Saturday, August 29, 2015

Windows 10 Upgrade Install Failing With A PRE_OS Error (Something Happened)

I have seen other guides that say to fix a failed Windows 10 install by doing a clean boot among other things:

  • disabling items in MSCONFIG
  • run setup.exe as administrator
  • ensure that a bunch of services are set to automatic and start them
  • disabled all antivirus
  • boot into safe mode and run delete both folders that start with $Windows at the root of the C: Drive
  • change your locale settings.
  • remove all previous files, settings, and applications
  • Create a registry key called AllowOSUpgrade to 1
I tried all of these at the same time, and none of them worked. The upgrade to Windows 10 kept failing and it would not give any reason why other than an inexplicable error message. I did two things after this: I installed Windows 7 Service Pack 1, which was not installed before. Still no dice. So I imaged the drive to another drive, and lo and behold, Acronis True Image found some unreadable sectors. I set it to ignore read errors while cloning, then booted up into 7 and Windows 10 installed just fine!

People are also saying to do a clean install of 7 or 8 first, or run chkdsk, which could be the reason that the upgrade then proceeds, if the hard drive errors are correctable!

Hey Apple, will you be giving away OS X version 11 away for free? (Or OS XI or OS 11 or OS 10.11?)

Wednesday, August 19, 2015

How To Permanently Disable Windows 10 Home Edition Updates

This will also work on Windows 10 Pro or Enterprise, but on those editions you can merely disable the Windows Update service by running services.msc, finding the Windows Update services, stopping it and setting startup to Disabled.

Please note that this may also block Windows 10 from phoning home to Microsoft, and will also likely disable most Microsoft online products (OneDrive, etc...)


Disable Windows 10 Updates:

Click on Start and Run, or type the "Windows Key" and "R", then type this command:

notepad %windir%\system32\drivers\etc\hosts

or this one:

notepad c:\windows\system32\drivers\etc\hosts

Add these lines below to the hosts file and click save. If it asks you for a location to save, then launch notepad as an administrative user and then open the hosts file. You'll have to type this filename directly into the File Open box, since normally only .txt files are shown:

