is the windows server variant heavy? On Tue, May 17, 2016 at 11:16 AM, That One Guy /sarcasm < [email protected]> wrote:
> nm, i see it now > > On Tue, May 17, 2016 at 11:15 AM, That One Guy /sarcasm < > [email protected]> wrote: > >> can you point me to where i would get it >> >> >> On Tue, May 17, 2016 at 11:14 AM, Ty Featherling <[email protected] >> > wrote: >> >>> Current AC2 is beta 21. I just installed it myself after a failed >>> upgrade from my old beta 12 install. It will do mass firmware updates, >>> password changes, and a set number of other configuration changes. The only >>> 2 things I wish it did that it doesn't are firewall updates and viewing >>> bridge tables for devices. Great tool for everything else. I installed the >>> local beta of the new CRM thing and It seems like it barely does anything >>> by comparison. If you go the the forums and find the AC2 beta forum, the >>> first sticky post is the latest version. >>> >>> -Ty >>> >>> >>> >>> -Ty >>> >>> On Tue, May 17, 2016 at 11:07 AM, That One Guy /sarcasm < >>> [email protected]> wrote: >>> >>>> We need to do some mass password changes and verification of the >>>> firmware, I assume this AC2 does this, can somebody point me to the most >>>> current iteration of this? We do have the beta access. Im just fearful of >>>> wandering too much on the forum looking. >>>> >>>> Will AC2 let me add configurations en mass? I need to change and add >>>> some settings, if there is a fairly simple way of doing this (preferably >>>> with error checking) assuming that AC2 doesnt do it I would sure appreciate >>>> some pointers (that dont assume I am a script magician) >>>> >>>> On Tue, May 17, 2016 at 10:56 AM, Josh Reynolds <[email protected]> >>>> wrote: >>>> >>>>> You want a toe? I can get you a toe, believe me. There are ways, Dude. >>>>> You don't wanna know about it, believe me. >>>>> >>>>> Hell, I can get you a toe by 3 o'clock this afternoon... with nail >>>>> polish. >>>>> On May 17, 2016 9:43 AM, "CBB - Jay Fuller" <[email protected]> >>>>> wrote: >>>>> >>>>>> >>>>>> I WILL SEND YOU A BILL!!! (FOR YOUR HATE))) >>>>>> >>>>>> hah >>>>>> >>>>>> >>>>>> >>>>>> ----- Original Message ----- >>>>>> *From:* Ty Featherling <[email protected]> >>>>>> *To:* [email protected] >>>>>> *Sent:* Tuesday, May 17, 2016 8:29 AM >>>>>> *Subject:* Re: [AFMUG] ubnt malware >>>>>> >>>>>> We're the hatiest! Our hate is refined though, and surgically >>>>>> applied. The forums are more like monkeys throwing their hate-shit >>>>>> indescriminately. >>>>>> >>>>>> >>>>>> >>>>>> -Ty >>>>>> >>>>>> On Tue, May 17, 2016 at 8:26 AM, Bill Prince <[email protected]> >>>>>> wrote: >>>>>> >>>>>>> All your hate are belong to us. >>>>>>> >>>>>>> >>>>>>> bp >>>>>>> <part15sbs{at}gmail{dot}com> >>>>>>> >>>>>>> >>>>>>> On 5/17/2016 6:25 AM, Chuck McCown wrote: >>>>>>> >>>>>>> Hey, we got hate here... I hate it when people complain about our >>>>>>> lack of hate. We can hate with the best of them, just choose to >>>>>>> reserve it >>>>>>> for a better time and place... afmug: higher quality hate >>>>>>> >>>>>>> *From:* Ty Featherling <[email protected]> >>>>>>> *Sent:* Tuesday, May 17, 2016 7:21 AM >>>>>>> *To:* [email protected] >>>>>>> *Subject:* Re: [AFMUG] ubnt malware >>>>>>> >>>>>>> When Steve comes back from somewhere complaining of too much hate, >>>>>>> you know that place is a hell-hole. >>>>>>> >>>>>>> -Ty >>>>>>> >>>>>>> >>>>>>> >>>>>>> -Ty >>>>>>> >>>>>>> On Tue, May 17, 2016 at 4:48 AM, That One Guy /sarcasm < >>>>>>> <[email protected]>[email protected]> wrote: >>>>>>> >>>>>>>> holy nuggets of hate. I just got done reading the 31 pages of hate, >>>>>>>> now i remember why i dont ever go there >>>>>>>> >>>>>>>> On Tue, May 17, 2016 at 12:49 AM, That