After much investigation, it appears that Firefox Sync, because it
synchronises your browsing history and passwords, is secured by the key
stored on your devices. So Mozilla can't access your data without the key,
but if you lose it (by having all your Firefox devices wiped, as in this
case),
Another good reason for Google Chrome...
I had a similar experience, only I didn't have a USB key. I was to have a new
PC in my office the next day (with the old one still on line for a few more
days, so I thought), and I found FF Sync...
Next morning, SURPRISE! - the mother board on my POS
Well, some of those configurations appear to be unstable. That could lead to
increased carpet sales!
(BTW, hinting at a particular person is one thing; giving his full name on a
forum is something I'd prefer not seeing. Thanks!)
From: Webster [mailto:webs...@carlwebster.com]
Sent: Monday,
I'm mentioning no names
http://www.linkedin.com/in/jmaldrich
On 3 July 2012 12:59, Richard McClary richard.mccl...@aspca.org wrote:
Well, some of those configurations appear to be unstable. That could
lead to increased carpet sales!
** **
(BTW, hinting at a particular person is one
John is deep down a really nice guy. I have tried to help him a couple of
times when I was at previous employer as we had techs in his general vicinity.
His main issue was his previous employer that did carpets was #3 on the 10
things I wish I'd known... list from yesterday. Even though he
I had a few offline email discussions with him and found him quite decent.
I wish he'd just done himself a favour and bought that SAN :-0
On 3 July 2012 13:24, Webster webs...@carlwebster.com wrote:
John is deep down a really nice guy. I have tried to help him a couple
of times when I was at
Thank you - this is much appreciated! Also glad to hear about Shooky - that's
another name not seen lately
From: Webster [mailto:webs...@carlwebster.com]
Sent: Tuesday, July 03, 2012 7:24 AM
To: NT System Admin Issues
Subject: RE: RAID Explained
John is deep down a really nice guy. I have
Curious if anyone out there is keeping their Hyper-V hosts in a perimeter
network. Or are most people domain joining them. My initial thought was to
have them all in a perimeter network with no domain, but with VMM inside
the domain. Finding some limitations to this configuration. Specifically
If I understand you, the requirement driving your desire to also save into
a database is being able to query and report?
If so, I think you might be over architecting. Then again, I'm a believer
in KISS, so maybe I'm over simplifying.
Why not just use SQL Server Reporting Services to
We’re all young at heart.
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Monday, July 02, 2012 8:15 PM
To: NT System Admin Issues
Subject: RE: RAID Explained
Just fyi, I was pulling your leg about “girl” vs. “woman”. :-P
From: Lora Cates
Oh my, someone has discovered the power of Google and public archives.
I think I shall faint in fear.
Kurt
On Mon, Jul 2, 2012 at 10:57 PM, Info at Wickr i...@mywickr.com wrote:
Hello Gentlemen,
Thank you for discussing Wickr with your peers last week. We stumbled upon
the link below to
From our experience, those that were prompted for user credentials had Outlook
Anywhere enabled and ActiveSync disabled. Once we disabled Outlook Anywhere,
via GPO, the users were no longer prompted for a user name and password.
One user was still having issues with the credentials prompt and
You may want to double check your privacy settings and disable this forum
from being public as it, as well as your email addresses are searchable and
indexed by Google, and therefore you are quite easy to track down and kill
in the event we decide to exact revenge for dismissing our product as
I have found a regular session of Mozbackup to be quite useful...
Kurt
On Tue, Jul 3, 2012 at 4:52 AM, Richard McClary
richard.mccl...@aspca.org wrote:
Another good reason for Google Chrome…
I had a similar experience, only I didn’t have a USB key. I was to have a
new PC in my office the
I have one client with two Hyper-V hosts and one is domain-joined and the other
is workgroup - mostly because I burned myself once and couldn't remember the
local credentials on a VM host that had a DC on it. Now I always log in to the
hosts with local creds weather it's domain-joined or not.
And in contrast to what I just sent:
Hyper-V: Domain membership is recommended for servers running Hyper-V
http://technet.microsoft.com/en-us/library/ee941123(v=ws.10).aspx
Guess I'll be changing my ways :)
David Lum
Systems Engineer // NWEATM
Office 503.548.5229 // Cell (voice/text) 503.267.9764
Oh, I've learned the hard way about backups recently
On 3 July 2012 14:28, Kurt Buff kurt.b...@gmail.com wrote:
I have found a regular session of Mozbackup to be quite useful...