c:\windows\system32\drivers\etc\hosts

# Important!
0.0.0.0    0.0.0.0     # fix for network status and diagnostic tools
0.0.0.0  dns.msftncsi.com
0.0.0.0  ipv6.msftncsi.com
0.0.0.0  win10.ipv6.microsoft.com
0.0.0.0  ipv6.msftncsi.com.edgesuite.net
0.0.0.0  a978.i6g1.akamai.net
0.0.0.0  win10.ipv6.microsoft.com.nsatc.net
0.0.0.0  en-us.appex-rf.msn.com
0.0.0.0  v10.vortex-win.data.microsoft.com
0.0.0.0  client.wns.windows.com
0.0.0.0  wildcard.appex-rf.msn.com.edgesuite.net
0.0.0.0  v10.vortex-win.data.metron.life.com.nsatc.net
0.0.0.0  wns.notify.windows.com.akadns.net
0.0.0.0  americas2.notify.windows.com.akadns.net
0.0.0.0  travel.tile.appex.bing.com
0.0.0.0  any.edge.bing.com
0.0.0.0  fe3.delivery.mp.microsoft.com
0.0.0.0  fe3.delivery.dsp.mp.microsoft.com.nsatc.net
0.0.0.0  ssw.live.com
0.0.0.0  ssw.live.com.nsatc.net
0.0.0.0  login.live.com.nsatc.net
0.0.0.0  directory.services.live.com
0.0.0.0  directory.services.live.com.akadns.net
0.0.0.0  bl3302.storage.live.com
0.0.0.0  skyapi.live.net
0.0.0.0  bl3302geo.storage.dkyprod.akadns.net
0.0.0.0  skyapi.skyprod.akadns.net
0.0.0.0  skydrive.wns.windows.com
0.0.0.0  register.mesh.com
0.0.0.0  BN1WNS2011508.wns.windows.com
0.0.0.0  settings-win.data.microsoft.com
0.0.0.0  settings.data.glbdns2.microsoft.com
0.0.0.0  OneSettings-bn2.metron.live.com.nsatc.net
0.0.0.0  watson.telemetry.microsoft.com
0.0.0.0  watson.telemetry.microsoft.com.nsatc.net
0.0.0.0  vortex.data.microsoft.com
0.0.0.0  vortex-win.data.microsoft.com
0.0.0.0  telecommand.telemetry.microsoft.com
0.0.0.0  telecommand.telemetry.microsoft.com.nsatc.net
0.0.0.0  oca.telemetry.microsoft.com
0.0.0.0  oca.telemetry.microsoft.com.nsatc.net
0.0.0.0  sqm.telemetry.microsoft.com
0.0.0.0  sqm.telemetry.microsoft.com.nsatc.net
0.0.0.0  redir.metaservices.microsoft.com
0.0.0.0  choice.microsoft.com
0.0.0.0  choice.microsoft.com.nsatc.net
0.0.0.0  df.telemetry.microsoft.com
0.0.0.0  reports.wes.df.telemetry.microsoft.com
0.0.0.0  wes.df.telemetry.microsoft.com
0.0.0.0  services.wes.df.telemetry.microsoft.com
0.0.0.0  sqm.df.telemetry.microsoft.com
0.0.0.0  telemetry.microsoft.com
0.0.0.0  watson.ppe.telemetry.microsoft.com
0.0.0.0  telemetry.appex.bing.net
0.0.0.0  telemetry.urs.microsoft.com
0.0.0.0  telemetry.appex.bing.net:443
0.0.0.0  settings-sandbox.data.microsoft.com
0.0.0.0  vortex-sandbox.data.microsoft.com
0.0.0.0  survey.watson.microsoft.com
0.0.0.0  watson.live.com
0.0.0.0  watson.microsoft.com
0.0.0.0  statsfe2.ws.microsoft.com
0.0.0.0  corpext.msitadfs.glbdns2.microsoft.com
0.0.0.0  compatexchange.cloudapp.net
0.0.0.0  cs1.wpc.v0cdn.net
0.0.0.0  a-0001.a-msedge.net
0.0.0.0  statsfe2.update.microsoft.com.akadns.net
0.0.0.0  sls.update.microsoft.com.akadns.net
0.0.0.0  fe2.update.microsoft.com.akadns.net
0.0.0.0  diagnostics.support.microsoft.com
0.0.0.0  corp.sts.microsoft.com
0.0.0.0  statsfe1.ws.microsoft.com
0.0.0.0  pre.footprintpredict.com
0.0.0.0  i1.services.social.microsoft.com
0.0.0.0  i1.services.social.microsoft.com.nsatc.net
0.0.0.0  feedback.windows.com
0.0.0.0  feedback.microsoft-hohm.com
0.0.0.0  feedback.search.microsoft.com
0.0.0.0  preview.msn.com
0.0.0.0  ad.doubleclick.net
0.0.0.0  ads.msn.com
0.0.0.0  ads1.msads.net
0.0.0.0  a.ads1.msn.com
0.0.0.0  a.ads2.msn.com
0.0.0.0  adnexus.net
0.0.0.0  adnxs.com
0.0.0.0  az361816.vo.msecnd.net
0.0.0.0  az512334.vo.msecnd.net


This list came from DSLReports. If anyone has any updates on this issue, such as a more complete list, or a better way to disable updates, please post a comment below.

Monday, February 16, 2015

Server Backup 2012 Error 0x80780119 (not enough disk space to create a Shadow Copy)

Here's a working fix for this issue,

  1. Open Computer.
  2. Right click the C drive (the active drive that contains the Windows system folder)
  3. Click the Shadow Copies tab
  4. Select the EFI volume and click settings
  5. Change the Maximum Size to be two or three times the size that is listed.
  6. If the Maximum Size is unlimited, try setting it to different values.
  7. Repeat steps 3 and 4 for the Recovery Partition.
If you are still having trouble, then change the Shadow Copies storage area from itself to the C drive or another partition (preferably on the same disk or array), for both the Recovery and the EFI boot partition. This should also work for Windows 8.
 
Another possible but untested solution is to use AOMEI Partition Assistant to resize the Recovery Partition and the EFI partition to be two to three times larger.

