Ran into an issue on an install of Office for Mac 2011 recently. When the user attempted to save an excel spreadsheet, they would get an error as follows:
– file name or path name does not exist
– file is being used by another program
– name is the same as another file
Unfortunately these error messages were not the case- it was a new file with a unique name, and only Excel was trying to use the document.
The solution was simple to understand once the issue was fixed by verifying disc permissions. The user did not have the correct permissions to write files. Apparently saving an Excel document writes first to a temporary location which they had no rights.
When publishing content on wordpress, an author has the option of letting services know that new content has been added. The following is an exhaustive list of ping services that can be automatically notified of a new post. Continue reading “Huge list of ping services for WordPress”
The Operations Master roles ( AKA FSMO pronounced FIZZMOE) are, by default, assigned to the first DC installed in an Active Directory environment.
Schema Master The Schema is the field structure of the AD Database in this context – The Schema master maintains that schema, in the case of Schema modifications – such as intalling Exchange, running adprep.exe/forestprep or a third party app that hooks itself into Active Directory (Cognos for example.) This role is unique to the forest. To view the Schema Master, you need to register the schmmgmt.dll file, and then add Schema Management to a mmc console. You can now right click and view the owner of this role (and change it if so desired.)
Continue reading “Flexible Single Master of Operator Roles and How to tell Which Domain Controller Owns Them”
Common computer attack types defined
Access Attacks– the attacker’s goal is to gain unauthorized access to information or services.
Dumpster Diving Literally picking the corporate dumpster for information. Also called Information Diving
Eavesdropping Simply listening in in an effort to gain knowledge.
Snooping Peeking around for information.
Interception The attacker positions himself covertly, either physically or in a digital sense, in the middle of a transaction or conversation.
Modification Attacks The attacker’s goal is to alter information for gain.
Repudiation Attacks Modifying with the purpose of discrediting or invalidating information.
Back Doors by design or surreptiously inserted, allows the attacker a ‘back door’ into a system or application for purposes of control Continue reading “Common Computer Attack Types”
802.11 is the wireless standard (Wi-Fi) established by the IEEE (Institute of Electrical and Electronics Engineers). There are three types of common Wi-Fi technology in use today, and research and development continuously improves both bit rate and range.
Continue reading “802.11 Wi-Fi Standards Overview”