Kurt
On Tue, Jul 3, 2012 at 4:52 AM, Richard McClary
richard.mccl...@aspca.org wrote:
Another good reason
.and if you generate a new recovery key all your data is removed!
Are you sure about that part. It kind of seems to defeat the systems purpose.
From their directions on I've lost my recovery key I would think it works.
Never mind, I just saw the fine print. Now that is downright silly.
Warning: This will erase all of your data stored on the server. New data will
be secured by this key and then uploaded. Your other devices will stop syncing,
unless you update them with the new Recovery Key.
-Original
Lions and tigers and bears, oooh, my!
Stephen L. Holtz, MCSE, MCT
Director of Information Technology
Addison Reserve Country Club
7201 Addison Reserve Blvd.
Delray Beach, Fl. 33446
Ph: 561-455-1220
Cell: 561-441-0646
http://www.addisonreserve.cc/ www.addisonreserve.cc
Description:
From right underneath the instructions you linked to:-
*Warning:* This will erase all of your data stored on the server. New data
will be secured by this key and then uploaded. Your other devices will stop
syncing, unless you update them with the new Recovery Key.
Basically, it's unusable data
If you are concerned about security, consider a separate domain for the
perimeter guests vs the internal guests, depending on your architecture.
We configured totally different hosts for our DMZ guests than for our
internal guests.
* *
*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the
That's priceless and now hanging in my cube.
Regards,
Don Guyer
Catholic Health East - Information Technology
Enterprise Directory Messaging Services
3805 West Chester Pike, Suite 100, Newtown Square, Pa 19073
email: dgu...@che.orgmailto:dgu...@che.org
Office: 610.550.3595 | Cell:
Maybe a robots.txt file might help... J
Z
Edward Ziots
CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org
From: James Rankin [mailto:kz2...@googlemail.com]
Sent: Tuesday, July 03, 2012 9:25 AM
To: NT System Admin Issues
Subject: Re: Wickr on
I'd probably actually have had a backup! :-(
---Blackberried
-Original Message-
From: Webster webs...@carlwebster.com
Date: Tue, 3 Jul 2012 13:54:09
To: NT System Admin Issuesntsysadmin@lyris.sunbelt-software.com
Reply-To: NT System Admin Issues
Beware of domain joining a Hyper-V host when the only DC is a VM on the same
host. Can be a problem if the DC won't boot and you can only manage the host
with a domain account! For those environments, workgroup, or managing using
a local account just as though it was a workgroup, is the better
Well, in my business, I'd guess about half of those apply to me.
I am fairly specialized and I do very little general purpose IT consulting.
Don't ask me a desktop question - I probably can't answer it (unless you are
asking me how to migrate 25K Windows XP desktops to Windows 7 - that I can
Sadly not. I still don't know what happened, but something in my house
happened that caused two hard drives on a TeraStation to fail, two USB keys
suddenly became blank, the SD card wiped on my Blackberry, and the BIOS
failed on my laptop and my workstation. All instances of Firefox I had
No, security is not the main consideration in this particular situation.
Small office environment.
I had always heard, not specifically read, that the Hyper-V hosts should
not be domain joined. Should have done more reading before I set this up.
Thanks
Christopher Bodnar
Enterprise
Exactly.
And, this just reinforces my belief that it's snake oil...
Kurt
On Tue, Jul 3, 2012 at 6:24 AM, James Rankin kz2...@googlemail.com wrote:
You may want to double check your privacy settings and disable this forum
from being public as it, as well as your email addresses are searchable
It was the MI5 black ops helicopters over your house that induced an EMF blast
so large it fried all that stuff. Might as well make you up a pan of gravy as
anything fried needs some gravy to make it better. :)
Carl Webster
Consultant and Citrix Technology Professional
Not a big deal to join or disjoin them, as long as you know local admin creds.