Here's some background links:


https://sbsland.wordpress.com/2014/08/16/windows-server-2012-r2-backup-fails/


http://serverfault.com/questions/555912/windows-server-2012-r2-vm-back-up-fails-with-insufficient-storage-available-to-c
  1. Disable WinRE (Open elevated command prompt and Run: “reagentc /disable”)
  2. Take system image backup
  3. Enable WinRE (Open elevated command prompt and Run: “reagentc /enable”)
You can write a batch file to run these commands via the scheduler for automation,


https://social.technet.microsoft.com/Forums/en-US/7373a7b8-01c8-4e2b-aaaa-513b7dad56f4/windows-server-2012-r2-vm-back-up-fails-with-insufficient-storage-available-to-create-either-the?forum=windowsbackup

The "USN journal" fix does not work on 2012, since Windows Server 2012 does not allow you to assign the EFI or Recovery partitions a drive letter. But also I have not tinkered with diskpart to see if it's possible via the command-line.


Apparently there is an errant Windows Update that just recently came out, since many people are having this issue but there's no official hotfix.

Saturday, January 10, 2015

Amazon Android App 5.2 Final Version (Before It Was Pulled From The Appstore)

This is the final version of the Amazon's Android app that allowed the downloading of Android Apps from the Amazon Appstore, right before it was pulled and added back without this functionality. It's version 5.2.

com.amazon.mShop.android-2(v5.2.0).apk

Thursday, December 4, 2014

Chromium Pepper Flash Plugin (PPAPI) Downloads

I was looking around with different versions of Chrome's Pepper Flash plugin, and decided to upload all the versions that I had laying around my laptop's hard drive. Even though Chromium Portable comes with a Pepper Flash plugin, it does not work by default without adding this parameter:

--ppapi-flash-path="C:\PortableApps\ChromiumPortable25\App\Chromium\PepperFlash\pepflashplayer.dll"


The PortableApps.com launcher supports passing command-line parameters to the real chrome.exe. It also supports passing parameters on all other apps.

Here's the archive with all the different versions I was able to find. It has version 11.5, 13, 11.6, 11.4, 11.9, 12, and 16 beta. The Version.txt file in the downloaded archvie has the more exact version of Chrome that the Pepper Flash plugin came from.

https://mega.co.nz/#!AZZEiTaJ!4ip9bfNxf_QWsBxt6kPukXYYkMEnq51fZ4bzjzwDH98

Wednesday, November 5, 2014

Scanner Crashing Computer When Plugged Into USB 3.0 Port (Fujitsu Scansnap)

If you have a usb scanner that causes a computer to crash (and I have even seen them prevent the computer from booting) try plugging it into a USB 2.0 port. This should resolve the problem.

Google Fiber Might Be Coming To Atlanta!


As seen on the Atlanta Linux Enthusiasts mailing list:


https://fiber.google.com/newcities/


https://www.linkedin.com/jobs2/view/11785877

https://www.linkedin.com/jobs2/view/14348109

https://www.linkedin.com/jobs2/view/14411648

https://www.linkedin.com/jobs2/view/25071454

https://www.linkedin.com/jobs2/view/20878588

No official announcement yet, but the rumor is that they're going to Brookhaven and Smyrna.

Wednesday, September 10, 2014

5,000,000 Gmail Usernames (The Hack)

Wondering if your gmail password was hacked? Download the complete list, rather than checking on isleaked.com (which might be a phishing site):
https://mega.co.nz/#!5FphCSiY!geIPHZauErsJqXYWq4u_5b5ta9-CrWqpJY58yiqwJeY
Here's the original post:
https://forum.btcsec.com/index.php?/topic/9426-gmail-meniai-parol/
Translation:
Number of records:4929090 update: 2014

At the base of> 60% of valid passwords



Here is lined full database without a password, only for personal checks, do not hit if your mailbox in it.
So it appears that it was already leaked elsewhere, and this was not the original leaker, but was the first public leak.
#tvskit #hacked #gmail #isleaked

Saturday, September 6, 2014

Atlanta's endless concrete jungle

I wonder what is the furthest distance that one can drive in the greater Atlanta area by staying in parking lots. I would imagine its about a mile or so, with the endless strip malls that congeal into one giant megamall.

