Systems Administration

Google fuels up Chromecast Wi-Fi flooding fix

The Register - 7 hours 35 min ago
It lands today

Google has confirmed plans to issue a patch for Chromecast and Google Home aimed at resolving a traffic flooding problem that was swamping home networks.…

Sound Siphon 2.1.1 - Capture your Mac's audio in any app.

MacUpdate - Mac OS X - 7 hours 39 min ago


Sound Siphon makes your Mac’s audio output available as an audio input device. It allows you to send audio from one application to another, where it can be processed, streamed, or recorded. It's as simple as selecting a microphone in your favorite app. Sound Siphon works with Core Audio to provide this capability to all of your audio apps. As such, it easily integrates into any existing audio-production environment.

Features
  • Capture all of your Mac's audio
  • Capture specific application audio
  • Independently adjust the levels of each application
  • Capture application audio mixed together as stereo audio
  • Capture discretely with each application's audio in its own channels
  • Mute captured applications while capturing


Version 2.1.1:
  • Compatible with more output devices
  • Fixed audio capture of multichannel output devices
  • Better handling of subprocesses, such as Minecraft
  • Added option to enable/disable play through for an input
  • Can now specify the output device used for monitoring in preferences
  • Fixed capturing audio from subprocesses (This fixes capturing from Chrome and Terminal, among other things.)
Version 2.1.1:
  • Compatible with more output devices
  • Fixed audio capture of multichannel output devices
  • Better handling of subprocesses, such as Minecraft
  • Added option to enable/disable play through for an input
  • Can now specify the output device used for monitoring in preferences
  • Fixed capturing audio from subprocesses (This fixes capturing from Chrome and Terminal, among other things.)


  • OS X 10.10 or later


Download Now]]>

TLS 1.2 in FreeRDP / Remmina

Sysadmin - 7 hours 41 min ago

https://github.com/FreeRDP/FreeRDP/issues/2828

Trying to do the tweaking here, but where's the file I need to modify? FreeRDP version I have is 1.1.2 on Ubuntu 16.04 LTS. Trying to RDP to a 2012 R2 box and it's failing.

submitted by /u/98cwitr
[link] [comments]

PDF to Excel Converter 6.0.0 - Convert PDF to Excel spreadsheet.

MacUpdate - Mac OS X - 7 hours 43 min ago


Lighten PDF to Excel Converter eliminates the need to retype data from PDF files. You can quickly and accurately convert native PDF files to Microsoft Excel spreadsheet (.xlsx) and CSV formats. It will automatically detect tables in most PDF files. You can manually mark table areas, add columns and rows, and merge or split cells for PDFs with extremely complex layouts. It provides flexible features crafted to suit all your conversion needs and convert all kinds of tabular data.

Features
  • Easily and quickly converts PDF to Excel and CSV
  • This app is designed for converting PDF to Excel (.xlsx) file so you can calculate, perform formula or organize the data easier
  • Convert table automatically in smart ways
  • It will detect table base on table borders or data structure, so it can convert most of the PDF files with table data automatically and accurately
  • Mark and edit table areas flexibly
  • For some table with complex layout, which auto conversion is not correct, you can manually add columns and rows, merge and split cells as you wish. In this case, it can handle even the most complex PDF file data without any problems
  • Flexible output options
    • You can convert table data only
    • Keep original formatting, such as font and cell color, border lines etc.
    • Or just convert data without formatting
    • And more output options are available
  • Convert multiple PDF files at one time

You can add as many PDF files as you want at one time, at a speed of 100 page per min, even the longest files will be converted in minutes to save your time. You don’t need to worry about endless hours of manual retyping. No matter how complex or large your PDF files are, Lighten PDF to Excel Converter will get the job done.



Version 6.0.0:

Note: Currently available for $19.99

  • Enhanced the conversion for Asian characters, including Chinese and Japanese, and optimized the algorithm for font matching
  • Fixed the compatibility problem for macOS 10.13
  • Other bug fixes and enhancements


  • OS X 10.7 or later


Download Now]]>

SoftRAID 5.6.4 - High-quality RAID management.

