Checklist: 15 Things You MUST DO Before Changing WordPress Themes

The hidden cost of those ‘free’ gambling apps The hidden cost of those ‘free’ gambling apps

How to Setup a Legal Notice Before Login in Group Policy

This is a very easy setting that may also substitute for signing the computer usage agreements every year.
1.Open up your Group Policy Management Console (gpmc.msc)
2.Go to the Group Policy Object in your domain, right click on Default Domain Policy and select Edit…
3.Once the Group Policy Editor is up, using the treeview on on the left go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options
4.To edit the title of the windows change: Interactive logon:Message title for users attempting to log on
5.To edit the message text change: Interactive Logon:Message text for users attempting to log on

Use Robocopy to move shares with permissions.

robocopy source destination /E /ZB /DCOPY:T /COPYALL /R:1 /W:1 /V /TEE /LOG:Robocopy.log

Here’s what the switches mean:

source :: Source Directory (drive:\path or \\server\share\path).
destination :: Destination Dir (drive:\path or \\server\share\path).
/E :: copy subdirectories, including Empty ones.
/ZB :: use restartable mode; if access denied use Backup mode.
/DCOPY:T :: COPY Directory Timestamps.
/COPYALL :: COPY ALL file info (equivalent to /COPY:DATSOU). Copies the Data, Attributes, Timestamps, Ownser, Permissions and Auditing info
/R:n :: number of Retries on failed copies: default is 1 million but I set this to only retry once.
/W:n :: Wait time between retries: default is 30 seconds but I set this to 1 second.
/V :: produce Verbose output, showing skipped files.
/TEE :: output to console window, as well as the log file.
/LOG:file :: output status to LOG file (overwrite existing log).

Ebay and PayPal may be spamming your inbox.

101 Free Network Monitoring Tools

How to allow relay through Exchange 2007

Step by step guide to allowing relay

To allow individual systems to relay mail through your Exchange 2007 system, perform the following steps:

1. Start the Exchange Management Console.

2. Browse to Microsoft Exchange > Server Configuration > Hub Transport.

3. Select the Hub Transport server through which you would like to allow another system to relay mail.
4. From the Actions pane, choose New Receive Connector (Figure A). Figure A
5. On the first page of the New SMTP Receive Connector wizard, type a name for the connector and choose the connector’s intended use. In this case, choose Custom (Figure B). Figure B Choose a use for this connection
Type a name and choose a use for this connector.

6. Choose Next.

7. On the Local Network Settings page, click the Add button
8. On the Local Network settings page, click the Add button and, in the Add Receive Connector Binding window, type in the new IP address that you gave to the network adapter. Leave the SMTP port at 25 (Figure C).
9. Choose OK.

10. Under Local IP address(es), select All Available and click the red X to delete this selection.
Figure C
Determine local IP address and port

Decide which IP address and port combination to use for the new connector.

11. Choose Next.
12. On the Remote Network Settings window, indicate which systems or range of IP addresses should be allowed to relay through this connector. In the example shown in Figure D, the host system with IP address and any system with an IP address in the range to will be allowed to relay through this connector. Figure D
Choose system with rights to relay

Indicate the systems with rights to relay through this connector.

13. Choose Next.

14. On the summary screen, click the New button to create the connector.

15. Open the properties page of the new connector. To do so, right click the new connector and choose Properties.
16. From the connector’s Properties page, choose the Permission Groups tab (Figure E).
17. Select the checkbox next to “Exchange Servers”.
Figure E
Select Exchange servers

Select Exchange Servers. You must do this before you continue.
18. From the connector’s Properties page, choose the Authentication tab (Figure F).
19. Select the checkbox next to “Externally Secured (for example, with IPsec)”.
Figure F
Select External Secured

Select External Secured to tell Exchange that the third party device somehow manages it own permissions.

20. Choose OK.

At this point, you should be able to relay from the third party system.

1-Year AVG Anti-Virus 2015 (PC Digital Download) Free

Make your password too tough to crack

Are you being tracked through your smartphone?

American Express virus.