#suburban #wasteland #concretejungle

Thursday, August 7, 2014

Google Emu Messenger Download

Here is version 1.0b4 of the "Emu Messenger" A.I based text-messaging app before being purchased by Google. I expect it will be subsequent;y infected by the Google+ virus. The filename is is.emu.chat-3a404b3e9dc06b1c5c22a3f404a03c10.apk

https://drive.google.com/file/d/0B_myiKjl8zhZcDhrZlNoUEEyVTA/edit?usp=sharing

Media coverage:

Here is the virustotal virus scan result of the above file:

https://www.virustotal.com/en/file/d77107ae009c234e2d171a282c1b464716bdc780412ad0a3081e89a2020cadf9/analysis/


Wednesday, April 9, 2014

OpenSSL Heartbleed Vulnerable Server Testing

It seems that the OpenSSL heartbeat vulnerability (heartbleed) has not caused that many issues so far, and many servers are patched already. I believe there's a lot of hype behind it. However, time will tell if it causes any impact. Also we may never know what exactly is leaked, we can only know that a hack was attempted by using snort or another IDS/IPS. The version command doesn't really say if you're running 1.0.1[a-f], but it's safe to say that if your version is 1.0.1.[anything] and it's timestamp is older than April 2014, then that version is vulnerable.

These services may be vulnerable:
Any service that runs OpenSSL and uses the STARTTLS method
The TOR client
SMTPS
IMAPS
Android OS
Postgres database
The Salt Stack cluster execution manager


Here's the original vulnerability:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160

Here's the OpenSSL patch to the vulnerable portion of code:
https://github.com/openssl/openssl/commit/731f431497f463f3a2a97236fe0187b11c44aead

Here's a google search for all mentions of heartbeat (but not heartbleed) under github.com/openssl:
https://www.google.com/search?q=site%3Agithub.com%2Fopenssl+heartbeat&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a

This is a search of github.com for heartbleed:
https://www.google.com/search?safe=off&q=site%3Agithub.com+heartbleed&oq=site%3Agithub.com+heartbleed

Here is a quick tool in Python to test for the vulnerability,
http://www.exploit-db.com/exploits/32745/

There's a great writeup at heartbleed.com which goes into detail about the issue. To quote their website:
We have tested some of our own services from attacker's perspective. We attacked ourselves from outside, without leaving a trace. Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, emails and business critical documents and communication.
There is a metasploit script available for use:

https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/scanner/ssl

You can type this OpenSSL command (tested with gnuwin32 openssl binary version 1.0.1.6, dated 1/14/2014). By the way, this version does not have the -tlsextdebug parameter, perhaps it was compiled by the gnuwin32 team without this option.

s_client -connect a23-75-248-141.deploy.static.akamaitechnologies.com:443 -debug -state

Once connected type B and you'll see on a vulnerable host and you won't be disconnected:


B
HEARTBEATING
write to 0x801c17160 [0x801cbc003] (66 bytes => 66 (0x42))
0000 - 18 03 03 00 3d 8f 6f 3c-52 11 83 20 9c a2 c0 49   ....=.o 5 (0x5))
0000 - 18 03 03 00 3d    ....=
read from 0x801c17160 [0x801cb7008] (61 bytes => 61 (0x3D))
0000 - 05 4d f5 c0 db 96 d1 f5-c7 07 e5 17 1f 3b 48 34   .M...........;H4
0010 - 6e 11 9d ba 10 0c 3a 34-eb 7b a5 7c c4 b6 c0 c0   n.....:4.{.|....
0020 - b0 75 0e fe b7 fa 9e 04-e9 4e 4a 7d 51 d3 11 1f   .u.......NJ}Q...
0030 - e2 23 16 77 cb a6 e1 8e-77 84 2b f8 7f    .#.w....w.+..
read R BLOCK


You will get a heartbeat response that looks similar to this one.