MacUpdate - Mac OS X - 7 hours 43 min ago


SoftRAID allows you to create and manage disk arrays to increase performance and reliability. SoftRAID allows the user to create and manage RAID 4 and 5 volumes, RAID 1+0, and RAID 1 (Mirror) and RAID 0 (Stripe) volumes. SoftRAID also provides "predictive disk failure", where users are alerted to potential disk failures even before they fail.

SoftRAID's intuitive interface and powerful feature set make this utility a must-have for any OS X Server admin, "Pro" user, photographer, digital-video editor, or desktop user who wants more reliable backup for his computer.



Version 5.6.4:

Note: SoftRAID 5.6.4 includes important bug fixes and changes that allow SoftRAID to be compatible with macOS 10.13 High Sierra. High Sierra involves a completely new file system (APFS) as well as major changes to the ker- nel, security and third-party software requirements, and the SoftRAID team has worked hard to ensure that SoftRAID will work flawlessly with High Sierra, although it does not yet support APFS. This means that currently, SoftRAID does not support creating, modifying or converting APFS volumes. However, SoftRAID’s certify, verify and monitoring features will work with APFS formatted disks. Full support for APFS will be included with SoftRAID version 6.

New Features:
  • With SoftRAID 5.6.4 ‘SoftRAID for ThunderBay’ has been renamed ‘SoftRAID XT’, and ‘SoftRAID Lite for ThunderBay’ is now ‘SoftRAID Lite XT’. (SoftRAID XT is a version of SoftRAID bundled with OWC hardware).
  • SoftRAID now reports the number of total bytes written for most SSDs. If available, this is displayed in the disk tile for the SSD (in SoftRAID’s main UI window). We will be adding support for additional SSDs in the future. If the total bytes written value does not appear for your brand of SSD, please contact support@softraid.com so we can add it.
  • Added support for future OWC products to SoftRAID XT.
Bugs Fixed:
  • SoftRAID 5.6.4 contains a work-around for a macOS bug which caused a kernel panic every time Apple’s Disk Utility program was used to erase a SoftRAID disk. This bug was introduced in Mac OS 10.12. With this work-around, the Mac no longer kernel panics but the Disk Utility application still hangs.
  • SoftRAID takes security very seriously, and all SoftRAID DMG files are now code signed, so users can be certain the image they download from our site is an unaltered DMG file.
  • SoftRAID 5.6.4 fixes a bug which caused the SoftRAID Tool to crash when volumes were unmounted or initialized using the command line interface.


  • OS X 10.6.8 or later
  • Support for TRIM commands on SSD's require OS X 10.7.5 or later


Download Now]]>

Can you break down your Server/Data retention.

Sysadmin - 7 hours 43 min ago

We currently back ever server up and keep all Data for 7 years. Plus we have no user restrictions on network drives. We burn through disk space like crazy. What are other companies doing as far as Data retention? A break down such as; Servers: App, Web, Dev, etc. Then File Server data and email as well. Would appreciate any feedback.

submitted by /u/Hellblazer01
[link] [comments]

Best way to get reports on all open ports (currently in use and not in use)?

Sysadmin - 7 hours 44 min ago

Whats the best way to consistently grab an updated list of all open ports per server/workstation and output a decent report? Currently I'm using GFI Languard for patch management and it tells you the open and currently in use but not the open but not in use ones.

CurrPorts kind of seems like what I'm looking for but wanted to check all my options.

submitted by /u/JDark628
[link] [comments]

Deployed 250 Laptops and 70% are rebooting a few times a day. Bad driver injected to image and need to reimage them all.

Sysadmin - 7 hours 47 min ago

How’s your Thursday? Better still is that about 2% of the deployment lose BIOS settings on reboot. The original image was for AHCI so the user sees no bootable device found. This shouldn’t happen when docked and a battery plugged in right?

submitted by /u/geekender
[link] [comments]

HP Proliant DL185 G5 Drivers - Need SmartStart?

Sysadmin - 7 hours 50 min ago

I'm trying to reinstall Windows on this this and I keep getting the A Required CD/DVD drive device driver is missing.