From: Christopher Bodnar [mailto:christopher_bod...@glic.com]
Sent: Tuesday, July 03, 2012 7:38 AM
To: NT System Admin Issues
Subject: Re: VMM/Hyper-V question
No, security is not the main consideration in this
Those iranians tell you too much :-)
---Blackberried
-Original Message-
From: Webster webs...@carlwebster.com
Date: Tue, 3 Jul 2012 15:19:36
To: NT System Admin Issuesntsysadmin@lyris.sunbelt-software.com
Reply-To: NT System Admin Issues
ntsysadmin@lyris.sunbelt-software.comSubject:
It could be the BadTimes virus is still lurking about.
From: Webster [mailto:webs...@carlwebster.com]
Sent: Tuesday, July 03, 2012 10:20 AM
To: NT System Admin Issues
Subject: RE: OT: making Firefox Sync work without another device
It was the MI5 black ops helicopters over your house that
Ah, that's why you know then!
---Blackberried
-Original Message-
From: Webster webs...@carlwebster.com
Date: Tue, 3 Jul 2012 15:50:21
To: NT System Admin Issuesntsysadmin@lyris.sunbelt-software.com
Reply-To: NT System Admin Issues
ntsysadmin@lyris.sunbelt-software.comSubject: RE: OT:
:)
-lc
From: Webster webs...@carlwebster.com
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Tuesday, July 3, 2012 8:42 AM
Subject: RE: RAID Explained
I am missing a LOT more than a “was”! J
Carl Webster
Consultant and Citrix
Tech-Ed 2002 was here in Dallas and as always happens the night life area was
full of attendees. One of my professional acquaintances is a very lovely lady
who, at the time, was a network administrator for a name you’d all recognize.
She was dancing on the bar at Coyote Ugly; an attendee
Oh sexism is alive and well in IT. I don't think I qualify as a booth-bunny
but just because I have girl parts doesn't mean I have no intellect or knack
for science/technology. :P
-lc
From: Daniel Chenault dchena...@lgnetworksinc.com
To: NT System Admin
Need help please.
We have 3 x 2008r2 domain controllers.
We've been fighting with some unusually slow domain logins and other flakiness
for a while.
For example navigating between OUs in active directory users and computers is
painfully slow.
While testing basic connectivity, I found that a ipv6
Did you get that through a job or on your own Carl ?
Just curious how you would do that (if on your own) ?
From: Webster webs...@carlwebster.com
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Tuesday, July 3, 2012 10:50 AM
Subject:
My first “real” IT job was working alongside one of the most intelligent women
I have met in my working career. Smart, knew how to talk to people back when
techies weren’t exactly known for that and was willing to share knowledge
anytime, no matter how much longer it took to do the task and
This is very similar to a situation I experienced the other day. It's all
in a thread over on the Exchange list (Exchange 2010 AD Topology service
weirdness). Unfortunately, I don't have a resolution for you. In
addition to the Exchange issue, I saw exactly the same thing with slow
logons, slow
On Tue, Jul 3, 2012 at 10:07 AM, Glen Johnson gjohn...@vhcc.edu wrote:
Need help please.
We have 3 x 2008r2 domain controllers.
We've been fighting with some unusually slow domain logins and other
flakiness for a while.
For example navigating between OUs in active directory users and
Stereotypes are usually not much more than odds and/or ratios. AKA IF (x)
THEN odds are that (y) fits stereotype (z).
X=At computer/tech event
Y=this beautiful woman
Z=not an attendee
X=At a NASCAR race
Y=the attendee
Z=drinks beer and drives a pickup (possibly at the same time)
Some
OMG!! That was hilarious!! If that is the lady i think it is!! It was a
great time!!
On Jul 3, 2012 9:51 AM, Daniel Chenault dchena...@lgnetworksinc.com
wrote:
Tech-Ed 2002 was here in Dallas and as always happens the night life
area was full of attendees. One of my professional
Agreed. But statistically you will offend most individuals by pre-judging. :)
-lc
From: David Lum david@nwea.org
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Tuesday, July 3, 2012 12:32 PM
Subject: RE: RAID Explained
LOL – so true!
