ncol

ncol

101 Free Network Monitoring Tools

http://www.gfi.com/blog/101-free-admin-tools/

How to allow relay through Exchange 2007

Step by step guide to allowing relay

To allow individual systems to relay mail through your Exchange 2007 system, perform the following steps:

1. Start the Exchange Management Console.

2. Browse to Microsoft Exchange > Server Configuration > Hub Transport.

3. Select the Hub Transport server through which you would like to allow another system to relay mail.
4. From the Actions pane, choose New Receive Connector (Figure A). Figure A
NRC
5. On the first page of the New SMTP Receive Connector wizard, type a name for the connector and choose the connector’s intended use. In this case, choose Custom (Figure B). Figure B Choose a use for this connection
Type a name and choose a use for this connector.

6. Choose Next.

7. On the Local Network Settings page, click the Add button
8. On the Local Network settings page, click the Add button and, in the Add Receive Connector Binding window, type in the new IP address that you gave to the network adapter. Leave the SMTP port at 25 (Figure C).
9. Choose OK.

10. Under Local IP address(es), select All Available and click the red X to delete this selection.
Figure C
Determine local IP address and port

Decide which IP address and port combination to use for the new connector.

11. Choose Next.
12. On the Remote Network Settings window, indicate which systems or range of IP addresses should be allowed to relay through this connector. In the example shown in Figure D, the host system with IP address 192.168.1.200 and any system with an IP address in the range 192.168.1.0 to 192.168.1.254 will be allowed to relay through this connector. Figure D
Choose system with rights to relay

Indicate the systems with rights to relay through this connector.

13. Choose Next.

14. On the summary screen, click the New button to create the connector.

15. Open the properties page of the new connector. To do so, right click the new connector and choose Properties.
16. From the connector’s Properties page, choose the Permission Groups tab (Figure E).
17. Select the checkbox next to “Exchange Servers”.
Figure E
Select Exchange servers

Select Exchange Servers. You must do this before you continue.
18. From the connector’s Properties page, choose the Authentication tab (Figure F).
19. Select the checkbox next to “Externally Secured (for example, with IPsec)”.
Figure F
Select External Secured

Select External Secured to tell Exchange that the third party device somehow manages it own permissions.

20. Choose OK.

At this point, you should be able to relay from the third party system.

1-Year AVG Anti-Virus 2015 (PC Digital Download) Free

http://slickdeals.net/share/android_app/fp/154241

Make your password too tough to crack

http://www.clarkhoward.com/your-password-easy-hack?ecmp=clarkhoward_social_twitter_sfp

Are you being tracked through your smartphone?

http://www.clarkhoward.com/limit-spying-phone-habits?ecmp=clarkhoward_social_twitter_sfp

American Express virus.

If you do not know the sender or verify the email, never click a link or attachment in an email. Below is the latest viral email being sent.

americanexpress virus

 

Security Showdown 2014 | PCWorld – Best Paid Security Suites

http://www.pcworld.com/article/2090555/security-showdown-2014.html

Free antivirus software Panda tops AV-Test’s security rankings

http://www.pcworld.com/article/2689232/free-is-good-no-cost-panda-software-tops-av-tests-rankings-of-antivirus-software.html

Facebooks dirty little secret

http://www.foxnews.com/tech/2015/03/21/secret-facebook-doesnt-want-to-know/

How to configure Exchange to redirect OWA HTTP requests to HTTPS requests in IIS 7

To enable SSL redirection to the OWA virtual directory, follow these steps:

  1. Start IIS 7 Manager.
  2. Expand the server, expand Sites and select the Default Web Site.
  3. Double-click HTTP Redirect.
  4. Select the Redirect requests to this destinationcheck box, and then enter /owa.
  5. Select the Only redirect requests to content in this directory (not subdirectories)check box.
  6. Select Found (302) from the Statuscode drop-down list.
  7. Click Apply to save the settings.
    Note The changes that you made to the Default Web Site will propagate down to the virtual directories for that site.
  8. Expand the Default Web Site.
  9. Select the aspnet_client virtual directory.
  10. Double-click HTTPRedirect.
  11. Clear the check box for Redirect requests to this destination.
  12. Click Apply to save the settings.
  13. Repeat steps 9-12 for the following virtual directories:
    • Autodiscover
    • Ecp
    • EWS
    • Microsoft-Server-ActiveSync
    • OAB
    • Owa
    • PowerShell
    • PowerShell-Proxy
    • Rpc

