Send me the details Pete. I can test. Sent from my iPhone
On Dec 5, 2018, at 13:33, Pete Brown <j...@chykn.com<mailto:j...@chykn.com>> wrote: I'm sure some of you noticed, but earlier this year Cisco started releasing patches to kill off the last sanctioned method of getting to platformConfig.xml. When you run "utils create report platform" on recent versions, it's no longer in the report. Someone in Boxborough really knows how to put the "cus(s)" in "customers"! https://quickview.cloudapps.cisco.com/quickview/bug/CSCvh62145<https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fquickview.cloudapps.cisco.com%2Fquickview%2Fbug%2FCSCvh62145&data=02%7C01%7C%7Cc6591add38944e8fed8a08d65ae02d7e%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636796316207695746&sdata=uscFsDoMF7rch1EG82B%2FACCNyeipo9tynla8r%2B4NIMY%3D&reserved=0> I'm testing a new version of the UCOS Password Decrypter that acquires the file for you. To use this feature, you enable remote support on your UCOS host then plug in the UCOS host IP, remote support user and remote support passphrase. The app decodes the passphrase, pulls the file via SSH and displays the passwords. Need a few volunteers to test before I update the tools page. If you're interested, let me know. Would post a temp link here but I don't want yet another dead link floating around. -Pete _______________________________________________ cisco-voip mailing list cisco-voip@puck.nether.net<mailto:cisco-voip@puck.nether.net> https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpuck.nether.net%2Fmailman%2Flistinfo%2Fcisco-voip&data=02%7C01%7C%7Cc6591add38944e8fed8a08d65ae02d7e%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636796316207695746&sdata=aFINnEM8VXBNwBku4hlmmr2Q8ofBceYG06jexG40fDU%3D&reserved=0
_______________________________________________ cisco-voip mailing list cisco-voip@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-voip