On a patched host, you will see a response similar to below and you'll be disconnected:

Enter B

HEARTBEATING
write to 0x801818160 [0x8019d5803] (101 bytes => 101 (0x65))
0000 - 18 03 03 00 60 9c a3 1e-fc 3b 3f 1f 0e 3a fe 4c   ....`....;?..:.L
0010 - a9 33 08 cc 3d 43 54 75-44 7d 2c 7b f3 47 b9 56   .3..=CTuD},{.G.V
0020 - 89 37 c1 43 1c 80 7b 87-66 ff cb 55 5f 8d 1a 95   .7.C..{.f..U_...
0030 - 1b 4c 65 14 21 a1 95 ac-7a 70 79 fc cc a0 cf 51   .Le.!...zpy....Q
0040 - 0f 7e c5 56 14 c8 37 c1-40 0b b8 cb 43 96 8a e6   .~.V..7.@...C...
0050 - 21 42 64 58 62 15 fb 51-82 e6 7f ef 21 1b 6f 87   !BdXb..Q....!.o.
0060 - b9 c2 04 c8 47    ....G



Here's my source for the OpenSSL s_client command above:

https://blog.ipredator.se/2014/04/how-to-test-if-your-openssl-heartbleeds.html

There's also these tools:

https://github.com/titanous/heartbleeder

Web based:
http://filippo.io/Heartbleed/

Test results of Alex top 1000 websites:
https://github.com/musalbas/heartbleed-masstest

Conspiracy Theory Mode
Perhaps NSA introduced this bug into OpenSSL to be able to crack users of The Onion Router?
/Conspiracy Theory Mode

Update: Here's another tool which is supposedly more accurate:
http://possible.lv/tools/hb/

Update (10:37pm est 2014/04/09)
Packetstorm's files related to the vulnerability:
http://packetstormsecurity.com/files/cve/CVE-2014-0160

Sunday, March 23, 2014

Batch Files To Launch VMWare Workstation 7 and VMWare player Services And Close On Exit

I created batch files to start VMWare Workstation 7.0 and VMWare player. It starts the different VMWare services and stops them when VMWare is closed. This was tested on XP, Vista and later may be different.

Workstation batch file:
net start ufad-ws60
net start VMAuthdservice
net start vmnetdhcp
net start "vmware nat service"
net start vmusbarbservice

f:
cd "\VMWare Workstation 7"
vmware.exe

net stop ufad-ws60
net stop VMAuthdservice
net stop vmnetdhcp
net stop "vmware nat service"
net stop vmusbarbservice

Player batch file:
net start ufad-ws60
net start VMAuthdservice
net start vmnetdhcp
net start "vmware nat service"
net start vmusbarbservice

f:
cd "\VMWare Workstation 7"
vmplayer.exe

net stop ufad-ws60
net stop VMAuthdservice
net stop vmnetdhcp
net stop "vmware nat service"
net stop vmusbarbservice

Thursday, February 20, 2014

Install Chrome Web Store Plugins In Chromium Or SRWare Iron

If you use Iron, the version of Chrome that is privacy enhanced by default, you can install plugins from the official Chrome Webstore.

Proxy Switchy for example, uses this URL for browsing from the webstore:

https://chrome.google.com/webstore/detail/proxy-switchysharp/https://chrome.google.com/webstore/detail/proxy-switchy/caehdcpeofiiigpdhbabniblemipncjj

But this is the actual installation URL for the CRX file:

https://clients2.google.com/service/update2/crx?response=redirect&x=id%3Dcaehdcpeofiiigpdhbabniblemipncjj%26uc%26lang%3Dde&prod=chrome

Note the parameter after the id%3D in the url. Once you find the extension you'd like to install in the Webstore, simply replace the red text in the installation URL with the portion of the Webstore URL that looks like random letters and numbers such as the gobbledygook below, and paste the url into the iron or chromium "OneBar", then it should install the extension.

fdsjfkddddkkddjfjghttjfurjvvhggg

These ID's are thirty-two characters long and made up of lowercase letters.

There's a page on the Gentoo Linux Wiki that explains this as well.

Febuary 4, 2015 Update:
It appears that this method no longer works for some reason.

Wednesday, February 12, 2014

Android Anonymous VoIP Calls with TOR

There are good reasons to be able to make anonymous VoIP calls:

Report potential terrorists without you yourself being put on the homeland stupidity/FBI watchlist.

Report crimewatch tips with impunity and anonymity. What if a corrupt policeman is running the crime watch lines and keeps the caller id data?

These are just a few of the many reasons to be able to make anonymous phone calls.

To make anonymous sip calls from an android phone, your phone must be rooted so that orbot can transparently intercept the VoIP apps data and reroute the data through the TOR proxy network. How to root your mobile phone is outside the scope of this post. This was tested on a 4.0 ICS os.