How to add Trusted Sites

We need to go to the Computer Configuration ““> Administrative Tools ““> Windows Components ““> Internet Explorer ““> Internet Control Panel ““> Security Page and then double click to the zone assignment list in the right pane as you can see below.

iegp1

After you double click on site to the zone assignment list you will see a window to enable the settings and configure it. Click enabled. Then click show. On the show contents screen click add.

iegp2

By clicking add we can add URLs and specify what zone we want them to be placed in like so:

iegp3

The number 2 denotes the number of the zone. In this case it is the trusted zone. Microsoft breaks down the settings as follows:

  1. Intranet zone – sites on your local network.
  2. Trusted Sites zone – sites that have been added to your trusted sites.
  3. Internet zone – sites that are on the Internet.
  4. Restricted Sites zone – sites that have been specifically added to your restricted sites.

After clicking OK you can wait for your default refresh of Group Policy which is 15 minutes by default or you can run gpupdate.exe from any workstation to see if it worked. You can also restart the workstations to force the update.

 

To configure the behavior of Automatic Updates


 

  1. In Group Policy Object Editor, expand Computer Configuration, expand Administrative Templates, expand Windows Components, and then click Windows Update.
  2. In the details pane, click Configure Automatic Updates.
  3. Click Enabled and select one of the following options:
    • Notify for download and notify for install. This option notifies a logged-on administrative user prior to the download and prior to the installation of the updates.
    • Auto download and notify for install. This option automatically begins downloading updates and then notifies a logged-on administrative user prior to installing the updates.
    • Auto download and schedule the install. If Automatic Updates is configured to perform a scheduled installation, you must also set the day and time for the recurring scheduled installation.
    • Allow local admin to choose setting. With this option, the local administrators are allowed to use Automatic Updates in Control Panel to select a configuration option of their choice. For example, they can choose their own scheduled installation time. Local administrators are not allowed to disable Automatic Updates.
  4. Click OK.

8 Security Steps for 2015

http://smallbusiness.foxbusiness.com/technology-web/2014/12/29/8-essential-security-strategies-for-smbs-in-2015/

How to turn off app tracking on Twitter

http://www.cnet.com/news/how-to-turn-off-app-tracking-on-twitter/ How to turn off app tracking on Twitter

Find large files to free up space on your computer

http://www.komando.com/downloads/2162/find-large-files-to-free-up-space

‘Dark Hotel and Condo’ hackers target business assets

http://www.foxnews.com/travel/2014/11/12/travel-executives-beware-hackers-targeting-high-profile-hotel-guests/

Social Media Etiquette from a master chef

http://chefirvine.com/resources/social-media-qa

Check to see if your neighbors are stealing your Internet

http://www.komando.com/tips/239494/check-to-see-if-your-neighbors-are-stealing-your-internet

5 signs you have a computer virus | Komando.com

http://www.komando.com/tips/12164/5-signs-you-have-a-computer-virus

Snapchat Ads Have Arrived

Re/code: Snapchat Ads Have Arrived. http://google.com/newsstand/s/CBIw78ufwB8

5 steps to lock down your webmail account | Naked Security

https://nakedsecurity.sophos.com/2014/10/14/5-steps-to-lock-down-your-webmail-account/

‘The Snappening’: Snapchat images flood the internet after SnapSaved.com hack | Naked Security

https://nakedsecurity.sophos.com/2014/10/13/the-snappening-snapchat-images-flood-the-internet-after-snapsaved-com-hack/

How to create mapped drives in Group Policy

To create a new Mapped Drive preference item

  1. Open the Group Policy Management Console . Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit .
  2. In the console tree under User Configuration , expand the Preferences folder, and then expand the Windows Settings folder.
  3. Right-click the Drive Maps node, point to New , and select Mapped Drive .
  4. In the New Drive Properties dialog box, select an Action for Group Policy to perform. (For more information, see “Actions” in this topic.)
  5. Enter drive map settings for Group Policy to configure or remove. (For more information, see “Drive map settings” in this topic.)
  6. Click the Common tab, configure any options, and then type your comments in the Description box. (For more information, see Configure Common Options.)
  7. Click OK . The new preference item appears in the details pane.

