This looks interesting, need to check the videos.
Thanks @ajin.c for sharing this.
Netdata is a daemon that collects data in realtime (per second) and presents a web site to view and analyze them. The presentation is also real-time and full of interactive charts that precisely render all collected values.
It has been designed to be installed on every system, without disrupting the applications running on it:
It will just use some spare CPU cycles (check Performance). It will use the memory you want it have (check Memory Requirements). Once started and while running, it does not use any disk I/O, apart its logging (check Log Files). Of course it saves its DB to disk when it exits and loads it back when it starts.
You can use it to monitor all your systems and applications. It will run on Linux PCs, servers or embedded devices.
Out of the box, it comes with plugins that collect key system metrics and metrics of popular applications.
Really wanted to share this with all, but image upload doesnt seems to be working.
Have you see this type of cabling? Visited one office and found that this cable is connected from wall jack to an airport extreme, one end to the internet port and the second to the lan port! I have no clue why and how this worked. Something really new to me!
Got a call from the vendor and he mentioned that there was some confusion about my machine, apparently the mobo and processor replacement was for another customer, and for my machine, it was just adding thermal paste as it was overheating. Got the machine back spending only $40 for checking for 2 days and fixing the issue Much better than spending around $500+ for the change. Thank god, machine works fine now, will update my xen and start working on few things.
Researchers crack new version of CryptXXX ransomware. An updated decryptor tool can help users recover files affected by the CryptXXX ransomware program.
Their updated tool is called RannohDecryptor and can be downloaded from the company's support website @ https://support.kaspersky.com/viruses/utility#rannohdecryptor
Anyone who has TeslasCrypt encrypted files with the .xxx, .ttt, .micro, .mp3, or encrypted files without an extension can now decrypt their files for free!
"A hacker going by the handle BuggiCorp is selling a zero-day vulnerability affecting all Windows OS versions that can allow an attacker to elevate privileges for software processes to the highest level available in Windows, known as SYSTEM," writes Softpedia. The zero-day is up for sale on a Russian underground hacking forum, and is currently available for $90,000 -- after it was initially up for $95,000. The hacker is saying he'll sell the zero-day to one person only, who'll receive its source code and a working demo. Two videos are available, one showing the hacker exploit Windows 10 with the May 2016 security patch, and another one bypassing all EMET features. While security experts think the zero-day may be overpriced, they think the hacker will find a buyer regardless.
Just read this topic on Spiceworks.
Was curious and tried it on my home machine, and happy to see that webroot caught that as soon as the program started and passed all tests!
DNS record will help prevent unauthorized SSL certificates. Starting in September, certificate authorities will be required to honor a new DNS record that specifies who is authorized to issue certificates for a domain.
In a few months, publicly trusted certificate authorities will have to start honoring a special Domain Name System (DNS) record that allows domain owners to specify who is allowed to issue SSL certificates for their domains.
The Certification Authority Authorization (CAA) DNS record became a standard in 2013 but didn't have much of a real-world impact because certificate authorities (CAs) were under no obligation to conform to them.
The record allows a domain owner to list the CAs that are allowed to issue SSL/TLS certificates for that domain. The reason for this is to limit cases of unauthorized certificate issuance, which can be accidental or intentional, if a CA is compromised or has a rogue employee.
Under existing industry rules created by the CA/Browser Forum, an organization that combines major browser vendors and CAs, certificate authorities must validate that requests for SSL certificates originate from domain owners themselves or from someone in control of those domains.
This ownership verification is typically automated and involves asking the domain owner to create a DNS TXT record with a specific value or to upload authorization codes at a specific location in their site's structure, thus proving their control over the domain.
However, hacking into a website could also give an attacker the ability to pass such verifications and request a valid certificate for the compromised domain from any certificate authority. Such a certificate could later be used to launch man-in-the-middle attacks against users or to direct them to phishing pages.
Anyone doing this, as in audit a current setup and advise on the health status of the servers, be it be Exchange server/SharePoint/Active Directory?
I assume the starting point would be Best Practice Analyzer? Any other tools that can give a nice report after the audit.
Extensive research on dog breeds, finally would be getting a dog!
For a small apartment, the best choice I could see is a boston terrier. @scottalanmiller I believe you have a BT. And when I posted a request to find one on FB pets group in Dubai, all the suggestions was to adopt one. Contacting all adoption camps and might be visiting one weekend to see their puppies. Excited!
I was asked by the guy to connect a wifi access point replacing the old device, came in thinking that it won't take more than 30 mnts. The real job only took few minutes, but spent 4 hours fixing the stupid cabling job done by the previous vendor! My god, that was horrible, one of them is this cable, and from the main internet line, the old vendor took RJ45 connector and then split the cable in two to by using 2 more jacks and then connected 2 switches!
Can't believe how people do this kind of jobs and survive the market.
So finally i am at the last stage of finalising and starting a IT consultancy company, with some investment from a partner.
I am currently compiling a list of must have tools that i need to start supporting my clients. Planning to start 2016 with the new one!
I know this has been discussed several times, but would like to see an updated response:
I am currently planning to use:
Freshbooks- using this as a free plan now, as i was doing some freelancing. This helps me to achieve invoicing, estimates, time tracking. I will move to the paid option on Freshbooks.
Remote support: Super confused about what to use for . Currently a single tech agent (myself), and requirements would be installed agent supporting retainers and on the go support using probably a link to download the agent, install temp, support and remove for others. Screenconnect seems to be an option, but i would like to hear feedbacks. For now, i don't want a self hosted one as i nee to manage that, i would rather use that time to support clients!
Teamviewer business edition is another one i like, its one time fee and supports pretty much all devices.
Helpdesk/ticketing: For now I am thinking to use Freshbooks for this too, but open for new ideas.
I would also like to have a sales pipeline/projection tool, a web based one rather than on excel as an added bonus. Can't afford/or doesnt really need a full CRM system at the point i believe.
Did i miss anything else?
Got a call yesterday from a friend, asking for help to cleanup her infected laptop. Haven't seen such infected machine in a while, lots of ads, popups, unable to open browsers, installed some japanese/chinese versions of CPU monitoring tools, fake antivirus, you name it!
Took 3 hours, used malwarebytes, but the scan got closed after some time, restarts the machine, then used my webroot setup, transferred through screenconnect and installed. While preparing the av after install, webroot detected threats and asked me to do a cleanup. As and when webroot cleans up the threats, machine restarted and i started the scan again. (There was some process that was stopping the Av to do the cleanup) Used Rkill and terminated suspecious process. Did another scan, this time all got cleaned and webroot asked for a restart to finish the cleanup. Restarted one last time, did one more scan all clean. Reset all browsers to defaults and also used Shortcut cleaner to take out all custom browser settings made by the threats. So far all looks ok, and client will be getting her own webroot home license on Sunday when she is back to work.rned