One Guy /sarcasm < >>>>>>>> [email protected]> wrote: >>>>>>>> >>>>>>>>> wow, port 19081 turns out to be pretty popular >>>>>>>>> one im cleaning up now has a child connection active in it since i >>>>>>>>> logged in, im curious what its doing >>>>>>>>> >>>>>>>>> On Mon, May 16, 2016 at 10:55 PM, Mathew Howard < >>>>>>>>> <[email protected]>[email protected]> wrote: >>>>>>>>> >>>>>>>>>> ...unless of course it gets on a PC at the office... in which >>>>>>>>>> case we'd be in trouble. >>>>>>>>>> >>>>>>>>>> On Mon, May 16, 2016 at 10:53 PM, Mathew Howard < >>>>>>>>>> <[email protected]>[email protected]> wrote: >>>>>>>>>> >>>>>>>>>>> True! but that hasn't happened yet, and it still shouldn't get >>>>>>>>>>> beyond that customer's radio. >>>>>>>>>>> >>>>>>>>>>> On Mon, May 16, 2016 at 9:35 PM, Mike Hammett < >>>>>>>>>>> <[email protected]>[email protected]> wrote: >>>>>>>>>>> >>>>>>>>>>>> Until it gets delivered via Flash or Java or something >>>>>>>>>>>> else... ;-) >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> ----- >>>>>>>>>>>> Mike Hammett >>>>>>>>>>>> Intelligent Computing Solutions <http://www.ics-il.com/> >>>>>>>>>>>> <https://www.facebook.com/ICSIL> >>>>>>>>>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> >>>>>>>>>>>> <https://www.linkedin.com/company/intelligent-computing-solutions> >>>>>>>>>>>> <https://twitter.com/ICSIL> >>>>>>>>>>>> Midwest Internet Exchange <http://www.midwest-ix.com/> >>>>>>>>>>>> <https://www.facebook.com/mdwestix> >>>>>>>>>>>> <https://www.linkedin.com/company/midwest-internet-exchange> >>>>>>>>>>>> <https://twitter.com/mdwestix> >>>>>>>>>>>> The Brothers WISP <http://www.thebrotherswisp.com/> >>>>>>>>>>>> <https://www.facebook.com/thebrotherswisp> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> >>>>>>>>>>>> ------------------------------ >>>>>>>>>>>> *From: *"Mathew Howard" < <[email protected]> >>>>>>>>>>>> [email protected]> >>>>>>>>>>>> *To: *"af" < <[email protected]>[email protected]> >>>>>>>>>>>> *Sent: *Monday, May 16, 2016 9:16:40 PM >>>>>>>>>>>> *Subject: *Re: [AFMUG] ubnt malware >>>>>>>>>>>> >>>>>>>>>>>> If you have firewall rules at the edge of the network blocking >>>>>>>>>>>> the management ports ti the airrouters that are on public IPs, >>>>>>>>>>>> they're >>>>>>>>>>>> probably fine. We still have some radios that are on old firmware, >>>>>>>>>>>> but I >>>>>>>>>>>> haven't been able to find anything on our network that's infected. >>>>>>>>>>>> Fortunately, when I was setting up the firewall rules to block >>>>>>>>>>>> access to >>>>>>>>>>>> the CPEs from outside our network, I decided it was desirable to >>>>>>>>>>>> block >>>>>>>>>>>> customers from being able to get to other customers radios as >>>>>>>>>>>> well... which >>>>>>>>>>>> should break the self replicating part of this thing, so even if >>>>>>>>>>>> it does >>>>>>>>>>>> somehow get into our network, it shouldn't be able to get far. >>>>>>>>>>>> >>>>>>>>>>>> That said, I'm updating everything that isn't on at least 5.6.2 >>>>>>>>>>>> right away. >>>>>>>>>>>> On May 16, 2016 8:41 PM, "That One Guy /sarcasm" < >>>>>>>>>>>> <[email protected]>[email protected]> wrote: >>>>>>>>>>>> >>>>>>>>>>>> yeah, thats amazing me, one fella was complaining about how >>>>>>>>>>>> much of a problem it would be to take a unit offline to get on a >>>>>>>>>>>> bench. I >>>>>>>>>>>> would think if things are that bad that your network is >>>>>>>>>>>> progressively >>>>>>>>>>>> shutting down, convenience would be the least of your concerns. >>>>>>>>>>>> >>>>>>>>>>>> I have to investigate a couple anomalies on the network, in the >>>>>>>>>>>> back of my mind Im hoping the air routers have been hit to put a >>>>>>>>>>>> nail in >>>>>>>>>>>> their coffins so we cam go with mikrotiks