Automatically mute background tabs in Chrome

http://www.cnet.com/news/automatically-mute-background-tabs-in-chrome/ Automatically mute background tabs in Chrome

30+ Awesome Responsive Education WordPress Themes 2014

http://colorlib.com/wp/best-education-wordpress-themes/

How to block outgoing SMTP with IPCOP

Edit the /etc/rc.d/rc.firewall.local file and add our new SMTP blocking rules. Open the file with vi or nano, then look for the line “## add your ‘start’ rules here” and put your new rules under it.

 

# allow smtp from some allowed ips
/sbin/iptables -A CUSTOMFORWARD -p tcp -i eth0 -s 10.1.0.6 –dport 25 -j ACCEPT
# log stuff that is not the mail server
/sbin/iptables -A CUSTOMFORWARD -p tcp -i eth0 -s ! 10.1.0.6 –dport 25 -j LOG –log-prefix “SMTP”
# block all other outgoing SMTP traffic
/sbin/iptables -A CUSTOMFORWARD -p tcp -i eth0 -s ! 10.1.0.6 –dport 25 -j REJECT

Disable Firewall on users using group policy in server 2008, 2012

Computer Config > Administrative Templates > Network > Network connections > Windows Firewall > Domain Profile  > Windows Firewall: Protect all network connections = Disabled

After that go to client machine;

Start > Run > CMD > Gpupdate /force

Reboot.

How To Enable Remote Desktop Via Domain Group Policy Windows Server 2012 / 2008 R2 / 2008

Open the Group Policy Management and create a new GPO, and edit.

1 – Computer Configuration > Policies > Administrative Templates > Network > Network Connections > Windows Firewall > Domain Profile > “Windows Firewall: Allow Inbound Remote Desktop Exception”

2 –  Computer Configuration > Policies > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Connections > enable the policy “Allow Users to connect remotely using Remote Desktop Services” Note: this used to be  > Windows Components > Terminal Services > “Allow users to connect remotely using Terminal Services”

3 Ways Your Data Plan Gets Devoured

http://www.foxnews.com/tech/2014/09/06/3-surprising-things-that-devour-your-data-plan/

To deploy printers to users or computers by using Group Policy

To deploy printer connections to users or computers by using Group Policy, you must add the printer connections to a Group Policy object (GPO) as described in the procedure.

To deploy printers to users or computers by using Group Policy

  1. Open Print Management.
  2. In the left pane, click Print Servers, click the applicable print server, and click Printers.
  3. In the center pane, right-click the applicable printer, and then click Deploy with Group Policy.
  4. In the Deploy with Group Policy dialog box, click Browse, and then choose or create a new GPO for storing the printer connections.
  5. Click OK.
  6. Specify whether to deploy the printer connections to users, or to computers:
    • To deploy to groups of computers so that all users of the computers can access the printers, select the The computers that this GPO applies to (per machine) check box.
    • To deploy to groups of users so that the users can access the printers from any computer they log onto, select the The users that this GPO applies to (per user) check box.
  7. Click Add.
  8. Repeat steps 3 through 6 to add the printer connection setting to another GPO, if necessary.
  9. Click OK.

Ten CSS One-Liners to Replace Native Apps ∙ An A List Apart Blog Post

http://alistapart.com/blog/post/ten-css-one-liners-to-replace-native-apps/

5 essential elements of a successful 404 error page | Webdesigner Depot

http://www.webdesignerdepot.com/2014/08/5-essential-elements-of-a-successful-404-error-page/

5 essential elements of a successful 404 error page | Webdesigner Depot

http://www.webdesignerdepot.com/2014/08/5-essential-elements-of-a-successful-404-error-page/

