July 10th, 2014

I received the following phishing email, so I did the right thing and forwarded it to spoof@paypal.com

Unfortunately, looking at the response from Paypal, they do not take phishing very seriously as the response (further below) says they can not tell if it is a phishing email. You decide

Suspect Email

———-  Forwarded  message  ———-
From:  security@pауρal.com  <fax@helikonradio.hu>
Date:  Thu,  Jul  ##,  ####  at  ##:##  AM
Subject:  Dаta  breасh  guіdе
To:  andy@uk-solutions.co.uk


———————————————————————-

Possible  sесuгity  dаtа  bгеach


Hello  dear  customer,

You  have  likely  heard  of  Heaгtblеed  over  the  past  few  weeks  now.
As  we  always  give  sесuгity  maximum  top  priority,  we  wanted  to  shed  a
bit  more  light  on  it  and  share  with  you  steps  we  have  taken  to  ρгοtесt
our  customers  and  steps  you  can  take  to  protet  yourself  whilst  online.

I’m  sorry  to  bring  to  your  attention  that  some  of  our  ρауpаl  servers
got  susceptible  by  the  Hеагtblееd  bug.  However,  our  IT  engineers
worked  tirelessly  to  curtail  the  аttаck  and  bring  it  under  control.

However,  some  ассοunts  were  affected  as  they  were  unѕесure  and  your
acсоunt  has  been  identified  as  one  of  them.

Why  Hеагtbleed  affects  everyone  on  the  Internet

Hеагtblееd  is  a  bug  in  some  versions  of  openSSL,  a  set  of  software
tools  used  widely  across  the  web  and  on  most  web  browsers.
This  bug  capable  of  ехρlοіtіng  the  flaws  in  the  openSSL,  thus  likely
obtaining  your  persοnаl  dеtаils  such  as  name,  adresss,  passwords  etc.

How  to  pгоtесt  уоuгѕelf

Services  to  and  from  Your  ассount  will  be  temрοгагily  lіmіted
indefinitely.
Please  complete  the  associated  forms  to  begin  Re-authеntісаtіon  and
data  enсгурtіon  in  order  to  resume  service  as  usual.

Please  logіn  tо  your  acсоunt  online  and  follow  the  guidelines.
Please  treat  matter  as  urgent.

Once  again,  we  apologise  for  any  inconvenience  and  downtime  caused.
Your  ѕесuгity  is  our  priority.

If  you  can  not  clісκ  thе  link  ,  you  can  copy  &  pаѕte  it  to  your  browser:
http://update.dq7t86172n.pplsafeuk.com/uk/?YW5keUB1ay1zb2x1dGlvbnMuY28udWs=

Thanking  you  for  your  understanding  and  assistance  in  this  matter.

Response from Paypal

Dear Andy McDonald,

Thanks for taking an active role by reporting suspicious-looking emails.
Unfortunately, we’re unable to determine if this email is considered
phishing because the email did not claim to come from PayPal.
Nonetheless, we are grateful for your concern.

May 6th, 2014

If you are running 64 bit Operating Systems such as Windows 7 or Windows 2008 R2 and also use HP ProtectTools for Authentication Services 4.2 you may experience this issue.

The Authentication Services Credential Provider would cause the remote desktop connection client (mstsc) to crash or may cause Windows Explorer to crash.

I experienced this when I was on a Windows 2008 R2 server. I noticed that when a machine was just started or had been rebooted, the first time a user tried to connect to a fileshare in an external domain, explorer.exe would crash and restart.

HP have recognised this error and it is fixed in the next client release 4.22.

HP ProtectTools Authentication Services 4 2-2 Release Notes

 

September 10th, 2013

I sat my ITIL Foundation last week and I am please to say I passed.

I was looking for a word association to remember the 4 Ps and I came up with the following which you might find useful.

A PERSON  gets married to PARTNERS, the wedding is a PROCESS where a PRODUCT (ring) is given. It workes for me as the first question on the exam was “What are the 4 Ps”

If you want the full definition :-

People

The first ‘people’ to consider are the people that work in the IT services. Service managers need to ensure the following:

  • That their staff have the skills to match the roles
  • They have sufficient staff to support the service
  • That the roles and responsibility of the staff are fit for purpose
  • That culture and communication within the service is appropriate
  • That ongoing training can be provided to fill skills gaps
  • That the IT service fits with the organisational structure and that the right relationships are in place

The next people to be considered are the customers of the service. These are the recipients of the service, and the SLA is agreed with them. The customer is usually another manager within the organisation, or a business owner. For more information, have a look at our blog post on key customer conversations.

The service userare very important. The service must be designed to make the user experience as effective as possible – the users usually feed back to the customer.

Process

The definition of a process is “A set of coordinated activities combining and implementing resources and capabilities in order to produce an outcome, which directly or indirectly, creates value for a customer or stakeholder.”

An effective process must be measurable; have specific results that are identifiable and accountable; must deliver to customers and stakeholders (meet their expectations); and must be able to respond to specific events.