Here's the list of steps:

Install orbot, the android version of TOR which is in the app market.

Install Smslisto (I have tested this with Smslisto, but the other finarea voip apps should work as well)

Setup orbot with the default options. On the settings menu, under transparent proxying, clock Select Apps, and then select Smslisto or your VoIP app then close it.

You can now start orbot by pressing down the robot for two seconds (this is also called a long-tap). Once it starts, you can then start Smslisto and login with your web username and password. Select "VoIP call" to make a data call.

Please note that I am not running a sip server at the moment, so I am not sure if the registration or RTP/UDP audio stream is actually routing through TOR, or it merely seems like it is (this could be proven by running csipdroid in this fashion and testing it against your own sip server and then, once proven, registering to sip.Smslisto.com). I don't have the time to test this at the moment, so consider this post as conceptual. I do know, however, that the call had a delay of a few seconds, whereas a normal data call has very little delay at all on a 4G LTE connection.

Also another caveat is that you can't anonymously put money into a VoIP account, as no internet sip provider that I know of allows bitcoin deposits. Perhaps an entrepreneur out there could start a bitcoin-accepting VoIP service, but considering all of the VoIP telephone fraud that goes on, I'm sure the FBI would be knocking on your door soon. I strongly suggest having a hidden .onion server for stronger anonymity and then using sips/srtp/zrtp for registering to the trunking service. Without srtp, however, all call data (the phone number called and the call audio) would NOT be encrypted from the TOR exit node to the sip trunk. Also you would be using the same exit node for the duration of the call, otherwise the calls udp/TCP session would end and the call would drop.

A better idea is to use i2p for its superior bulk data/UDP stream support, but i2p is a totally separate world from TOR (for example it doesn't have exit nodes per se).

I support the NSA's data collection policies and believe it to be keeping us safer. I am OK with them recording all phone calls as well. As Bill Gates recently stated, its important to know just what they are recording, for how long, who can access it, etc.... There should be oversight, otherwise what prevents the NSA from collecting pin numbers, account numbers and some rogue agent infiltrating bank accounts? I surmise that the NSA has been recording VoIP calls already, even domestic calls. I'm guessing that all efax services that traverse the public internet are being stored as well.

Friday, January 17, 2014

Schemer - Another Google service shutting down

Dear Schemers,

The time has come for
Schemer to power down.

Schemer launched in beta
over a year ago to help
inspire and motivate people
to do more awesome stuff,
and though the app is
shutting down, the
adventures will continue.
You can use the "Explore"
section on Google Maps for
Android and iOS to find
interesting things to do
around you, or Field Trip to
uncover hidden or unique
things in your city, among
others.

All your schemes are
available for download until
February 7, 2014, after
which all data will be
permanently and irrevocably
deleted. You can find the
simple steps to download
your data here.

In the meantime, stay
curious, ambitious, daring,
and above all, stay
adventurous!

Thank you for all your
support on this journey!

- The Schemer Team

Saturday, January 4, 2014


I've started pumping iron again. Mainly free weights with upper body using a dumbbell. Legs and anything that put force on my back not possible at the moment due to possible slipped disc.

I remember as a freshman at Mandeville High School (yes I went there for one year and sat next to miss teen louisiana, Sarah Price, CHS Lions fans) the football players had a chart that shows, given the maximum weight you can lift for a given lift, curl, press etc..., how much to increase your weight lifting at each workout. Does anyone have a chart like this or follow a general rule for upping your weights? Is it better to increase by a fixed rate, say, 5 lbs, or a certain percent? I am aware that to get bulkier you want to do shorter repetitions with heavier weights and for leaner, endurance-type muscle you should do more repititions with less weight.

I am leaning toward just doing whatever I can whenever I can (this will save time as well) until a given weight is easy, and then increase the weight. This would be simpler to stick to as I'm not aiming to be Bruce Lee, just increase my overall strength and long-term health. My favorite quote of Bruce Lee's is (well really the only quote I know, hah) "A man must constantly exceed his level."

Monday, November 4, 2013

SonicWall SSL-VPN setup from SSH Command-Line



Here's how to configure the Sonicwall SSL-VPN from the CLI. I'm trying to improve my SonicWall command line skills, so I thought I'd post this here.