HPs page only has NIC and SATA Controller drivers when I search for Server 2008. Does anyone know where to get the SmartStart package? for the G5's? I think that's what I need but I can't find it anywhere

submitted by /u/ExitMusic_
[link] [comments]

How to perform IT Risk Assessment

Sysadmin - 7 hours 51 min ago

Cybersecurity is all about understanding, managing, controlling and mitigating risk to your organization’s critical assets. Whether you like it or not, if you work in security, you are in the risk management business.

To get started with IT security risk assessment, you need to answer three important questions:

  1. What are your organization’s critical information technology assets — that is, the data whose exposure would have a major impact on your business operations?
  2. What are the top five business processes that utilize or require this information?
  3. What threats could affect the ability of those business functions to operate?

Once you know what you need to protect, you can begin developing strategies. However, before you spend a dollar of your budget or an hour of your time implementing a solution to reduce risk, you should be able to answer the following questions:

  1. What is the risk you are reducing?

  2. Is it the highest priority security risk?

  3. Are you reducing it in the most cost-effective way?

These questions get to the heart of the problem — that it is all about risk.

What is Risk?

Risk is a business concept — is the likelihood of financial loss for the organization high, medium, low or zero? Three factors play into risk determination: what the threat is, how vulnerable the system is, and the importance of the asset that could be damaged or made unavailable. Thus, risk can be defined as follows:

Risk = Threat x Vulnerability x Asset

Although risk is represented here as a mathematical formula, it is not about numbers; it is a logical construct. For example, suppose you want to assess the risk associated with the threat of hackers compromising a particular system. If your network is very vulnerable (perhaps because you have no firewall and no antivirus solution), and the asset is critical, your risk is high. However, if you have good perimeter defenses and your vulnerability is low, and even though the asset is still critical, your risk will be medium.

There are two special cases to keep in mind:

  • Anything times zero is zero. If any of the factors is zero, even if the other factors are high or critical, your risk is zero.
  • Risk implies uncertainty. If something is guaranteed to happen, it is not a risk.

Here are some common ways you can suffer financial damage:

  • Data loss. Theft of trade secrets could cause you to lose business to your competitors. Theft of customer information could result in loss of trust and customer attrition.
  • System or application downtime. If a system fails to perform its primary function, customers may be unable to place orders, employees may be unable to do their jobs or communicate, and so on.

  • Legal consequences. If somebody steals data from one of your databases, even if that data is not particularly valuable, you can incur fines and other legal costs because you failed to comply with the data protection security requirements of HIPAA, PCI DSS or other compliance

Now let’s walk through the risk assessment procedure.

Step 1: Identify and Prioritize Assets

Assets include servers, client contact information, sensitive partner documents, trade secrets and so on. Remember, what you as a technician think is valuable might not be what is actually most valuable for the business. Therefore, you need to work with business users and management to create a list of all valuable assets. For each asset, gather the following information, as applicable:

  • Software

  • Hardware

  • Data

  • Interfaces

  • Users

  • Support personnel

  • Mission or purpose

  • Criticality

  • Functional requirements

  • IT Security policies

  • IT Security architecture

  • Network topology

  • Information storage protection

  • Information flow

  • Technical security controls

  • Physical security environment

  • Environmental security

Because most organizations have a limited budget for risk assessment, you will likely have to limit the scope of the project to mission-critical assets. Accordingly, you need to define a standard for determining the importance of each asset. Common criteria include the asset’s monetary value, legal standing and importance to the organization. Once the standard has been approved by management and formally incorporated into the risk assessment security policy, use it to classify each asset you identified as critical, major or minor.

Step 2: Identify Threats

A threat is anything that could exploit a vulnerability to breach security and cause harm to your organization. While hackers and malware probably leap to mind, there are many other types of threats:

  • Natural disasters. Floods, hurricanes, earthquakes, fire and other natural disasters can destroy much more than a hacker. You can lose not only data, but the servers and appliances as well. When deciding where to house your servers, think about the chances of a natural disaster. For instance, don’t put your server room on the first floor if your area has a high risk of floods.