If you do not know the sender or verify the email, never click a link or attachment in an email. Below is the latest viral email being sent.

americanexpress virus


Security Showdown 2014 | PCWorld – Best Paid Security Suites

Free antivirus software Panda tops AV-Test’s security rankings

Facebooks dirty little secret

How to configure Exchange to redirect OWA HTTP requests to HTTPS requests in IIS 7

To enable SSL redirection to the OWA virtual directory, follow these steps:

  1. Start IIS 7 Manager.
  2. Expand the server, expand Sites and select the Default Web Site.
  3. Double-click HTTP Redirect.
  4. Select the Redirect requests to this destinationcheck box, and then enter /owa.
  5. Select the Only redirect requests to content in this directory (not subdirectories)check box.
  6. Select Found (302) from the Statuscode drop-down list.
  7. Click Apply to save the settings.
    Note The changes that you made to the Default Web Site will propagate down to the virtual directories for that site.
  8. Expand the Default Web Site.
  9. Select the aspnet_client virtual directory.
  10. Double-click HTTPRedirect.
  11. Clear the check box for Redirect requests to this destination.
  12. Click Apply to save the settings.
  13. Repeat steps 9-12 for the following virtual directories:
    • Autodiscover
    • Ecp
    • EWS
    • Microsoft-Server-ActiveSync
    • OAB
    • Owa
    • PowerShell
    • PowerShell-Proxy
    • Rpc

How to add Trusted Sites

We need to go to the Computer Configuration ““> Administrative Tools ““> Windows Components ““> Internet Explorer ““> Internet Control Panel ““> Security Page and then double click to the zone assignment list in the right pane as you can see below.


After you double click on site to the zone assignment list you will see a window to enable the settings and configure it. Click enabled. Then click show. On the show contents screen click add.


By clicking add we can add URLs and specify what zone we want them to be placed in like so:


The number 2 denotes the number of the zone. In this case it is the trusted zone. Microsoft breaks down the settings as follows:

  1. Intranet zone – sites on your local network.
  2. Trusted Sites zone – sites that have been added to your trusted sites.
  3. Internet zone – sites that are on the Internet.
  4. Restricted Sites zone – sites that have been specifically added to your restricted sites.

After clicking OK you can wait for your default refresh of Group Policy which is 15 minutes by default or you can run gpupdate.exe from any workstation to see if it worked. You can also restart the workstations to force the update.


To configure the behavior of Automatic Updates


  1. In Group Policy Object Editor, expand Computer Configuration, expand Administrative Templates, expand Windows Components, and then click Windows Update.
  2. In the details pane, click Configure Automatic Updates.
  3. Click Enabled and select one of the following options:
    • Notify for download and notify for install. This option notifies a logged-on administrative user prior to the download and prior to the installation of the updates.
    • Auto download and notify for install. This option automatically begins downloading updates and then notifies a logged-on administrative user prior to installing the updates.
    • Auto download and schedule the install. If Automatic Updates is configured to perform a scheduled installation, you must also set the day and time for the recurring scheduled installation.
    • Allow local admin to choose setting. With this option, the local administrators are allowed to use Automatic Updates in Control Panel to select a configuration option of their choice. For example, they can choose their own scheduled installation time. Local administrators are not allowed to disable Automatic Updates.
  4. Click OK.

8 Security Steps for 2015

How to turn off app tracking on Twitter How to turn off app tracking on Twitter

Find large files to free up space on your computer

‘Dark Hotel and Condo’ hackers target business assets

Social Media Etiquette from a master chef

Check to see if your neighbors are stealing your Internet

5 signs you have a computer virus |

Snapchat Ads Have Arrived

Re/code: Snapchat Ads Have Arrived.

5 steps to lock down your webmail account | Naked Security

‘The Snappening’: Snapchat images flood the internet after hack | Naked Security

How to create mapped drives in Group Policy

To create a new Mapped Drive preference item

  1. Open the Group Policy Management Console . Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit .
  2. In the console tree under User Configuration , expand the Preferences folder, and then expand the Windows Settings folder.
  3. Right-click the Drive Maps node, point to New , and select Mapped Drive .
  4. In the New Drive Properties dialog box, select an Action for Group Policy to perform. (For more information, see “Actions” in this topic.)
  5. Enter drive map settings for Group Policy to configure or remove. (For more information, see “Drive map settings” in this topic.)
  6. Click the Common tab, configure any options, and then type your comments in the Description box. (For more information, see Configure Common Options.)
  7. Click OK . The new preference item appears in the details pane.