From: Lora Cates [mailto:lora.ca...@rocketmail.com]
Sent: Tuesday, July 03, 2012 10:39 AM
To: NT System Admin Issues
Subject: Re: RAID Explained
Agreed. But statistically you will offend most individuals by pre-judging. :)
-lc
From: David Lum
In England, you have to be sponsored by someone to get security clearance,
normally a business or agency who do work with the higher echelons of
government. It leads to lots of chicken and egg situations when trying to get
work with these agencies. I have my NPPV for working with the police but
Interesting because when I started attending the HP Technology Forum a lot of
the attendees wore jeans, tshirts, ponytails, beards and were men. Now most
are still men, but wear khakis and polos, clean shaven (or goatee), and very
few wear ponytails. And there are noticeably more women (and
Yes, Kat, we're speaking of the same blonde lady with the beautiful accent.
Daniel Chenault
dchena...@lgnetworksinc.com
[Description: Description: cid:image001.jpg@01CCF24C.F9B05160]
From: Kat Aylward Langan [mailto:messagel...@gmail.com]
Sent: Tuesday, July 03, 2012 12:37 PM
To: NT System Admin
:-D yep that's one great accent!
and those legs!
On Tue, Jul 3, 2012 at 11:23 AM, Daniel Chenault
dchena...@lgnetworksinc.com wrote:
Yes, Kat, we’re speaking of the same blonde lady with the beautiful
accent.
** **
Daniel Chenault
dchena...@lgnetworksinc.com
[image:
Oh, IT has definitely changed, as it has aged. There are still smart young pups
out there (and I’m amazed at how smart some of them are), but some of us older
guys and gals are still pretty active.
Ain’t that right, Web? ☺
From: Maglinger, Paul [mailto:pmaglin...@scvl.com]
Sent: Tuesday, July
Oh yeah. And that 16 year old (looking) Brian Desmond is just one amazing
young pup! ☺
Carl Webster
Consultant and Citrix Technology Professional
http://www.CarlWebster.comhttp://www.carlwebster.com/
From: Michael B. Smith [mailto:mich...@smithcons.com]
Subject: RE: RAID Explained
Oh, IT has
Admittedly, I cut my ponytail off 11 years ago. ☺
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Tuesday, July 03, 2012 2:58 PM
To: NT System Admin Issues
Subject: RE: RAID Explained
Oh, IT has definitely changed, as it has aged. There are still smart young pups
out there (and I’m
Believe me, I ain't worried one bit about my clearance being suspended,
deactivated, dropped or ignored. I am busy enough without dealing with low
paying government gigs and all the payment hassles. I mean, come on, 16 pages
of 8 pt text to explain how I need to bill and exactly the verbiage
Ponytails here (in my office) are usually on the Linux males…
From: Maglinger, Paul [mailto:pmaglin...@scvl.com]
Sent: Tuesday, July 03, 2012 1:12 PM
To: NT System Admin Issues
Subject: RE: RAID Explained
Admittedly, I cut my ponytail off 11 years ago. ☺
From: Michael B. Smith
My hair fell out so I didn’t have any choice….
From: Maglinger, Paul [mailto:pmaglin...@scvl.com]
Sent: Tuesday, July 03, 2012 3:12 PM
To: NT System Admin Issues
Subject: RE: RAID Explained
Admittedly, I cut my ponytail off 11 years ago. ☺
From: Michael B. Smith [mailto:mich...@smithcons.com]
However, the billing and invoicing to the government becomes a recoverable
expense you can incorporate into rates. Or so the people that wrote those
16 pages will claim. This is supposedly to prevent the $800 hammer.
On Tue, Jul 3, 2012 at 4:11 PM, Webster webs...@carlwebster.com wrote:
Funny, that’s about the time I started working with Linux. ☺
From: David Lum [mailto:david@nwea.org]
Sent: Tuesday, July 03, 2012 3:22 PM
To: NT System Admin Issues
Subject: RE: RAID Explained
Ponytails here (in my office) are usually on the Linux males…
From: Maglinger, Paul
Kurt.
Turned on logging both allowed and dropped in the 2008r2 server.
I don't see any entries for dropped traffic from my workstation, but if I ping
from server to workstation, then ping workstation to server, I see the allowed
packed.
