Professional Documents
Culture Documents
Magnifier = magnify
Mouse = main.cpl
Narrator = narrator
Notepad = notepad
Paint = mspaint
Services = services.msc
WordPad = write
Type in at the prompt OR Copy and Paste these one at a time : (Hit enter after each)
a. Type List disk and note the number of the disk on which Windows 10 is installed
b. Type Select Disk N where N is the number of the Windows installation disk
4. Type List Volume to see which partition has the offending drive letter. It will be a drive with a size measured in MB (Megabytes)
5. Type Select Volume N where N is the number of the UEFI partition that’s been given a drive letter, in my experience so far it’s the one called “Recovery”
6. Type Remove Letter=N where N is the drive letter (maybe D or E) assigned to the UEFI partition
7. Type Exit to close Diskpart
8. Close the Command Prompt Window
asterisk -vvvvvvc
fwconsole start
su -c 'yum update'
Wireshark https://wiki.wireshark.org/VoIP_calls
ls -aR
Using VIM, what is the find\replace function for replacing the word 'hot' with 'cold' in an entire document?
:%s/hot/cold/g
# chown root:root $file && chmod 1000 $file && chattr +iu $file
In macOS, what are the default numeric file permissions on a user home folder; /Users/username/?
drwxr-xr-x or 755
dig
free -g
df -h / df -i
uptime
ps -ef | grep brsadmin | wc -l
iostat
Micro Focus ArcSight ESM Comprehensive SIEM tool that runs on Windows environments and is very well suited to large organizations.
Splunk Enterprise Security This tool for Windows and Linux is a world leader because it combines network analysis with log management together with an excellent analysis tool.
LogRhythm Security Intelligence Platform Cutting-edge AI-based technology underpins this traffic and log analysis tool for Windows and Linux.
AlienVault Unified Security Management Great value SIEM that runs on Mac OS as well as Windows.
RSA NetWitness Extremely comprehensive and tailored towards large organizations but a bit too much for small and medium-sized enterprises. Runs on Windows.
IBM QRadar Market-leading SIEM tool that runs on Windows environments
McAfee Enterprise Security Manager Popular SIEM tool that runs through your Active Directory records to confirm system security. Runs on Mac OS as well as Windows.
Microsoft Azure Sentinel
Webistes of Programming and Design http://www.leeholmes.com/projects/
11down vote
You can reset the tunnel via the ASDM software as well as
in the command line.
$path = "$env:LOCALAPPDATA\Microsoft\Windows\WinX\Group2"
$x = "UEsDBBQAAAAIAEphSkmJ5YBS0QAAAPcDAAARAAAAQ29udHJvbCBQYW5lbC5sbmvzYWBgYBRhYgCBA2CSwa2B
mQEiQAAwovEnAzEnA8MCXSBtGBwQ/Kgrwm2Pj4Xz7j/Ck9Vm5J4ThCkURtIEUxyq4TO/cr6l94oLD6/oPrz6GaRYCK
aYEU1xtW7v74sTTPz2J+St4ZykvR+kmAmm+Og13laY6SLMYM0LVMsz81Iyi1RjiiuLS1JzjY1ikvPzSoryc/RSK1KJ
8eswAKoM5QyZDHkMKUCyCMiLYShmqATiEoZUhlwGYwYjoEgyQz5QRQlQPp8hh0EPKFPBMFLCZyQBAFBLAQIUABQAAA
AIAEphSkmJ5YBS0QAAAPcDAAARAAAAAAAAAAAAAAAAAAAAAABDb250cm9sIFBhbmVsLmxua1BLBQYAAAAAAQABAD8A
AAAAAQAAAAA=".replace("`n","")
[Convert]::FromBase64String($x) | Set-Content $path\temp.zip -Encoding Byte
Expand-Archive $path\temp.zip -DestinationPath $path
Remove-Item $path\temp.zip
Stop-Process -Name Explorer
https://community.spiceworks.com/how_to/11824-email-account-lock-out-notification
https://community.spiceworks.com/how_to/73520-date-and-time-synchronization-for-a-standalone-windows-computer?source=learn
https://sid-500.com/2018/02/28/powershell-get-all-logged-on-users-per-computer-ou-domain-get-userlogon/?fbclid=IwAR2Dc_vvn9_wi9m4WEElvYsRm2x2qH5Iy7BWK
CIDR notation Total # of addressesHosts Netmask
/30 4 2 255.255.255.252
/29 8 6 255.255.255.248
/28 16 14 255.255.255.240
/27 32 30 255.255.255.224
/26 64 62 255.255.255.192
/25 128 126 255.255.255.128
/24 256 254 255.255.255.0
/23 512 510 255.255.254.0
/22 1,024 1,022 255.255.252.0
/21 2,048 2,046 255.255.248.0
/20 4,096 4,094 255.255.240.0
/19 8,192 8,190 255.255.224.0
/18 16,384 16,382 255.255.192.0
/17 32,768 32,766 255.255.128.0
/16 65,536 65,534 255.255.0.0
/15 131,072 131,070 255.254.0.0
/14 262,144 262,142 255.252.0.0
/13 524,288 524,286 255.248.0.0
/12 1,048,576 1,048,574 255.240.0.0
/11 2,097,152 2,097,150 255.224.0.0
/10 4,194,304 4,194,302 255.192.0.0
/9 8,388,608 8,388,606 255.128.0.0
/8 16,777,216 16,777,214 255.0.0.0
/7 33,554,432 33,554,430 254.0.0.0
/6 67,108,864 67,108,862 252.0.0.0
/5 134,217,728 134,217,726 248.0.0.0
/4 268,435,456 268,435,454 240.0.0.0
/3 536,870,912 536,870,910 224.0.0.0
/2 1,073,741,824 1,073,741,822 192.0.0.0
/1 2,147,483,648 2,147,483,646 128.0.0.0
/0 4,294,967,296 4,294,967,294 0.0.0.0
The CIDR notation is calculated from the number of ones in the subnet mask when it is converted to binary.
