USA TODAY: Reports: Apple to launch a gold iPhone


Reports: Apple to launch a gold iPhone

Company reportedly planning to offer a gold iPhone.

The five scariest hacks we saw last week

The five scariest hacks we saw last week

Hackers hit the US Department of Energy

The five scariest hacks we saw last week

The five scariest hacks we saw last week

Hackers break into homes electronically

So you think your dvr is safe. Hackers can listen to your baby monitor and turn your lights on! Hackers break into homes — electronically

FBI pressures Internet providers to install surveillance software

Wi-Fi routers: More security risks than ever

Query Active Directory FSMO Roles

  • Run netdom query fsmo
  • Run ntdsutil then roles then connections then connect to server DC-name then quit then select operation target then list roles for connected server
  • Run dcdiag /knowsofroleholders /v

Samsung said to be near deals to supply devices to FBI, Navy

After winning Pentagon security approval, Samsung is close to a deal with the FBI and Navy.

Microsoft nicely tweaks Windows 8

Microsoft nicely tweaks Windows 8

First major update of Windows 8 is available to try

How to remove password from SSL key

Always backup the original key first (just in case)!

 # cp www.key www.key.orig

Then unencrypt the key with openssl. You’ll need the passphrase for the decryption process:

 # openssl rsa -in www.key -out new.key

Now copy the new.key to the www.key file and you’re done. Next time you restart the web server, it should not prompt you for the passphrase.

Wi-Fi insecurities

Public Wi-Fi can alarm your browser, don’t let it alarm you

Wi-Fi networks with Web logins can be a hassle, but they add security.

How to remain anonymous on the Internet

How to fly under the radar online

Here are some privacy-friendly sites to help you keep a hold on your personal information.

Manage your day with this new app!

New personal assistant iOS app: Donna

Use calendar, mapping, weather and more to help your schedule.

Government orders Facebook to turn over nearly 20,000 accounts Surveillance revelations from Facebook, Microsoft Facebook says government orders for user data in latter half of 2012 involved 19,000 accounts.

Yahoo to free up IDs of dormant email accounts Yahoo to free up IDs of dormant email accounts Yahoo trying to breathe life into old accounts by giving them away.

Restoring Factory Defaults on an Adtran TA900

On units that have a console port, you cannot restore the factory defaults, but must rather erase the device’s
configuration and then reconfigure the unit to operate correctly for your network. To erase the unit’s current
configuration, follow these steps:
  1. Access the unit’s CLI and enter enable at the >prompt.
  2. Enter erase startup-config at the # prompt. The device will have a blank configuration upon reboot.
  3. Enter reload at the # prompt to begin restarting the device. When prompted to save configuration, enter no . When prompted to reboot, enter yes .
  4. Upon reboot, you will have to reconfigure the unit using the CONSOLE port. Follow the steps outline here or in the technical note, Accessing the Web Interface in AOS, available online at

Apple adding a ‘kill switch’ to iPhones

Apple adding ‘kill switch’ to iPhones

What is the NSA’s PRISM program? (FAQ)

With all of the news of the NSA data security program, this puts the pieces of the puzzle together.

Microsoft and Symantec collaborate to stop botnet

How to renew a self signed certificate in Exchange Server 2007

The Exchange 2007 self signs a certificate when the server role is first added for all the Exchange services that run in unison with IIS (smtp & owa etc). The  certificate expires after one  year from the date the server was first installed or the date the certificate was assigned manually.

First, check the status of the certificate by opening the Exchange Management Shell and executing the commandGet-ExchangeCertificate |FL’ – this displays all information about the currently assigned certificates and the status of each certificate.

It is common that they may be more than one certificate listed in the display – if that is the case, find the certificate that shows an expired date in the field ‘NotAfter‘ – as this defines when each certificate becomes invalid/expired. An expired certificate may cause problems such as connectivity to web services, SMTP transport and Outlook prompting certificate security warnings.

Use the following steps to generate a new certificate and enable it to run IIS services:

1. Type ‘Get-ExchangeCertificate |FL’ – This only lists details of certificates that are assigned to Exchange Services. Then note down the Thumbprint of the expired certificate.

