Categories
How-To Software Technical

Primary target IP address responded with: “451 5.7.3 Cannot achieve Exchange Server authentication.”

In my previous post I was banging my head over an Exchange 2013 issue. I was able to finally resolve it. And it took some steps to do so… 451 4.4.0 Primary target IP address responded with: “451 5.7.3 Cannot achieve Exchange Server authentication.” After an Exchange 2013 Install I found myself having issues with […]

Categories
Software Technical

ET P2P Torrent Client User-Agent (Solid Core/0.82)

I have been seeing this alert “ET P2P Torrent Client User-Agent (Solid Core/0.82)” on networks for sometime now and was able to narrow it down to being related to Adobe Flash (Firefox and Chrome). I am not sure why Adobe is using a torrent client in its flash but this seems to be the source. This […]

Categories
Software Technical

Internet Explorer 10, Crashing Exchange 2013 Exchange Admin Console

If you are running Exchange 2012 on Windows Server 2012 you will soon noticed that Internet Explorer 10 randomly crashes during operations in the new Exchange Admin Console (EAC). I have found this to be very annoying. However there are options which you could take. 1. You can use Internet Explorer 10 from Windows 8 […]

Categories
How-To Software Technical

Using SSH as VPN Solution in Linux

Looking for a quick simple way to have VPN access to your network or simply to secure your connection when you are on a remote network you don’t complete truest such as a public hot-spot. And while there are many solutions I have one which is simple to use. It’s called ‘sshuttle’ and all you […]

Categories
Software Technical

How secure are the apps you use on Smart Phones

In my last post I wrote a very brief how-to on how to Capture Traffic from Smart Devices with Fiddler by making it a network proxy. I did just that and the results for a few app’s have upset me. Mainly because it exposes not only my password and user id, it exposed the content […]

Categories
How-To Software

Capture Traffic from Smart Devices with Fiddler

This method applies to any device on your network where you can change the values of the network proxy. I sought out this information with the intent to learn how secure are some of the the mobile applications I had been using day to day were. And when I’m sick with a head-cold the mind […]