Beginning with Exchange 2010 then on to Exchange 2013. User who used the client Outlook 2007/2010/and 2013 had a new feature called automapping. Automapping takes advantage of Exchange auto-discovery services to map mailboxes in which a user has “Full Access” permissions granted. This is very helpful to the end-user as he or she is no […]
Category: How-To
I touched on this in a previous post here. Where I needed to remove some software which was installed but was no longer listed in add/remove software of the machine I had been working on. Fortunately by using WMI we can get the necessary info and tool to remove / change software we no longer […]
I had a few users over the past week(s) report that they could not connect to the local Team Foundation Server. The message received was “TF31002: Unable to connect to this Team Foundation Server” Each attempt to connect returned the same results. Using Internet Explorer they were able to browse to http://<server-address>:8080/tfs however Visual Studios […]
Another day, another infection. This time it’s the threat that goes by the name of Savings Bull (sample.dll) which is a form of Adware / Malware that infects a user’s computer and listens by proxy to network traffic of the infected victim. Savings Bull copies itself to your hard disk. The typical file name is […]
Here are some simple steps to get you going with getting services you want to host under the Tor network hidden service. While they don’t seem simple up front they are. These notes are based on my own testing and using my headless tor proxy server setup. Requirements Tor installed Tor running Now my steps […]
A while back I wrote about how I setup a small yet effective Tor network proxy server titled “My Quick Tor Socks / Web Proxy“. After running this for sometime now I wanted to get some real time status, but more than that I wanted it to look cool. And this brings me to what […]