Categories
How-To News

Twitter Wants to Start Tracking You

Many sites do it today, why not Twitter right? Today, Twitter announced that they will be experimenting with targeted adds. What this means is they are going to go down the same path as well known sites such as Facebook and track you around the web and share information about you with advertisers. For now […]

Categories
How-To Software Technical

Primary target IP address responded with: “451 5.7.3 Cannot achieve Exchange Server authentication.”

In my previous post I was banging my head over an Exchange 2013 issue. I was able to finally resolve it. And it took some steps to do so… 451 4.4.0 Primary target IP address responded with: “451 5.7.3 Cannot achieve Exchange Server authentication.” After an Exchange 2013 Install I found myself having issues with […]

Categories
Software Technical

ET P2P Torrent Client User-Agent (Solid Core/0.82)

I have been seeing this alert “ET P2P Torrent Client User-Agent (Solid Core/0.82)” on networks for sometime now and was able to narrow it down to being related to Adobe Flash (Firefox and Chrome). I am not sure why Adobe is using a torrent client in its flash but this seems to be the source. This […]

Categories
Software Technical

Internet Explorer 10, Crashing Exchange 2013 Exchange Admin Console

If you are running Exchange 2012 on Windows Server 2012 you will soon noticed that Internet Explorer 10 randomly crashes during operations in the new Exchange Admin Console (EAC). I have found this to be very annoying. However there are options which you could take. 1. You can use Internet Explorer 10 from Windows 8 […]

Categories
How-To Software Technical

Using SSH as VPN Solution in Linux

Looking for a quick simple way to have VPN access to your network or simply to secure your connection when you are on a remote network you don’t complete truest such as a public hot-spot. And while there are many solutions I have one which is simple to use. It’s called ‘sshuttle’ and all you […]

Categories
Software Technical

How secure are the apps you use on Smart Phones

In my last post I wrote a very brief how-to on how to Capture Traffic from Smart Devices with Fiddler by making it a network proxy. I did just that and the results for a few app’s have upset me. Mainly because it exposes not only my password and user id, it exposed the content […]