Automatically mute background tabs in Chrome Automatically mute background tabs in Chrome

30+ Awesome Responsive Education WordPress Themes 2014

How to block outgoing SMTP with IPCOP

Edit the /etc/rc.d/rc.firewall.local file and add our new SMTP blocking rules. Open the file with vi or nano, then look for the line “## add your ‘start’ rules here” and put your new rules under it.


# allow smtp from some allowed ips
/sbin/iptables -A CUSTOMFORWARD -p tcp -i eth0 -s –dport 25 -j ACCEPT
# log stuff that is not the mail server
/sbin/iptables -A CUSTOMFORWARD -p tcp -i eth0 -s ! –dport 25 -j LOG –log-prefix “SMTP”
# block all other outgoing SMTP traffic
/sbin/iptables -A CUSTOMFORWARD -p tcp -i eth0 -s ! –dport 25 -j REJECT

Disable Firewall on users using group policy in server 2008, 2012

Computer Config > Administrative Templates > Network > Network connections > Windows Firewall > Domain Profile  > Windows Firewall: Protect all network connections = Disabled

After that go to client machine;

Start > Run > CMD > Gpupdate /force


How To Enable Remote Desktop Via Domain Group Policy Windows Server 2012 / 2008 R2 / 2008

Open the Group Policy Management and create a new GPO, and edit.

1 – Computer Configuration > Policies > Administrative Templates > Network > Network Connections > Windows Firewall > Domain Profile > “Windows Firewall: Allow Inbound Remote Desktop Exception”

2 –  Computer Configuration > Policies > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Connections > enable the policy “Allow Users to connect remotely using Remote Desktop Services” Note: this used to be  > Windows Components > Terminal Services > “Allow users to connect remotely using Terminal Services”

3 Ways Your Data Plan Gets Devoured

To deploy printers to users or computers by using Group Policy

To deploy printer connections to users or computers by using Group Policy, you must add the printer connections to a Group Policy object (GPO) as described in the procedure.

To deploy printers to users or computers by using Group Policy

  1. Open Print Management.
  2. In the left pane, click Print Servers, click the applicable print server, and click Printers.
  3. In the center pane, right-click the applicable printer, and then click Deploy with Group Policy.
  4. In the Deploy with Group Policy dialog box, click Browse, and then choose or create a new GPO for storing the printer connections.
  5. Click OK.
  6. Specify whether to deploy the printer connections to users, or to computers:
    • To deploy to groups of computers so that all users of the computers can access the printers, select the The computers that this GPO applies to (per machine) check box.
    • To deploy to groups of users so that the users can access the printers from any computer they log onto, select the The users that this GPO applies to (per user) check box.
  7. Click Add.
  8. Repeat steps 3 through 6 to add the printer connection setting to another GPO, if necessary.
  9. Click OK.

Ten CSS One-Liners to Replace Native Apps ∙ An A List Apart Blog Post

5 essential elements of a successful 404 error page | Webdesigner Depot

5 essential elements of a successful 404 error page | Webdesigner Depot

USA TODAY: Bose sues Beats for noise cancellation patent infringement

Bose sues Beats for noise cancellation patent infringement

Bose is suing recent Apple acquisition Beats Electronics claiming the headphone maker infringed on its noise cancellation patents. In a suit filed Friday in U.S. District Court in Delaware, Bose claims that Beats By Dr. Dre Studio and Studio Wireless headphones infringe on five of Bose’s patents for noise cancelling headphones Bose also filed a complaint with the U.S. International Trade Commission over the issue. In May, Apple announced that it was paying $3 billion to acquire Beats Electronics and Beats Music, the streaming music service that launched in January. It hopes to gain approval for the deal in September, CEO Tim Cook said earlier this week.