So, for the default subnet mask of 255.255.255.0, it converts to 11111111.11111111.11111111.00000000 in binary.
Add those ones up, and you get 24. In CIDR, that would be /24.
A subnet mask of 255.255.255.192 when converted to binary is 11111111.11111111.11111111.11000000, which contains 26 ones, so that would be /26.
-Type -Name -Link
Cloud Storage Bitbucket https://www.atlassian.com/
Cloud Storage Dropbox http://www.dropbox.com
Cloud Storage Github https://www.atlassian.com/
Cloud Storage Google Drive https://www.google.com/drive/
CRM & SFA Sales Force https://www.salesforce.com/
CRM & SFA Zoho CRM https://www.zoho.com/crm
Finance Freshbooks https://www.freshbooks.com/
Finance Quickbooks Online https://quickbooks.intuit.com/om/qbhp/
Messaging AOL Instant Messenger www.aim.com/
Messaging Facebook@Work https://workplace.fb.com/
Messaging Google Hangouts https://hangouts.google.com/
Messaging Hipchat https://www.atlassian.com/
Messaging LinkedIn https://www.linkedin.com/
Messaging Skype (personal) https://www.skype.com/en/
Messaging Slack http://www.slack.com
Messaging Twitter https://twitter.com/
Messaging Yahoo! Messenger https://messenger.yahoo.com/
Messaging Yammer https://www.yammer.com/
Productivity Confluence https://www.atlassian.com/
Productivity Google Docs https://www.google.com/docs/
Productivity Office Online https://www.office.com/
Project Management Jira https://www.atlassian.com/
Project Management Trello https://trello.com/
Webmail BYOD (personal cell)
Webmail Exchange Online https://login.microsoftonline.com/
Webmail GMail https://www.google.com/gmail/
Webmail Yahoo! Mail https://mail.yahoo.com/
Wiki Atlassian Cloud https://www.atlassian.com/
-Acronym -Name -Link -Law/Practice
Basel II International Standards for Banking Law
FISMA Federal Information Security Management Act of 2002 Law
HIPAA Health Insurance Portability and Accountability Act Law
PCI DSS Payment Card Industry Data Security Standard Law
PAI The Privacy Act of 1974 Law
ITIL Information Technology Infrastructure Library Practice
RTFM Read The Fucking Manual lol
COBIT Control Objectives for Information and related Technology
GAAP Generally Accepted Accounting Principles Law
IFRS International Financial Reporting Standards Law
SOX Sarbanes-Oxley Law
PII Personally Identifiable Information (All)
GDPR General Data Protection Regulation Law (EU)
FERPA Family Education and Records Privacy Act Law
Boot from the Windows 10 DVD.
Make sure that your PC setup is configured to boot from a DVD and that UEFI and Secure Boot are disabled.
After you have replaced utilman.exe successfully, you can remove the DVD and restart your problematic Windows 10 installation:
wpeutil reboot
Reboot Windows 10
On the Windows 10 sign-in page, click the Utility Manager icon
Since we replaced the Utility Manager with the cmd.exe, a command prompt should open now. Don’t worry about the error message.
You can now add a new user with the command below.
We also have to add the user to the administrator group so that we regain full control of our Windows installation.
Replace <username> with the account name of your choice.
Note that the account name must not exist on this Windows installation.
Don’t let the Windows 10 screen saver distract you.
A shorter way to reset the password of a local account is to replace the first command in step 6 with the following command. (In this case, you don’t need to create a new user.)
list users
net user > users.txt
Find Wireless Key netsh wlan show profiles name=YOUR-SSID key=clear Spaces in SSID it won't work
Inssider https://inssider.en.softonic.com/download
Acrylic WiFi https://www.acrylicwifi.com/en/
http://www.asix.com.tw/products.php?op=pItemdetail&PItemID=97;71;101&PLine=71
Ampilfi https://amplifi.com/
Netspot https://www.netspotapp.com/netspotpro.html
http://testconnectivity.microsoft.com
https://docs.microsoft.com/en-us/sysinternals/downloads/autologon
Sharepoint Veiw Members in Group Site Actions -> Site Settings -> People and Groups -> [From the list of the left, select the group which you want] -> Settings -> Group Settings -> Make sure that "Who can view the membership of the group?" is set to "Everyone" -> Make sure that "Who can edit the membership of the group?" is set to "Group Members"
Sharepoint Veiw Members in Group SharePoint Site Collection Administrators
Fop2 fop2.com
iSymphony getisymphony.com
FlowVox flowvox.com
https://www.networkworld.com/article/2339451/infrastructure-management/fact-finding-mission.html
http://www.washingtonpost.com/wp-dyn/content/article/2009/03/12/AR2009031201426.html
https://www.bizjournals.com/washington/blog/2011/06/convicted-dc-contractor-demands.html
PDF Server
http://www.pdfforge.org/pdfcreator-server
Shortcut to commands
Dell http://www.dell.com/support/home/us/en/04/drivers/osiso/recoverytool/wt64a
Ransomeware Decryptors
https://www.nomoreransom.org/en/decryption-tools.html
After you open the file, click File > Save As > click Tools before the Save button > select General Options… > remove the open and modify password > click OK, and then save the file.