Comments
-
Look at the url.. remove the extra http// in the url.
-
Every major outage that affects a companies ability to do business is somewhat different. You can plan for and have many contingencies in place to mitigate the issue but you will not have thought of everything... Murphy is always waiting in the wing for the opportunity to toss a monkey wrench into the mess and create…
-
Mission Complete !
-
Hmmm, how about Independence Day when they upload a virus to an unknown alien OS and architecture with a mac..... Although not as bad, Jurassic Park with the famous line "I know this, this is Unix" with an SGI irix workstation in the background.... How many kids knew unix well enough a decade or so ago to be able to reboot…
-
Sweet..glad to see some others at the SWUGs expressing interest. Keep bumping and sharing folks !
-
same here...round three tonight with an increase in bang factor with the final battle tomorrow night.
-
The Tello quadcopter for week 4 is a nifty little quad. All you need is your phone or tablet to control it. You can get a little wifi extender that you plug into a external usb charger...think the solar powered thwack charger pack and a wifi gaming controller for better control/distance. For a small quad, it has…
-
Storage density is increasing as well as speed...it will be interesting to see what a few TB's will fit on here in a couple of years...the current micro cards for phones and tablets that hold 256GB are quite impressive.
-
Thank you tonymckay !
-
Hmmm....any port in a storm...right ? except for port 1 apparently. IoT is such a huge mess on many fronts. So many people that don't understand the need to change default passwords. Just think if someone were able to link all the IoT devices into it's own self-aware network IoTnet ! They'd have a piece of most everything.…
-
Ah...got ya !
-
Not surprised google had a hidden mic. Another connect gadget that while can be useful to a point just opens you up to invasion of privacy. Google has no morals. Just the quest for data to sell for more money.
-
Wow...it's the actual web !!
-
the phishing this is beyond crazy. So many people just don't look closely and assume too much. I have seen some that were good..you had to spend a little time and look closely to spot the anomalies. But so many get suckered into the badly formed ones that raise your red flag because it is so obviously fake... Those people…
-
Modeling user action is a challenge. Some people do strange things at times for no apparent reason. On that same note..User defined transaction profiling can be somewhat accomplished. There are challenges when it comes to certain types of transactions. In some environments, performing those transactions costs money. In…
-
Ah...the quiet house. The deafening sound of silence similar to a data center with no power.
-
We have an app called Phish Me for reporting phishing attempts in Exchange. About once a quarter a test phish email goes out to see if people catch it an report it or not. Some are quite well crafted and you have to really look at them to determine if it is really marketing spam or possibly a phishing attempt. Around…
-
Thanks @"danielleh" and @"TiffanyNels" !
-
:wq to write changes and quit
-
The banner on the store page shows that it is temporarily disabled. I'm sure we will get further info before long.
-
One aspect of open source software is that it may fill a particular niche that COTS (commercial off the shelf) solution is not cost effective. Thus it may be a viable part of the solution.
-
from time to time "Chaos Free" and Helpdesks are mutually exclusive, like after a major software upgrade to the general user populace.
-
I am in the same boat. You had to look at the bigger picture in the hint.
-
sorry..meant BASIC
-
that and webmail based apps. But even then, if you have no network available you can't do some work.
-
Seems to me this has been mentioned in 2 or 3 prior posts...essentially the same information just worded differently.
-
In a word - logging ! Log what you do and any deviation to what is expected... Be sure you have related data in the log so you understand why you kicked out at that point. By logging you know how far you got through a list of items. Logging, if it isn't logged, it didn't happen. Don't be afraid to have multiple logs...a…
-
Form the inside it is not always an untrained or careless user. Sometimes it is an act to remove certain info for use later or to knowingly introduce a bit of malware, virus or something to cause harm as retribution.
-
Rainy Tuesday morning bump ! #bumpsquad
-
Perfstack I will agree looks to be good...but like any tool out there, it is all about how the tool is utilized. The utilization combined with the culture at the shop where it is used and how well all teams are integrated will determine it's effectiveness and overall utility.