In addition to below, you'll also need to add your user to the SSL-VPN group under Users, Local Users.

I left out the part where you exit the config mode and are prompted to save the configuration. Just type yes.

This uses the tunnel-all mode. You'll need to setup add your routes manually if you're limiting access to certain networks.


C:\Documents and Settings\Administrator>ssh -v
OpenSSH_4.1p1, OpenSSL 0.9.8 05 Jul 2005
usage: ssh [-1246AaCfgkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]
           [-D port] [-e escape_char] [-F configfile]
           [-i identity_file] [-L [bind_address:]port:host:hostport]
           [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]
           [-R [bind_address:]port:host:hostport] [-S ctl_path]
           [user@]hostname [command]


C:\Documents and Settings\Administrator>ssh adminuser@2.2.2.2
The authenticity of host '2.2.2.2 (2.2.2.2)' can't be established.
RSA key fingerprint is --------------------------------------.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '2.2.2.2' (RSA) to the list of known hosts.


Copyright (c) 2012 Dell | SonicWALL, Inc.



Using username 'adminuser'.
Password:

adminuser@SonicwallSerialNumber> conf

config(SonicwallSerialNumber)# ssl-vpn server
(config-sslvpn-server)# port 4433
(config-sslvpn-server)# cipher aes256-sha1
(config-sslvpn-server)# sslvpn-access WAN
(config-sslvpn-server)# exit

config(SonicwallSerialNumber)# ssl-vpn profile
(config-sslvpn-profile)# device-profile "Default Device Profile"
(edit-sslvpn-profile-routes[Default Device Profile])# tunnel-all
(edit-sslvpn-profile-client[Default Device Profile])# exit
(edit-sslvpn-profile[Default Device Profile])# exit
(config-sslvpn-profile)# exit

config(SonicwallSerialNumber)# exit
adminuser@SonicwallSerialNumber> exitRead from remote host 2.2.2.2: Connection reset by peer


Wednesday, October 23, 2013

3com asterisk binaries


Here's 3com's asterisk, v 1.4.1.1, with install instructions (it runs on an embedded type of board). I don't know anything else about this device and software, other than it has device os/flash and boot images. There's some manuals on hp's website for this device*. Hopefully this helps.

If this violates copyrights, please leave a comment and I'll remove it.

http://www.mirrorcreator.com/files/1DUSZHPW/3com_Asterisk_1.4.1.1__for_uploaded.net_.zip_links

* http://pro-networking-h17007.external.hp.com/us/en/support/converter/index.aspx?productNum=JF049A

Friday, November 2, 2012

eBay Removing Wildcards in Searches! (the '*' or asterisk)

Here's the email eBay just sent me. I think the net effect on searches will be negative. It's too bad Google doesn't just buy eBay. Then the search would vastly improve.


Your saved searches will change on November 5

Dear ****,

You're receiving this email because we noticed that you are using a wildcard (search terms with a *) in one or more of your saved searches in My eBay.

Starting on November 5, we will no longer support wildcard searches. We encourage you to revise your saved searches to whole words without the *.

Why are we making this change?

We've made many recent improvements to our search capabilities on eBay that now take into account many spelling variations. This has helped us to offer better search results to our buyers and sellers.

However, after November 5, your wildcard searches will not return the same results you're used to seeing. This means that you may possibly miss out on the new and recently-listed items that you're used to seeing in your saved searches in My eBay and in the emails that we send to you.

Here's how to revise your saved search terms

Replace any * in a wildcard search term with whole words.

EXAMPLE: Replace "Floral silk scar*" with "Floral silk scarf"

You can also include various spellings in a single search term by adding it in parentheses, with each additional term separated by a comma.

EXAMPLE: Replace "Floral silk scar*" with "Floral silk (scarf, scarfs, scarves)"

You can also exclude items from the results for your saved search by adding a "-(items to be excluded)".

EXAMPLE: Replace "Porcelain minifigur* -lot*" with " Porcelain (minifigure, minifigurines) -(lot, lots)"

Please update your saved searches today, so you can stay on top of the things you're most interested in finding on eBay.

Thanks for shopping on eBay!

Saturday, April 28, 2012