What I do see for dropped packets is a lot of this which is
Take it the Linux Male is the opposite of the Alpha Male? :-0
---Blackberried
-Original Message-
From: David Lum david@nwea.org
Date: Tue, 3 Jul 2012 20:22:12
To: NT System Admin Issuesntsysadmin@lyris.sunbelt-software.com
Reply-To: NT System Admin Issues
Did you take before and after pictures?
Carl Webster
Consultant and Citrix Technology Professional
http://www.CarlWebster.comhttp://www.carlwebster.com/
From: Daniel Chenault [mailto:dchena...@lgnetworksinc.com]
Subject: RE: RAID Explained
I cut mine off May 2011. Had that thing down to my
Nah… those who have known me for years or seen me on stage know how rad I look
with a long ‘tail. ☺
Daniel Chenault
dchena...@lgnetworksinc.com
[Description: Description: cid:image001.jpg@01CCF24C.F9B05160]
From: Webster [mailto:webs...@carlwebster.com]
Sent: Tuesday, July 03, 2012 4:17 PM
To:
On the machine running wireshark (which should not be either the
client or server with which you're running the tests, and which is
attached to the monitor/span port on the switch):
- Do you see echo requests by the server when you use it to ping
the client?
- Do you see replies from the
No, you are not overthinking this.
It's not extremely complicated, but it's very good to do all of your
reading and get your ducks all in a row before you start this.
I went with a two-tier installation - the root CA is a VM that's shut
down and copied to a portable disk, and is not a member of
Thanks for the advice and I'll take a look at the book.
Jim
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com] Sent: Tuesday, July 03, 2012 4:17
PM
To: NT System Admin Issues
Subject: Re: Certificate authority
No, you are not overthinking this.
It's not extremely
Have you checked the IPv6 DNS records for your DCs? Do they look right?
On Tue, Jul 3, 2012 at 1:07 PM, Glen Johnson gjohn...@vhcc.edu wrote:
Need help please.
We have 3 x 2008r2 domain controllers.
We've been fighting with some unusually slow domain logins and other
flakiness for a while.
Seems the e-book for $50 might be the best way to go as the paperback ones are
a tad steep! Must be a signed copy :)
http://www.amazon.com/s/ref=nb_sb_noss_1?url=search-alias%3Dapsfield-keywords=Windows+Server%AE+2008+PKI+and+Certificate+Security
Jim
-Original Message-
From: Kurt
Speak for your self please. I still have family that would swear I have no
heart let alone a young one. Jon
From: pmaglin...@scvl.com
To: ntsysadmin@lyris.sunbelt-software.com
Subject: RE: RAID Explained
Date: Tue, 3 Jul 2012 13:12:46 +
We’re all young at heart.
From: Michael
Yeah, I swallowed hard and turned away when I saw those, too.
However, I can also point you at some good reading material in
Technet. Start here, and follow the bouncing ball:
http://technet.microsoft.com/en-us/library/cc772393%28v=WS.10%29.aspx
On Tue, Jul 3, 2012 at 4:48 PM,
Must be a great book! ;)
http://www.amazon.com/gp/offer-listing/B004RP438O/ref=dp_olp_new?ie=UTF8condition=new
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Tuesday, July 03, 2012 4:17 PM
To: NT System Admin Issues
Subject: Re: Certificate authority
No, you
I agree with Ken that this should be irrelevant.
I would use Fiddler and figure out what's going on at the HTTP level. There was
an issue around this with cert based auth enabled on the IIS end and a recent
(April or May ?) Outlook 2010 rollup in place.
Thanks,
Brian Desmond
That would indicate to me that the user was using MAPI, and then (for some
reason, e.g. network issue) shifted to RPC over HTTPS (Outlook Anywhere),
and the prompt came up (as Outlook is probably now connecting to a site in a
non-Intranet zone, or is using Basic Auth). Has nothing to do with
I think this really depends on the security policies of your environment.
Current project has two main classifications of DMZ: one which allows
connections from outside the environment (e.g. incoming requests), and one
that allows connections to external devices (i.e. outgoing requests). I
The Komar book is worth getting (well, not for $7000!). I've got both editions
- at the moment I think it's the best book out there.
Two-tier vs One Tier:
a) what are you doing to do if the issuing CA is compromised, or needs to be
rebuilt? If you have a system to remove the old root CA cert
75 matches
Mail list logo