Posts

Setup Email In IPhone

Image
Set up an email account on your iPhone, iPad, or iPod touch There are two ways you can set up an email account on your iOS device using Mail—automatically and manually. Learn which option is best for you. If you use an email provider like iCloud, Google, or Yahoo, Mail can automatically set up your email account with just your email address and password. Mail might be able to set up other email accounts with your email address and password, but you might need to enter your email settings manually. If you don't know your email settings,  look them up  or  contact your email provider . Choose your account Go to Settings > Mail > Accounts > Add Account. If you see your email provider, tap it to add your account automatically . If you don't see your email provider, tap Other to add your account manually . Set up an account automatically After you choose your email provider, follow these steps: Enter your email address and password. Tap Next and wait for Mail to verify your

Manage your Bandwidth - PFSENSE

Image
Manage your Bandwidth PFSense is by far one of the best gateway solutions out there in my opinion.  I am going to show you one of the many reasons why I think this product is best of breed and that is the Bandwidth limiter. PFSense uses Free BSD as it base, it has included the  DummyNet  software project which allows you to simulate/enforce queues and bandwidth limitations, delays, packet losses, and multipath effects, it also implements a variant of Weighted Fair Queuing called WF2Q+. Now that may sound like a lot of reading to get up to speed with but I assure you it is quite easy to set up and maintain, let me show you how. First off I will take a bandwidth test to see what I get as unregulated bandwidth. I have a cable service from Brighthouse that is 50Mb download and 5 Mb upload. The image tells the tale, I am getting 50/5 as and result of my speed test using Brighthouse’s Speed test. Now let’s get started with our limiting, we will need to create a Upload and a Down

What is an intrusion prevention system?

Image
I ntrusion Prevention and Detection System Basics An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits. Vulnerability exploits usually come in the form of malicious inputs to a target application or service that attackers use to interrupt and gain control of an application or machine. Following a successful exploit, the attacker can disable the target application (resulting in a denial-of-service state), or can potentially access to all the rights and permissions available to the compromised application. Prevention The IPS often sits directly behind the firewall and it provides a complementary layer of analysis that negatively selects for dangerous content. Unlike its predecessor the Intrusion Detection System (IDS)—which is a passive system that scans traffic and reports back on threats—the IPS is placed inline (in the direct communication path betwee

Fix slow boot times in Windows 10

Image
Fix slow boot times in Windows 10 Similar process on Windows 8 before, Windows 10 uses a hybrid boot to enable fast boot times. When you shut the system down, apps and app processes are terminated, but the Windows kernel itself is hibernated to allow for a faster restart. In theory, it's great, but it seems to still be very slow for some Windows 10 users. Disable it by searching for Power Options in the Start Menu and running the matching Control Panel applet, then in the left-hand pane click Choose what the power buttons do. Click Change settings that are currently unavailable, scroll down and un-tick Turn on fast start-up, then click save changes. This should prevent very slow starts on affected PCs. Some users report that if they subsequently ; When using a dual-booting between Windows 10 and Windows 7, switching fast start-up off will also fix the problem where Windows 7 checks the disks each time you boot it: With fast start-up enabled, the earl

How to Export Mailboxes with Exchange

Image
How to Export Mailboxes with Exchange Server 2010 SP1 Exchange Server 2010 Service Pack 1 introduced a new method for exporting mailboxes called Mailbox Export Requests. This new method replaces the previous Export-Mailbox command. Before we look at how to create a new mailbox export request in Exchange 2010 SP1 there are a few things that you should understand. Firstly, no accounts are granted the rights to export mailboxes by default. You need to Explicitly grant these rights, even to accounts that are organization administrators. Secondly, the mailbox export request is processed by the Client Access server role. Because multiple Client Access servers can exist in a site the request could be processed by any one of them. To ensure that the path to the export PST 􀃖 le is valid for any Client Access server it has to be a UNC path to network share, not a local path. GRANTING USER RIGHTS FOR MAILBOX EXPORTS IN EXCHANGE 2010 SP1 The Fi rst step is to gr

How to get windows logged on users passwords

Image
How to get windows logged on users passwords Download the mimikatz tool from below link https://github.com/gentilkiwi/mimikatz/releases/download/2.1.0-20160922/mimikatz_trunk.zip Extract the zip and select the appropriate windows architecture  Run the below two commands Cmd1 privilege::debug Cmd2  sekurlsa::logonPasswords full You see the password for your computer account Note:-This is for educational purpose only. try at your own risk.

Difference between Online and offline UPS

Image

What is Spam?

Image
What is Spam? Spam is a Irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, phishing, spreading Virus, etc. How Spam Mail Look Like? How to Avoid 1.     Always  check the sender  and recipient information of suspicious messages. Spam will typically be sent from falsified email addresses to conceal the real sender, with a number of recipients in the BCC (blind carbon copy) field of the message to hide the large number of recipients. 2.     Don’t open any suspected attachment from the unknown users. Attachment can contain virus which will make your Data (Excel, word, PPT) Corrupted or can be erased. 3.     Important: Never EVER click on a link in an email that you're not absolutely certain is safe. 4.     Never reply to unknown or suspected although the email will say something like,   "reply with unsubscribe in the subject line to be ta