2. Then type ‘Get-ExchangeCertificate –Thumbprint “9E6DD4B4EA2865CA9E6C34B42329A9AC994EBF63” | New-ExchangeCertificate’ . This generates a new certificate, and you will then be prompted to confirm if you want to overwrite the expired certificate and use the new one for the SMTP service.

3. If you run the cmdlet in step 1 you will notice the new certificate is not used to secure IIS services anymore. Make a note of the new thumbprint and run the following command typing the new thumbprint between the quotation marks: ‘Enable-ExchangeCertificate – Thumbprint “7A843B04EA2865CA9E6C34B42329AEE4456F9013” –Services IIS’

4. Be sure to verify all the services are working correctly after renewing and enabling the certificate – test Outlook clients by closing and opening Outlook to esnure there are no security certificate warnings.

6. Finally, Remove the old certificate by typing the following cmdlet into the management shell: Remove-ExchangeCertificate –Thumbprint “9E6DD4B4EA2865CA9E6C34B42329A9AC994EBF63″.

Installing and using Windows XP Mode

To use Windows XP Mode, you need to download and install Windows XP Mode, and Windows Virtual PC, the program that runs virtual operating systems on your computer.

When you install a program in Windows XP Mode, the program becomes available for use in both Windows XP Mode and Windows 7.

To download and install Windows XP Mode

  1. Go to the Windows XP Mode page in Download Center.
  2. Under Quick Details, select your language.
  3. Click Continue and follow the instructions on the screen to validate your copy of Windows 7.
  4. Select a version of Windows XP Mode to install and click Install.Note: WindowsXPMode_N versions do not include Windows Media Player.
  5. Click Run in your browser’s message bar, and follow the instructions on the screen.
  6. When setup is completed, click Finish.

To download and install Windows Virtual PC

  1. Go to the Windows Virtual PC page in Download Center
  2. Under Quick Details, select your language.
  3. Click Continue and follow the instructions on the screen to validate your copy of Windows 7.
  4. Select a version of Windows Virtual PC to install and click Install.
    Note: The x64 version works with 64-bit versions of Windows 7.  The x86 version works with 32-bit versions of Windows 7. To find out if your PC is running 32- or 64-bit Windows 7, click the Start button Picture of the Start button, right-click Computer, and then click Properties. 32-bit and 64-bit information appears next to System type.
  5. This update must be run from your local C: drive or you will receive an error.
  6. Click Run in your browser’s message bar, and follow the instructions on the screen.
  7. Click Yes to install Update for Windows (KB958559).
  8. If you accept the license terms, click I Accept.
  9. After installation is complete, click Restart Now to restart your computer.

To set up Windows XP Mode for first use

  1. Click the Start button Picture of the Start button, click All Programs, click Windows Virtual PC, and then click Windows XP Mode.
    Picture of Windows Virtual PC and Windows XP in the list of programsWindows Virtual PC and  Windows XP in the list of programs
  2. If you accept the license terms, click I accept the license terms, and then click Next.
  3. On the Installation folder and credentials page, accept the default location where Windows XP Mode files will be stored, or choose a new location.
  4. Type a password, type it again to confirm it, and then click Next.
  5. On the Help protect your computer page, decide whether you want to help protect your computer by turning on automatic updates, and then click Next.
  6. Click Start Setup.After setup is complete, Windows XP Mode opens in a separate window.


  • Antivirus software isn’t included with Windows XP Mode. Even if your computer running Windows 7 already has antivirus software, you should also install antivirus software in Windows XP Mode to help defend your computer against viruses.

To install and use a program in Windows XP Mode

  1. In Windows 7, click the Start button Picture of the Start button, click All Programs, click Windows Virtual PC, and then click Windows XP Mode.
  2. In Windows XP Mode, insert the program’s installation disc into your computer’s CD/DVD drive; or browse to the program’s installation file, open the file, and follow the instructions to install the program.
    Picture of a program being installed in Windows XP ModeInstalling a program in  Windows XP Mode
  3. Click the Close button Picture of the Close button at the top of the Windows XP Mode window.
  4. In Windows 7, click the Start button Picture of the Start button, click Windows Virtual PC, click Windows XP Mode Applications, and then click the program you want to open.