USA TODAY: Bose sues Beats for noise cancellation patent infringement

Bose sues Beats for noise cancellation patent infringement

Bose is suing recent Apple acquisition Beats Electronics claiming the headphone maker infringed on its noise cancellation patents. In a suit filed Friday in U.S. District Court in Delaware, Bose claims that Beats By Dr. Dre Studio and Studio Wireless headphones infringe on five of Bose’s patents for noise cancelling headphones Bose also filed a complaint with the U.S. International Trade Commission over the issue. In May, Apple announced that it was paying $3 billion to acquire Beats Electronics and Beats Music, the streaming music service that launched in January. It hopes to gain approval for the deal in September, CEO Tim Cook said earlier this week.

http://usat.ly/1mNAfuL

USA TODAY: Snowden: NSA snoops shared sextings, pics

Snowden: NSA snoops shared sextings, pics

Former National Security Agency contractor Edward Snowden says the analysts who monitored the texts and e-mails of millions of Americans would sometimes share intercepted nude photos and sex texts with colleagues. Snowden, in a lengthy interview with The Guardian published this weekend, said he and his colleagues sometimes doubted the ethics of what they were doing. “Many of the people searching through the haystacks (of information) were young, enlisted guys, 18 to 22 years old,” Snowden told the publication. “In the course of their daily work, they stumble across something that is completely unrelated in any sort of necessary sense – for example, an intimate nude photo of someone in a sexually compromising situation. But they’re extremely attractive. So what do they do?

http://usat.ly/1mwm258

Facebook, Google and others push net neutrality

http://www.foxnews.com/tech/2014/07/14/google-facebook-other-tech-firms-push-fcc-for-net-neutrality/

USA TODAY: Got a rash? Nickel in tech devices may be cause

Got a rash? Nickel in tech devices may be cause

Some personal electronic devices including Apple’s iPad are being linked to skin rashes likely caused by an allergic reaction to nickel. A report in Pediatrics details an increase in allergic contact dermatitis, a type of skin irritation, among kids. One of the most common sources is contact with nickel, which is sometimes found in laptops and cell phones. The Pediatrics report details the case of an 11-year-old treated for allergic contact dermatitis. After doctors learned the boy had been using a first-generation iPad, they found it tested positive for nickel and advised him to use a case to limit exposure. The boy’s rash “significantly improved,” read the Pediatrics report.

http://usat.ly/1m9gU6M

Change Windows password in Remote Desktop

CTRL-ALT-END is the key combo to send a CTRL-ALT-DEL to the remote RDP desktop. Useful for changing passwords on workstations and servers remotely.

The new plague: Computer viruses that extort you

The new plague: Computer viruses that extort you
http://money.cnn.com/2014/07/09/technology/security/ransomware/index.html

USA TODAY: FTC complaint over Facebook study

FTC complaint over Facebook study

SAN FRANCISCO — A privacy watchdog group filed a formal complaint with the Federal Trade Commission claiming Facebook broke the law when it conducted a study on the emotions of its users without their knowledge or consent. The Electronic Privacy Information Center filed the complaint on Thursday. The complaint alleges Facebook deceived users by secretly conducting a psychological experiment to explore if seeing positive or negative updates in their news feeds would sway their emotions. “At the time of the experiment, Facebook did not state in the Data Use Policy that user data would be used for research purposes. Facebook also failed to inform users that their personal information would be shared with researchers,” the complaint says.

http://usat.ly/1lCFs7W

USA TODAY: Q and A: Best way to keep passwords safe

Q and A: Best way to keep passwords safe

Q. I’m currently using an SD card to store my passwords. When I want access to a program, I plug it in and copy and paste my passwords accordingly. Is this safe? A. The short answer is no, there’s more you can do to protect your passwords. If you keep your passwords on an SD card, anyone can walk away with them. So you want to make sure they’re encrypted. A password manager like KeePass is a good way to do this. You have to put in a master password every time you want to use it, so it keeps hackers out. Of course, with a program like that you can put it on your computer and just use the SD card as a backup in case your computer is damaged.