as the CPE router instead >>>>>>>>>>>> >>>>>>>>>>>> On Mon, May 16, 2016 at 8:33 PM, Josh Reynolds < >>>>>>>>>>>> <[email protected]>[email protected]> wrote: >>>>>>>>>>>> >>>>>>>>>>>>> Or threatening to sue because of their own personal ignorance >>>>>>>>>>>>> and negligence. >>>>>>>>>>>>> On May 16, 2016 8:32 PM, "Mike Hammett" < <[email protected]> >>>>>>>>>>>>> [email protected]> wrote: >>>>>>>>>>>>> >>>>>>>>>>>>>> A good amount of it is just people that don't know any better >>>>>>>>>>>>>> making false observations. >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> ----- >>>>>>>>>>>>>> Mike Hammett >>>>>>>>>>>>>> Intelligent Computing Solutions <http://www.ics-il.com/> >>>>>>>>>>>>>> <https://www.facebook.com/ICSIL> >>>>>>>>>>>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> >>>>>>>>>>>>>> <https://www.linkedin.com/company/intelligent-computing-solutions> >>>>>>>>>>>>>> <https://twitter.com/ICSIL> >>>>>>>>>>>>>> Midwest Internet Exchange <http://www.midwest-ix.com/> >>>>>>>>>>>>>> <https://www.facebook.com/mdwestix> >>>>>>>>>>>>>> <https://www.linkedin.com/company/midwest-internet-exchange> >>>>>>>>>>>>>> <https://twitter.com/mdwestix> >>>>>>>>>>>>>> The Brothers WISP <http://www.thebrotherswisp.com/> >>>>>>>>>>>>>> <https://www.facebook.com/thebrotherswisp> >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> >>>>>>>>>>>>>> ------------------------------ >>>>>>>>>>>>>> *From: *"That One Guy /sarcasm" < <[email protected]> >>>>>>>>>>>>>> [email protected]> >>>>>>>>>>>>>> *To: * <[email protected]>[email protected] >>>>>>>>>>>>>> *Sent: *Monday, May 16, 2016 8:19:00 PM >>>>>>>>>>>>>> *Subject: *[AFMUG] ubnt malware >>>>>>>>>>>>>> >>>>>>>>>>>>>> From what im reading in their forums something set off over >>>>>>>>>>>>>> the weekend? or is it ubnt douche nozzles? >>>>>>>>>>>>>> >>>>>>>>>>>>>> It sounds almost as if this malware is actively being >>>>>>>>>>>>>> manipulated (changing from key access to foul username/password, >>>>>>>>>>>>>> wandering >>>>>>>>>>>>>> control ports, etc, like script kiddies found a new toy? >>>>>>>>>>>>>> >>>>>>>>>>>>>> is this thing self propagating from the device? >>>>>>>>>>>>>> >>>>>>>>>>>>>> -- >>>>>>>>>>>>>> If you only see yourself as part of the team but you don't >>>>>>>>>>>>>> see your team as part of yourself you have already failed as >>>>>>>>>>>>>> part of the >>>>>>>>>>>>>> team. >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> -- >>>>>>>>>>>> If you only see yourself as part of the team but you don't see >>>>>>>>>>>> your team as part of yourself you have already failed as part of >>>>>>>>>>>> the team. >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> -- >>>>>>>>> If you only see yourself as part of the team but you don't see >>>>>>>>> your team as part of yourself you have already failed as part of the >>>>>>>>> team. >>>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> -- >>>>>>>> If you only see yourself as part of the team but you don't see your >>>>>>>> team as part of yourself you have already failed as part of the team. >>>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>> >>>> >>>> >>>> -- >>>> If you only see yourself as part of the team but you don't see your >>>> team as part of yourself you have already failed as part of the team. >>>> >>> >>> >> >> >> -- >> If you only see yourself as part of the team but you don't see your team >> as part of yourself you have already failed as part of the team. >> > > > > -- > If you only see yourself as part of the team but you don't see your team > as part of yourself you have already failed as part of the team. > -- If you only see yourself as part of the team but you don't see your team as part of yourself you have already failed as part of the team.