    • If the Windows XP Mode window is open when you try opening a program in Windows XP Mode from Windows 7, you’ll be prompted to close the virtual machine. Be sure to save any data you want to keep in Windows XP Mode before closing it.

Facebook virus running rampant

Hijacking of Facebook accounts spikes

The Koobface worm on the move again, luring Facebook users to click on tainted links

CSS Button Generator

CSS Button Generator will create beautiful css buttons for you to use on your web pages without the need for any images. When you have styled your button to your liking, simply click on the generated button to get your css style code. Share our site using a button below!

Stuck at “Preparing to configure Windows”

How do I reset Windows Update components?


Once the Windows Update components are reset, try installing the updates again. To do so,

1. Open Windows Update by clicking the Start button, clicking All Programs, and then clicking Windows Update.

2. Click on the Change settings option in the navigation bar on the left. You will now be at a screen where you will be able to set up how Windows Vista will download and install updates on your computer.

3. Select the option Check for updates but let me choose whether to download and install them. When you are done configuring the options as you wish, press the OK button to save these settings. You will now be back at the main Windows Update screen.

4. In the left pane, click Check for updates, and then wait while Windows looks for the latest updates for your computer.

5. You may then download the updates one or two at a time.

6. Click on install updates to install the currently selected updates.

7. Repeat the steps 5 and 6 till you get all the updates you want on your PC.

Security lessons from the 2013 Verizon Data Breach Report

Verizon’s latest report on data breach statistics offers security pros a guide to the most persistent threats and where attention should be focused to defend against them.

Verizon has released the 2013 edition of their Data Breach Investigations Report (DBIR), an analysis of the data obtained from breach investigations that they and other organizations have performed during the previous year. The data for this report includes incidents from Verizon’s own investigations and 18 other organizations around the world, for a total of 621 confirmed data breaches and over 47,000 security incidents.

The report contains a wealth of information that paints a clear picture of the motives and techniques used by attackers to compromise their target organizations. It’s an interesting read and there are many lessons that can be found within.;blog-list-river

Android Threats Growing

The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure.

How do I tell who’s access my Windows Server 2008 server?

If you have a server hosting user profiles or home directories, you can check the output of NET SESSION from its console – this will give you the list of all computers and users connected to it.

Or NET SESSION > c:\sessions.txt to save this info to a text file.

Setup NTP server in Windows Server 2008 R2

Run these commands from a command prompt:

Stop the time service
net stop w32time

Set the manual peer list external servers
w32tm /config /syncfromflags:manual /manualpeerlist:”,,,”

Set the connection as reliable
w32tm /config /reliable:yes

Start the time service back up
net start w32time

Test the configururation
w32tm /query /configuration

How do can I filter email addresses in Excel 2007/10

  1. From the Data menu, select Filter and then AutoFilter. This will add a drop-down list box to each of your columns.
  2. Click the down arrow control in the top right of the column containing your email addresses.excelemail1
  3. From the drop-down menu, select (Custom…).excelemail2
  4. In the Custom AutoFilter dialog, enter in two filter criteria using the “does not contain” selection. Make certain to use the Or radio button option.excelemail3
  5.  Click OK.

Once you click OK, Excel will show the emails that don’t have either the @ sign or a period. These are the problem records. You can either delete them or try to make corrections. The rules aren’t perfect as you may still get some incorrect ones slip through such as anne.h@examplecom. In this example, both the period and “at sign” are present, but it is still invalid since a second period is needed between example and com.

After doing this exercise, I did see some other patterns. For example, some people would type some combination of “do not send email”. This tends to happen if the input form doesn’t do field validation. Other times, the reverse would happen where people used “shift 2” or [at] instead of the “@ sign”. This is a tactic some people use online to prevent email bots from scraping their address.