USA TODAY: Snowden: NSA snoops shared sextings, pics

Snowden: NSA snoops shared sextings, pics

Former National Security Agency contractor Edward Snowden says the analysts who monitored the texts and e-mails of millions of Americans would sometimes share intercepted nude photos and sex texts with colleagues. Snowden, in a lengthy interview with The Guardian published this weekend, said he and his colleagues sometimes doubted the ethics of what they were doing. “Many of the people searching through the haystacks (of information) were young, enlisted guys, 18 to 22 years old,” Snowden told the publication. “In the course of their daily work, they stumble across something that is completely unrelated in any sort of necessary sense – for example, an intimate nude photo of someone in a sexually compromising situation. But they’re extremely attractive. So what do they do?

Facebook, Google and others push net neutrality

USA TODAY: Got a rash? Nickel in tech devices may be cause

Got a rash? Nickel in tech devices may be cause

Some personal electronic devices including Apple’s iPad are being linked to skin rashes likely caused by an allergic reaction to nickel. A report in Pediatrics details an increase in allergic contact dermatitis, a type of skin irritation, among kids. One of the most common sources is contact with nickel, which is sometimes found in laptops and cell phones. The Pediatrics report details the case of an 11-year-old treated for allergic contact dermatitis. After doctors learned the boy had been using a first-generation iPad, they found it tested positive for nickel and advised him to use a case to limit exposure. The boy’s rash “significantly improved,” read the Pediatrics report.

Change Windows password in Remote Desktop

CTRL-ALT-END is the key combo to send a CTRL-ALT-DEL to the remote RDP desktop. Useful for changing passwords on workstations and servers remotely.

The new plague: Computer viruses that extort you

The new plague: Computer viruses that extort you

USA TODAY: FTC complaint over Facebook study

FTC complaint over Facebook study

SAN FRANCISCO — A privacy watchdog group filed a formal complaint with the Federal Trade Commission claiming Facebook broke the law when it conducted a study on the emotions of its users without their knowledge or consent. The Electronic Privacy Information Center filed the complaint on Thursday. The complaint alleges Facebook deceived users by secretly conducting a psychological experiment to explore if seeing positive or negative updates in their news feeds would sway their emotions. “At the time of the experiment, Facebook did not state in the Data Use Policy that user data would be used for research purposes. Facebook also failed to inform users that their personal information would be shared with researchers,” the complaint says.

USA TODAY: Q and A: Best way to keep passwords safe

Q and A: Best way to keep passwords safe

Q. I’m currently using an SD card to store my passwords. When I want access to a program, I plug it in and copy and paste my passwords accordingly. Is this safe? A. The short answer is no, there’s more you can do to protect your passwords. If you keep your passwords on an SD card, anyone can walk away with them. So you want to make sure they’re encrypted. A password manager like KeePass is a good way to do this. You have to put in a master password every time you want to use it, so it keeps hackers out. Of course, with a program like that you can put it on your computer and just use the SD card as a backup in case your computer is damaged.

USA TODAY: Cut cable and get sports, news and shows

Cut cable and get sports, news and shows

The Supreme Court recently dealt a huge blow to on-demand TV viewing. It ruled that a company called Aereo is breaking copyright law by retransmitting over-the-air broadcasts. If you haven’t heard of Aereo, it acts like a super digital video recorder. For a few dollars per month, you could watch any broadcast show in your area on your TV, computer or mobile gadget whenever you wanted. But now Aereo is no more. This is just another in a long string of setbacks for TV consumers. Like you, I just want to watch what I want when I want, and I don’t want to juggle five services or mortgage my house to do it. To get a better sense of the problem, let’s look at what’s currently available. We’ve got cable, satellite and over-the-air broadcasts. For online video streaming, there’s Apple’s iTunes Store, Google Play, Netflix, Hulu, Amazon Instant Video, YouTube and a dozen others.

How to set NTP on Windows Server 2012

This is all you need if you want to keep it simple. Run using PowerShell as admin:

w32tm /config / /syncfromflags:MANUAL
Stop-Service w32time
Start-Service w32time

If the machine is a VM inside Hyper-V, you have to disable time sync. Open VM settings -> Management -> Integration Services and uncheck Time Synchronization.

Hackers show how to protect your iPhone

Hackers show how to protect your iPhone

Making Internet Privacy Easy |