The PiDrive Foundation Edition Makes Installing Multiple Operating Systems on Your Pi Easy

Priced at right around what you’d pay for any other hard drive and SD card, at $28.99 for 250GB and $37.49 for 375GB.

The PiDrive Foundation Edition is essentially a hard drive that also comes with an SD card installer that lets you install and boot from multiple operating systems.
Source: Lifehacker

FAA tests antidrone tech at Denver International Airport – CNET Share 

Pretty glad the FAA is looking into this.

As a person who flies periodically I’m comforted to know that somebody’s investigating this and possibly putting it to an end.

https://www.cnet.com/news/faa-federal-aviation-adminstration-drones-airports-safety/#ftag=CAD590a51e

We Are America ft. John Cena | Love Has No Labels | Ad Council

Well said…

To love America is to love all Americans. John Cena takes a break between dropping body slams to drop some truth – that patriotism is more than pride of country, it’s love beyond labels.

While the vast majority of Americans consider themselves unprejudiced, many of us unintentionally make snap judgments about people based on what we see – whether it’s race, age, gender, religion, sexuality, or disability. The Love Has No Labels campaign challenges us to open our eyes to our implicit, or unconscious, bias and work to stop it in ourselves, our families, our friends, and our colleagues. Rethink your bias at www.lovehasnolabels.com.

Share your support for love and inclusion by creating your own #WeAreAmerica gif at www.lovehasnolabels.com

Microsoft and Code.org announce free Minecraft Hour of Code tutorial for Computer Science Education Week, Dec. 5–11 | News Center

https://news.microsoft.com/2016/11/15/microsoft-and-code-org-announce-free-minecraft-hour-of-code-tutorial-for-computer-science-education-week-dec-5-11/

vSphere 6.5 – vCenter High Availability (VCHA) Overview – Enterprise Daddy

http://www.enterprisedaddy.com/2016/11/vsphere-6-5-vcenter-high-availability-vcha/

Ransomware goes Retro with PayDOS and Serpent written as Batch Files

The first variant discovered by Jakub is called PayDOS and is a batch file converted into a executable. When run, the executable will extract the batch file into the %Temp% folder and  run it from there. Once executed, batch file will scan certain folders for certain file extensions and rename the file so that one letter of the extension is changed. For example, test.png may become test.dng. It does not actually encrypt the files.

http://www.bleepingcomputer.com/news/security/ransomware-goes-retro-with-paydos-and-serpent-written-as-batch-files/

Introducing Microsoft Teams—the chat-based workspace in Office 365 – Office Blogs

https://blogs.office.com/2016/11/02/introducing-microsoft-teams-the-chat-based-workspace-in-office-365/

Check Point 600 Appliance Software Blade Stuck in Updating status

Recently I had a chance to get my hands on this excellent Firewall by Checkpoint. And as you know not everything goes perfectly, and this is where you get a chance to learn how it works, while you fix.

I encountered an issue where one of the Threat Prevention Blades was stuck in updating mode for several hours. I had logged into the appliance via SSH to view to CPU utilization and observed nothing which would indicate an issue.

I started thinking about what events occurred which may have caused this. So I looked at the auto update schedule for the blades and noticed that all 3 blades where set to upgrade simultaneously.

I have observed that these updated can causes very high consumption of CPU and which that perhaps the blade with the issue became stuck in an upgrading status.

To address this situation, I issued the update command from the CLI :

  1. Log into the firewall via SSH
  2. Enter into expert mode by typing ‘expert’ in the CLI – You will be asked for your expert password. Once in export you will be in a standard Linux bash prompt.
  3. Run the following while in expert mode depending on which update you require:
  • Anti-Virus Blade: [Expert@jermsmit.com]# online_update_cmd -b AV -o update
  • IPS Blade: [Expert@jermsmit.com]# online_update_cmd -b IPS -o update
  • Application Control Blade: [Expert@jermsmit.com]# online_update_cmd -b APPI -o update

 

Now return and refresh your webUI and you should notice that the blade(s) that were once stuck in the upgrading status are now showing up to date.

Check Point 600 Appliance Initial Setup

The following is a quick video of the setup of a Checkpoint 600 Security Appliance

Notes right from the admin guide: http://downloads.checkpoint.com/dc/download.htm?ID=24000

Check Point 600 Appliance Overview
Check Point 600 Appliance delivers integrated unified threat management to protect your organization from
today’s emerging threats. Based on proven Check Point security technologies such as Stateful Inspection,
Application Intelligence, and SMART (Security Management Architecture), Check Point 600 Appliance
provides simplified deployment while delivering uncompromising levels of security.

 

Check Point 600 Appliance supports the Check Point Software Blade architecture that gives independent
and modular security building blocks. Software Blades can be quickly enabled and configured into your
solution based on specific security needs.

 

This video takes place, right after the Check Point 600 was connected to WAN, LAN, and Powered Up.

Capture PuTTY Session Logs

In the past week I have had my good share of working on remote systems where I needed to utilize the tool PuTTY to issue commands; not all of them documented. To assist me in documenting my steps I often use the session logs. However this normal has been a manual process in the heat of the moment and sometimes enabling logging is an afterthought.

To guarantee that this is done I have preformed the following steps to the default configuration of my PuTTY client and all saved sessions so that logs are saved and dated for future reference. I wish to record those here for any of you who would like to do the same.

[Press Start]

 

Open PuTTy

Under Category, choose Logging

Under Session Logging, choose the option “All session output”

Under file name: choose a directory and log filename

Using the PuTTY log parameters I configure my logs to consists of host, year, month, data and time for each session.

I also selected the option to “Always append to the end” of the session log which is currently open”

Finally, saving this new log settings to the Default Settings profile in putty making this the default logging option for all future connections and saved profiles.

Note: Profiles that existed before this change will need to be modified if you wish to also log the session output.

Log Parameters:

  • &H = hostname for the session
  • &Y = year
  • &M = month
  • &D = day
  • &T = time

Example Log’s:

Short Video on how to do this