  • System failure. The likelihood of system failure depends on the quality of your computer For relatively new, high-quality equipment, the chance of system failure is low. But if the equipment is old or from a “no-name” vendor, the chance of failure is much higher. Therefore, it’s wise to buy high-quality equipment, or at least equipment with good support.

  • Accidental human interference. This threat is always high, no matter what business you are in. Anyone can make mistakes such as accidentally deleting important files, clicking on malware links, or accidentally physical damaging a piece of equipment. Therefore, you should regularly back up your data, including system settings, ACLs and other configuration information, and carefully track all changes to critical systems.

  • Malicious humans. There are three types of malicious behavior:

Interference is when somebody causes damage to your business by deleting data, engineering a distributed denial of service (DDOS) against your website, physically stealing a computer or server, and so on.

Interception is classic hacking, where they steal your data.

Impersonation is misuse of someone else’s credentials, which are often acquired through social engineering attacks or brute-force attacks, or purchased on the dark web.

Step 3: Identify Vulnerabilities

Third, we need to spot vulnerabilities. A vulnerability is a weakness that a threat can exploit to breach security and harm your organization. Vulnerabilities can be identified through vulnerability analysis, audit reports, the NIST vulnerability database, vendor data, commercial computer incident response teams, and system software security analysis.

Testing the IT system is also an important tool in identifying vulnerabilities. Testing can include the following:

  • Information Security test and evaluation (ST&E) procedures

  • Penetration testing techniques

  • Automated vulnerability scanning tools

You can reduce your software-based vulnerabilities with proper patch management. But don’t forget about physical vulnerabilities. For example, moving your server room to the second floor of the building will greatly reduce your vulnerability to flooding.

Step 4: Analyze Controls

Analyze the controls that are either in place or in the planning stage to minimize or eliminate the probability that a threat will exploit vulnerability in the system. Controls can be implemented through technical means, such as computer hardware or software, encryption, intrusion detection mechanisms, and identification and authentication subsystems. Nontechnical controls include security policies, administrative actions, and physical and environmental mechanisms.

Both technical and nontechnical controls can further be classified as preventive or detective controls. As the name implies, preventive controls attempt to anticipate and stop attacks. Examples of preventive technical controls are encryption and authentication devices. Detective controls are used to discover attacks or events through such means as audit trails and intrusion detection systems.

Step 5: Determine the Likelihood of an Incident

Assess the probability that a vulnerability might actually be exploited, taking into account the type of vulnerability, the capability and motivation of the threat source, and the existence and effectiveness of your controls. Rather than a numerical score, many organizations use the categories high, medium and low to assess the likelihood of an attack or other adverse event.

Step 6: Assess the Impact a Threat Could Have

Impact analysis should include the following factors:

  • The mission of the system, including the processes implemented by the system

  • The criticality of the system, determined by its value and the value of the data to the organization

  • The sensitivity of the system and its data

The information required to conduct an impact analysis can be obtained from existing organizational documentation, including a business impact analysis (BIA) (or mission impact analysis report, as it is sometimes called). This document uses either quantitative or qualitative means to determine the impact that would be caused by compromise or harm to the organization’s information assets.

An attack or adverse event can result in compromise or loss of information system confidentiality, integrity and availability. As with the likelihood determination, the impact on the system can be qualitatively assessed as high, medium or low.

The following additional items should be included in the impact analysis: * The estimated frequency of the threat’s exploitation of a vulnerability on an annual basis * The approximate cost of each of these occurrences * A weight factor based on the relative impact of a specific threat exploiting a specific vulnerability

Step 7: Prioritize the Information Security Risks

For each threat/vulnerability pair, determine the level of risk to the IT system, based on the following: * The likelihood that the threat will exploit the vulnerability * The impact of the threat successfully exploiting the vulnerability * The adequacy of the existing or planned information system security controls for eliminating or reducing the risk

A useful tool for estimating risk in this manner is the risk-level matrix. A high likelihood that the threat will occur is given a value of 1.0; a medium likelihood is assigned a value of 0.5; and a low likelihood of occurrence is given a rating of 0.1. Similarly, a high impact level is assigned a value of 100, a medium impact level 50, and a low impact level 10. Risk is calculated by multiplying the threat likelihood value by the impact value, and the risks are categorized as high, medium or low based on the result.

