded

    Unsolved
    71
    0 Votes
    71 Posts
    5k Views
    scottalanmillerS

    @jrc said in A Small Orange - bandwidth limit exceded:

    Anyone mention web crawlers on here? Indexing servers (like Google) will hit a website over and over again looking for changes to catalog and add to their index.

    Try adding a robots.txt to the root (http://www.robotstxt.org/robotstxt.html(

    They should not create traffic anything like that.

  • O365 Email Spam, Phishing, & Malware Protection

    17
    1 Votes
    17 Posts
    2k Views
    kenK

    Thanks Scott for the nod. The Gartner peer reviews is a tough and well moderated reviews site which asks companies on each service how they perform in different areas. https://www.gartner.com/reviews/market/secure-email-gateways .
    I'd recommend picking a couple of services and contacting them for a trial. As you already have your list of requirements it shouldn't take long to narrow down who is relevant to you.

  • Rhcsa or Rhce Certification?

    28
    1 Votes
    28 Posts
    3k Views
    stacksofplatesS

    I have an RHCSA. I did the fast track class the week before. It was helpful for the test. I don't think it's a worthless test, but if you do manage RHEL systems all the time, it's fairly basic. You are expected to know basics with Bash like piping, redirection, regex, etc. I did find out about systemd-tmpfiles utility, which I didn't know existed.

    Here's the objectives:

    RHCSA exam candidates should be able to accomplish the tasks below without assistance. These have been grouped into several categories.

    Understand and use essential tools
    Access a shell prompt and issue commands with correct syntax
    Use input-output redirection (>, >>, |, 2>, etc.)
    Use grep and regular expressions to analyze text
    Access remote systems using ssh
    Log in and switch users in multiuser targets
    Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
    Create and edit text files
    Create, delete, copy, and move files and directories
    Create hard and soft links
    List, set, and change standard ugo/rwx permissions
    Locate, read, and use system documentation including man, info, and files in /usr/share/doc
    Note: Red Hat may use applications during the exam that are not included in Red Hat Enterprise Linux for the purpose of evaluating candidate's abilities to meet this objective.

    Operate running systems
    Boot, reboot, and shut down a system normally
    Boot systems into different targets manually
    Interrupt the boot process in order to gain access to a system
    Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes
    Locate and interpret system log files and journals
    Access a virtual machine's console
    Start and stop virtual machines
    Start, stop, and check the status of network services
    Securely transfer files between systems
    Configure local storage
    List, create, delete partitions on MBR and GPT disks
    Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes
    Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
    Add new partitions and logical volumes, and swap to a system non-destructively
    Create and configure file systems
    Create, mount, unmount, and use vfat, ext4, and xfs file systems
    Mount and unmount CIFS and NFS network file systems
    Extend existing logical volumes
    Create and configure set-GID directories for collaboration
    Create and manage Access Control Lists (ACLs)
    Diagnose and correct file permission problems
    Deploy, configure, and maintain systems
    Configure networking and hostname resolution statically or dynamically
    Schedule tasks using at and cron
    Start and stop services and configure services to start automatically at boot
    Configure systems to boot into a specific target automatically
    Install Red Hat Enterprise Linux automatically using Kickstart
    Configure a physical machine to host virtual guests
    Install Red Hat Enterprise Linux systems as virtual guests
    Configure systems to launch virtual machines at boot
    Configure network services to start automatically at boot
    Configure a system to use time services
    Install and update software packages from Red Hat Network, a remote repository, or from the local file system
    Update the kernel package appropriately to ensure a bootable system
    Modify the system bootloader
    Manage users and groups
    Create, delete, and modify local user accounts
    Change passwords and adjust password aging for local user accounts
    Create, delete, and modify local groups and group memberships
    Configure a system to use an existing authentication service for user and group information
    Manage security
    Configure firewall settings using firewall-config, firewall-cmd, or iptables
    Configure key-based authentication for SSH
    Set enforcing and permissive modes for SELinux
    List and identify SELinux file and process context
    Restore default file contexts
    Use boolean settings to modify system SELinux settings
    Diagnose and address routine SELinux policy violations
    Red Hat reserves the right to add, modify, and remove objectives. Such changes will be made public in advance through revisions to this document.

  • Options for deploying standardized image to desktop & laptops?

    29
    1 Votes
    29 Posts
    3k Views
    S

    @aaronstuder Hey Aaron - yep, I stated in my previous post that it was strictly for testing purposes (to determine if Macrium was going to work for me or not). And as Dustin stated, I ended up going with FOG anyway.

  • Active Directory Malware Defense

    6
    1 Votes
    6 Posts
    672 Views
    s.hacklemanS

    @scottalanmiller I sat down when this was first posted and watched the whole thing. I know the future is heading in this direction, I guess it didn't sit in until witnessing it first hand and seeing how real a threat like this can be.

  • Large file sharing to, from and within mainland China

    96
    1 Votes
    96 Posts
    9k Views
    Emad RE

    @scottalanmiller @JaredBusch

    I know my options, either Windows server acting as CA or OpenSSL in Linux, to be honest both routes was difficult to setup and requires a VM to be running at all times, to be the point I said screw it let them click the Advanced button and proceed to the site.

    Cause encryption is occurring, with the self created ssl key + cert.

    And our infrastructure is bit limited to be honest, so each VM has to be really needed to open one.

    And the theoretical issue of 0.00001% of someone hijacking the server and do Man in the middle attack by routing to his SSL keys + cert is out of the park, if there is someone there with I.T skills I will pay him to help me.

  • Where to start?

    37
    1 Votes
    37 Posts
    6k Views
    Emad RE

    Start with old Desktop with Virtualization extension, something that you can install OS and dont have to remove cause of free space or you need it for something else.

    Cause learning Linux or Centos or anything else needs environment, and virtualbox can work but it wont allow you play with KVM, and thats for me the big part of the fun.

    Also you need to keep learning that means its is process some day you will leave it 4-5 days dormat cause your stuck in an issue the other day bulb lights up mainly due to reading this site and you get back on it.

  • 1 Votes
    18 Posts
    4k Views
    JaredBuschJ

    @scottalanmiller said in Out of Band Management - does it mean no keyboard at all:

    @JaredBusch said in Out of Band Management - does it mean no keyboard at all:

    @scottalanmiller said in Out of Band Management - does it mean no keyboard at all:

    @Carnival-Boy said in Out of Band Management - does it mean no keyboard at all:

    Well, I'm glad that's been cleared up. You can probably delete the thread now 🙂

    I don't even know what the original thread was!

    And that is why you have no concept of what you posted being completely wrong for the context of the thread.

    Honestly, it is pretty straight forward if you read the first post.
    https://mangolassi.it/topic/13595/out-of-band-management-does-it-mean-no-keyboard-at-all

    The first post also contains links back to the thread that @DustinB3403 pulled this from.

    I was responding the post quoted, though.

    Which was in the context of the entire thread. If you want to cherry pick something, then clearly, state as much. You did not.

  • Thinking about scheduling CISSP really soon, maybe this week...

    6
    0 Votes
    6 Posts
    434 Views
    IRJI

    I get 100% reimbursement from my company on the passing attempt. So if I pass the first time, I will get 100% back.