http://usat.ly/1lEJtZJ

USA TODAY: Cut cable and get sports, news and shows

Cut cable and get sports, news and shows

The Supreme Court recently dealt a huge blow to on-demand TV viewing. It ruled that a company called Aereo is breaking copyright law by retransmitting over-the-air broadcasts. If you haven’t heard of Aereo, it acts like a super digital video recorder. For a few dollars per month, you could watch any broadcast show in your area on your TV, computer or mobile gadget whenever you wanted. But now Aereo is no more. This is just another in a long string of setbacks for TV consumers. Like you, I just want to watch what I want when I want, and I don’t want to juggle five services or mortgage my house to do it. To get a better sense of the problem, let’s look at what’s currently available. We’ve got cable, satellite and over-the-air broadcasts. For online video streaming, there’s Apple’s iTunes Store, Google Play, Netflix, Hulu, Amazon Instant Video, YouTube and a dozen others.

http://usat.ly/1lZm760

How to set NTP on Windows Server 2012

This is all you need if you want to keep it simple. Run using PowerShell as admin:

w32tm /config /manualpeerlist:pool.ntp.org /syncfromflags:MANUAL
Stop-Service w32time
Start-Service w32time

If the machine is a VM inside Hyper-V, you have to disable time sync. Open VM settings -> Management -> Integration Services and uncheck Time Synchronization.

Hackers show how to protect your iPhone

Hackers show how to protect your iPhone
http://www.cnn.com//2014/06/23/tech/mobile/iphone-hacker-safety/index.html

Making Internet Privacy Easy | www.clarkhoward.com

http://www.clarkhoward.com/news/clark-howard/technology/making-internet-privacy-easy/nfWdr/?ecmp=social_20140618_26240986

USA TODAY: Facebook’s Slingshot app is here

Facebook’s Slingshot app is here

SAN FRANCISCO — Facebook hopes its new Slingshot app will get people talking. The widely anticipated mobile app is being released today in the U.S. for iPhones and Android phones. It’s part of Mark Zuckerberg’s ambitious strategy to create a new constellation of mobile apps to compete in the smartphone era. The goal: to be at the center of every social interaction, whether that interaction takes place on Facebook or not. In the case of Slingshot, over time Facebook wants to siphon some of the growing popularity of Snapchat and appeal to teens who are glued to their phones. Slingshot lets you instantly share what you are doing with a group of friends. First you shoot a photo, short video or a selfie, add some text or an emoticom or draw on it, then “sling” it to a friend or friends.

http://usat.ly/1q91uV4

USA TODAY: How to boost home WiFi for PCs and more

How to boost home WiFi for PCs and more

Sometimes Wi-Fi doesn’t seem to make any sense. You’re trying to connect to your home network but you’re getting a stronger signal from the neighbor’s router than your own router. Inconsistent coverage is one of Wi-Fi’s big problems. It always seems to stop just short of where you need it. Even when you do connect, the signal is spotty and unbearably slow. Fortunately, there are several tricks to boost a Wi-Fi signal. Even better, most of these tricks are free. Choose the right location Most Wi-Fi antennas are omni-directional: the signal goes every direction equally. So if you put the router along an outside wall, you’re wasting half your signal outside. In fact, many times that’s why you get such a strong signal from your neighbors. They’re making the same mistake.

http://usat.ly/1pe2JSv

Eight key features of iOS 8

Eight key features of iOS 8
http://www.cnn.com//2014/06/02/tech/mobile/apple-ios-8-features/index.html

Apple fans holding out hope they’d see the company’s next great gadget on Monday were disappointed. At the keynote address for the company’s annual Worldwide Developers Conference, software was king.

For owners of the 800 million iPhones, iPads and iPods that run the company’s iOS operating system, the biggest news may have been the rollout of its latest version, iOS 8.

Due to be released this fall, the new system will update lots of existing features and add some new ones. So, here’s a first look at eight key features of iOS 8….

Big changes coming to iPhone messaging

• Apple’s iOS 8 will bring big changes for how iPhone users send and receive messages

• Apple is borrowing features from popular messaging platforms like Snapchat and WhatsApp

Big changes coming to iPhone messaging
http://www.cnn.com//2014/06/03/tech/mobile/apple-messages-app/index.html

Suspicious Twitter DMs | Online Security – Consumer Reports

http://www.consumerreports.org/cro/news/2013/09/watch-out-for-twitter-direct-messages-with-suspicious-links/index.htm