• Evolutions in software - how do you handle it?

    25
    0 Votes
    25 Posts
    2k Views
    scottalanmillerS

    @coliver said:

    @Breffni-Potter said in Evolutions in software - how do you handle it?:

    @scottalanmiller said:

    What other apps are you thinking of that you feel have no good alternatives?

    I'm going to define the needs rather than products.

    Photo Editing (Gimp)
    Video Editing (Premier)
    Audio Editing (Audition)
    Graphic Design (Inkscape)
    Print/document design (indesign)
    Bulk video/audio encoding (media encoder)
    Certain PDF features (Acrobat)

    Have you looked at Audacity or Ardour for Audio editing? I have a musician friend who uses Ardour.

    I've been using Audacity for forever. Using it a lot since 2005, or so.

  • Let's Encrypt on ASO shared server

    7
    2 Votes
    7 Posts
    2k Views
    AmbarishrhA

    @scottalanmiller said:

    @Ambarishrh said:

    Wanted to setup Let's Encrypt for my blog which is now hosted on ASO but as per their tech agent, this is not possible! 😞

    Is that because SSL is not offered at all?

    As per them, its only on dedicated servers and not shared. But using https://gethttpsforfree.com/ i was able to generate certs and install 🙂

  • GPO for Taskbar App Pin?

    2
    1 Votes
    2 Posts
    359 Views
    DashrenderD

    I've noticed odd behavior like this before - or what I considered odd behavior - the Outlook shortcut for example. If you pin it before Outlook fully launches the screen, but instead do it while in the Outlook profile setup, you get weird results.

    Assuming that the icon on the taskbar is the embodiment of the EXE, I'm not surprised that that is what is pined instead of your PS script. I'm guessing you're going to have to manually create a Pinned object to the launcher, not after it has executed and quits, leaving the actual exe running.

  • Ransomware Petya encrypts hard drives

    6
    1 Votes
    6 Posts
    2k Views
    AmbarishrhA

    Petya ransomware victims can now unlock infected computers without paying.
    http://www.bbc.com/news/technology-36014810

  • 0 Votes
    26 Posts
    4k Views
    RojoLocoR

    @DustinB3403 said:

    @Jason said:

    @Dashrender said:

    But users are idiots..

    That's a horrible attitude. No wonder you don't train your users. No we aren't a tech company.

    It's actually an honest answer. People in general are about as smart as a bag of doorknobs.

    In a Jeopardy style contest between a sack of users and a sack of doorknobs.... my money is on the doorknobs, all day long. Users are simply "average" people. The "average" person is stupider than f@ck (that's a fact), ergo users are idiots.

  • Virtualize W2003 R2 licensing problem.

    36
    2 Votes
    36 Posts
    10k Views
    DashrenderD

    @JaredBusch said:

    @Dashrender said:

    @Carnival-Boy said:

    Correct. OEM lives and dies on the machine it was first installed on. It's not transferable. I think what Jared was saying is that it doesn't matter whether it activates or not - that's irrelevant as to whether it is legal or not. Just because it activates doesn't mean it is legal.

    Exactly.

    More specifically - MS doesn't specifically go out of its way to deactivate. If it deactivation happens, it happens, if not - that's fine too. But licensing has mostly always been on the honor system.

    All correct, but specifically, I meant that he can just P2V the server on to the new hardware and simply buy another OEM license from eBay or whatever and still be legal. Assuming, of course, that the eBay seller was legit and the license they sold was legal in the first place.

    Hey - what do you know.. we're on the same page - (using most happiest tone possible - really I am)

  • Autodesk Audit

    12
    1 Votes
    12 Posts
    3k Views
    DenisKelleyD

    @Carnival-Boy said:

    What do you do about any machines that aren't on the network - either at the time of the audit, or generally?

    I went through one a year or so ago. Agree, you install the software and then let it analyze the network, then upload the results. I have one or two machines off the network and provided that information via the support portal. One was an off-site employee and the other was using the home-use rights allowed under the license.

    We passed with flying colors. I thing we got tagged because I'm not using network licensing and had a few machines go belly up and didn't get a chance to upload the license to their cloud servers, so probably hit one too many activations. Plus I was doing a ton of machine swaps at the time during our upgrade.

    If you are licensed properly, no fear. Just go through the motions and you'll be fine.