Shamoon virus alert upgraded

Shamoon virus alert upgraded

Virus’ seemingly anti-American creator still at large; copycats are a concern

Blackberry Messenger moves to iPhone and Android

Lots of news around BlackBerry in today’s roundup. Not only is BlackBerry expanding the popular Messenger service as an app for Android and iOS, but it also is giving Messenger a social-media twist with BBM Channel

Thank you!


We would like to thank the residents of Vance County for voting NCOL.NET best ISP and computer company! We work hard to give our customers the best possible service and always with a smile. Please feel free to contact us at 252-492-4317 or!

Outlook Web Access with Internet Explorer 10

If you experience issues in Internet Explorer 10 logging in and accessing emails with Outlook Web Access try the following:

Run Outlook Web Access in Internet Explorer compatibility view and see if it helps.

a: Click Tools  present at the top right corner in internet explorer.
b: Now Select Compatilbility view with the Website opened.

Thank goodness for plain old Excel

Google apps work for the average user but for complicated spreadsheets or place with no Internet, thank goodness for plain old Excel.

Digital VoIP Phone Systems

Is your business looking to take advantage of the Internet for calls and teleworkers? Do you work from home or remotely and need access to all the features of your office phone system?

NCOL.NET is a licensed and trained partner of Allworx Systems. Allworx phone systems are loaded with features that small businesses need and big businesses take for granted, including features that cost extra on other VOIP hybrid PBX systems. And unlike phone company services such as voicemail or call forwarding, with an Allworx VOIP hybrid phone system, you don’t pay extra every month! With all digital handsets, an web interface for easy adds, moves and changes, Allworx and NCOL.NET can reduce your monthly phone bill and support costs.

Best tech gifts for mom

Surf report: best tech gifts for Mom

For the lovely woman who always put you first, we have a few gift suggestions.

To view this story, click the link or paste it into your browser.

Snapchat research

Snapchat images recoverable

In the digital world, few things are ever truly deleted or destroyed. Not if you have the money to get them back. That’s why one company is making hay out of a new service Thursday that offers to recover Snapchats — those supposedly self-destructing pics beloved by teens and twentysomethings — from the recipient’s phone. For a cool $300 to $500 per device.

Hey, check this out from CNN:

Keep your taxes off my Internet

Senator demands DOJ, FBI seek warrants to read e-mail

Last month, Sen. Mark Udall and a handful of other privacy-focused politicians persuaded the IRS to promise to cease warrantless searches of Americans’ private correspondence.

Senator demands DOJ, FBI seek warrants to read e-mail

Last month, Sen. Mark Udall and a handful of other privacy-focused politicians persuaded the IRS to promise to cease warrantless searches of Americans’ private correspondence.

Google Aims To Patent Policy Violation Checker, Potentially Revolutionizing Email Snooping

BEWARE!!! Google Aims To Patent Policy Violation Checker, Potentially Revolutionizing Email Snooping

Hey, check this out from CNN:

Smartphone maps behind wheel are illegal?

According to a judge in California it is.

A comprehensive guide to Google Analytics

Do you know what’s driving leads/sales to your website? Google Analytics can tell you.
The trouble is many small businesses struggle to get Google Analytics set up, let alone use it to pull out meaningful data. This easy to follow guide will take you through the set-up process and help you understand how your website’s performing.

Symantec – File System Auto-Protect is malfunctioning

File System Auto-Protect is malfunctioning


Try these Steps as well.

1) Go to services.msc

2) Stop all the symantec services

3) Open task manager

4) Kill rtvscan.exe and smc.exe

5) Again, restart the service

6) If that does not fix, repairing from add/remove programs should fix the issue.

WordPress Secrets that Enterprise CMS Vendors Don’t Want you to Know

25+ WordPress Newsletter Plugins

Email marketing may taste a bit old fashion right now when everyone talk about social media marketing. However, it is not to be underestimated and still counts as one of the most important online marketing channels.

Cyber attack on daily deal site Cyber attack on popular daily deals site The attack impacts 50 million customers of the daily deal site.

5 things this week in tech

The week in Tech: 5 must-know things

Here’s what you need to know about the week in Tech.