In ITIL, each process will have a Process Owner, whose role includes the following:

  • definition of process strategy and standards
  • assisting with process design
  • keeping process documentation updated
  • ensuring the process is efficient and effective
  • ensuring the right resources and training is provided
  • providing input to Service Improvement Programmes
There will also be a Process Manager, whose role includes the following:
  • accountability for the the operational management of a process
  • working with the Process Owner to plan
  • appointing people to their roles
  • managing resources assigned to processes
  • monitoring and reporting the performance of the process
  • identifying potential improvements
Finally, there will be a Process Practitioners who:
  • carries out process activities
  • creates and updates records to show activities and duties carried out

Products (technology)

An IT service depends on the following technology/products:

  • Its own technology to run efficiently to support others
  • Monitoring tools
  • Automation
  • Support tools
  • Communication tools

Partners (suppliers)

Suppliers have a big impact on IT services – the staff depend on these third parties to deliver the goods or services needed to run the IT service. It’s important for appropriate partnership agreements to be formed, i.e. contracts and service level agreements.

The 4 P’s of ITIL

By managing the 4 Ps, the ITIL framework makes sure that all aspects of an effective IT service strategy are covered. All of the 4 Ps must be aligned to corporate goals to ensure the best, most appropriate, service is delivered.

Read more: http://www.itiltraining-uk.co.uk/the-4-ps-of-itil-service-management/#ixzz2eRgo43ix

July 15th, 2013

As my holiday is getting nearer, I thought I would start to make a few notes about things I want to do while on our little road trip.

When I was a child I remember driving round for hours looking for a the Ham Sandwich sign post with my Grandparents. They never did find it but now with advanced technology (Google and a SatNav) I know the postcode is CT14 0NH I am hopeful I will be able to find it :-)

December 3rd, 2012

Duke of Cambridge Leaving King Edward VII HospitalAs I was in London and staying at a hotel close by, I thought I would go and see what all of the fuss was about.

I managed to get this photo of William the Duke of Cambridge as he left the King Edward VII Hospital at 8.20pm this evening.

As my wife Rachel says “All she needs is a Ginger Nut biscuit” which does help with morning sickness. (apparently !)

I still Don’t know what all of the fuss is about, but I do hope that Catherine feels better soon.

June 9th, 2011

Problem Description

Sophos Enterprise Console version 4.5.1
Installed on Windows 2003 (but this is not important)
Trying to deploy Sophos 9.5 to a Windows 2008 r2 Server.

When trying to deploy Sophos 9.5 to a Windows 2008 r2 server from the Enterprise console, we received the following error.

80070520 “Could not start installation program on the computer: A specified logon session does not exist. It may already have been terminated”

Answer (well sort of)

After speaking to Sophos for the first time they told me to follow these instructions.

http://www.sophos.com/support/knowledgebase/article/62730.html

At the time of writing the video in the link above has inacurate information. I followed the instructions but it still did not work. I contacted Sophos again and they suggested I make a change to Group Policy.

Computer Configuration | Windows Settings | Security Settings | Local Polices | Security Options
you will then see one of the following two items.

Network Access: Do not allow storage of credentials or .NET passports for network authentication
Network Access: Do not allow storage of passwords and credentials for network authentication

Sophos suggest that you disable this.

Caution

Disabling the above does allow remote installation of Sophos from the Enterprise Console; however; this weakens your network from a security point of view and goes against the cis recommendations.

So beware, this solution works but has Security implications, if I find a better way of doing this I will update this article.

November 16th, 2010

Here is a video of my William in one of the Iceland Videos.

Tape Welcome, Sponsors of I’m a Celebrity.....

July 29th, 2010

From time to time when using the repadmin utility “repadmin /replsum” you may come across the following error
1396 logon failure: The target account name is incorrect.

To fix this issue I have followed this precedure.

Stop the KDC service and set the service to manual
Restart your server
Start the KDC Service and set the service back to automatic

Open a command prompt and run the following commands ( You should use a Domain Admins Account)

netdom resetpwd /server: (replication partner) /userd: /
passwordd:”enter password”

Once this has run you should see the following message.

The machine account password for the local machine has been successfully reset.

The command completed successfully.

Reboot your Server.

Finally use repadmin to check the issue has been resolved.

Repadmin /replsum to make sure the secure channel has been fixed

I hope this has helped, and thanks to Sean.

July 28th, 2010

I like many others have been following Ivy Bean on Twitter since she hit the news as the oldest person to be using the twitter service.

Ivy’s biggest fan was Peter Andre who she met a couple of times and also spoke on the phone.

We all knew that Ivy has not been well for the past couple of weeks, and Pat from the Nursing home has been keeping all Ivy’s fans update. I was very saddened to read the updates from Pat this morning which read :-

“Hello all of ivys twitter friend by now you will have heard about our daer friend she i cannot explain how we are all feeling here… ivy passed away peacefully at 12.08 this morning… Im sorry it took me so long to tell you but it was a very difficult thing to do.”

Rest in Peace ivy we will miss you.

April 19th, 2010

Problem.

When running a DCDIAG report on Windows 2003 Domain Controller which is in a child domain the following error is seen.

Starting Test : FsmoCheck
Warning : DcGetDcName(PDC_REQUIRED) call failed, error 1355
A Primary Domain Controller could not be located.
The Server holding the PDC role is down.

Resolution

The error is because DCDIAG is trying to connect to the PDC Emulator in the Parent Domain on port 389UDP. Ensure that any firewall between the root domain controllers and the child domain controllers allows traffic on this port