  • Bash Script

    3
    0 Votes
    3 Posts
    610 Views
    RamblingBipedR

    Maybe try assigning the output to a variable/series of variables that can be used in a separate function? Or try piping the output of your current script into another script that processes it and builds an HTML based table?

  • NetBios - Master Browser

    1
    0 Votes
    1 Posts
    259 Views
    No one has replied
  • Double Inverted Pyramid

    22
    3 Votes
    22 Posts
    3k Views
    NETSN

    @Jason said:

    If you mean the SAN (as in Storage Area Network, not the SAN Devices) was all static, that is completly normal. You don't normally put DHCP in SANs

    Nope the entire 200-300 device network

  • 1 Votes
    3 Posts
    1k Views
    nadnerBN

    According to this post --> https://community.office365.com/en-us/f/166/p/428896/1102268#1102268, there is no global setting. 😞

  • 3 Votes
    1 Posts
    835 Views
    No one has replied
  • 7 Votes
    4 Posts
    6k Views
    AdamFA

    @JaredBusch

    Good to know. I'm planning on starting this later this week. If I can get this working, I'm going to replace a PFSense firewall with an ERX or lite. Right now, this is the only thing that I dont have setup for ERX yet.

  • SnipeIT Users

    7
    1 Votes
    7 Posts
    1k Views
    wirestyle22W

    @hobbit666 said:

    We've decided to just add users as we book things out.

    😞 I wish I had more experience to help you. I try to avoid overhead if at all possible.

  • ACT Premium for Workgroups by Sage

    11
    1 Votes
    11 Posts
    856 Views
    DustinB3403D

    ha.....

  • 1 Votes
    9 Posts
    1k Views
    JaredBuschJ

    @Jason said:

    @JaredBusch said:

    @Jason said:

    Why would you do that? Never heard of anyone needed that.

    I personally wouldn't do an inplace upgrade. Fresh installs are so much nicer. (We Actually have a policy against doing in place upgrades)

    He wants to get rid of the DC but yet he wants to keep all the file history.

    Demote it as a DC and P2V it. Gives him what he wants.

    I get that but does he not have backups? Or why is there a big need to keep the versioning?

    Oh trust me, I agree with you. I was simply stating a method to achieve his stated goal.

    IMO, he should just spin up a new server and migrate the shares, but that was not what he was asking.

  • Nesting Hypervisors - when would you do this?

    32
    1 Votes
    32 Posts
    6k Views
  • RPN-SAN storage question.

    7
    0 Votes
    7 Posts
    2k Views
    travisdh1T

    @papercape said:

    @travisdh1 I've done so with a benchmark tool, it seems to run several redundant tests on the disk and then another set of tests for network speeds. The "disk IO" output value is 5.6mb/s, 6mb/s, and 4.3mb/s. The network connects to Hong Kong (slowest speed) at 30mb/s and Ontario (highest speed) at 120mb/s.

    Hrm, even if you have Megabits and Megabytes messed up in the worst case condition, that's just bad. A network share on the local gigabit network here will transfer at ~120MB/sec. Even the slowest single drive should be much faster than that today. I'd honestly open a support ticket and see if they can tell you what's up.

  • Ransomware

    36
    2 Votes
    36 Posts
    7k Views
    J

    @Dashrender said:

    @Jason said:

    It can be set to strip the macro's out or Print the whole file to a PDF. The PDF would not have macro's. Our solution even will scan for urls in documents and see what they are.

    what are you using?

    Mimecast

    https://community.mimecast.com/docs/DOC-1454

  • Authenticating Linux against AD

    31
    3 Votes
    31 Posts
    7k Views
    PSX_DefectorP

    @Kelly said:

    @PSX_Defector said:

    @Kelly said:

    I've also been looking at PowerBroker Identity Services from BeyondTrust. It is where Likewise ended up after a series of acquisitions. It looks like I'm going to have to be building a virtual network and trying some of this.

    I've used this in multiple companies, from an airline in America to an oil exploration company.

    Works like a champ, it's built on Winbind, but now has actual support versus calling RedHat and hoping for the best.

    Did you use PBIS Open or the paid version? The paid version is significantly more than I can afford at about $1,600 per server instance.

    This was back in the Likewise days. So free.99.