Step 8: Recommend Controls

Using the risk level as a basis, determine the actions that senior management and other responsible individuals must take to mitigate the risk. Here are some general guidelines for each level of risk:

  • High— A plan for corrective measures should be developed as soon as possible.

  • Medium — A plan for corrective measures should be developed within a reasonable period of time.

  • Low — The team must decide whether to accept the risk or implement corrective actions.

As you consider controls to mitigate each risk, be sure to consider:

  • Organizational policies

  • Cost-benefit analysis

  • Operational impact

  • Feasibility

  • Applicable regulations

  • The overall effectiveness of the recommended controls

  • Safety and reliability

Step 9: Document the Results

The final step in the risk assessment process is to develop a risk assessment report to support management in making appropriate decisions on budget, policies, procedures and so on. For each threat, the report should describe the corresponding vulnerabilities, the assets at risk, the impact to your IT infrastructure, the likelihood of occurrence and the control recommendations. Here is a very simple example: https://i.imgur.com/Ak9Yeqc.jpg

You can use your risk assessment report to identify key remediation steps that will reduce multiple risks. For example, ensuring backups are taken regularly and stored offsite will mitigate the risk of accidental file deletion and also the risk from flooding. Each of these steps should have the associated cost and should deliver real benefit in reducing the risks. Remember to focus on the business reasons for each improvement implementation.

As you work through this process, you will get a better idea of how the company and its infrastructure operates and how it can operate better. Then you can create risk assessment policy that defines what the organization must do periodically (annually in many cases), how risk is to be addressed and mitigated (for example, a minimum acceptable vulnerability window), and how the organization must carry out subsequent enterprise risk assessments for its IT infrastructure components and other assets.

Always keep in mind that the information security risk assessment and enterprise risk management processes are the heart of the cybersecurity. These are the processes that establish the rules and guidelines of the entire informational security management, providing answers to what threats and vulnerabilities can cause financial harm to our business and how they should be mitigated.

submitted by /u/Jeff-Netwrix
[link] [comments]

SoftRAID Lite 5.6.4 - Industry-standard RAID management.

MacUpdate - Mac OS X - 7 hours 52 min ago


SoftRAID Lite is a replacement for Apple's Disk Utility RAID. SoftRAID Lite is based the full SoftRAID engine, with the only limitations being that SoftRAID Lite supports only RAID levels 0 (stripe) and 1 (Mirror) volumes, and does not have email notification or the command line interface. Tecchnical support for SoftRAID Lite is available on the SoftRAID forum.

SoftRAID Lite also provides "predictive disk failure", where users are alerted to potential disk failures even before they fail. SoftRAID Lite allows you to create and manage disk arrays to increase performance and reliability. SoftRAID's intuitive interface and powerful feature set make this utility a must-have for any OS X Server admin, "Pro" user, photographer, digital-video editor, or desktop user who wants more reliable backup for his computer.



Version 5.6.4:

Note: SoftRAID Lite 5.6.4 includes important bug fixes and changes that allow SoftRAID Lite to be compatible with macOS 10.13 High Sierra. High Sierra involves a completely new file system (APFS) as well as major changes to the kernel, security and third-party software requirements, and the SoftRAID team has worked hard to ensure that SoftRAID Lite will work flawlessly with High Sierra, although it does not yet support APFS. This means that currently, SoftRAID Lite does not support creating, modifying or converting APFS volumes. However, SoftRAID Lite’s certify, verify and monitoring features will work with APFS formatted disks. Full support for APFS will be included with SoftRAID Lite version 6.

New Features:
  • With SoftRAID 5.6.4 ‘SoftRAID for ThunderBay’ has been renamed ‘SoftRAID XT’, and ‘SoftRAID Lite for ThunderBay’ is now ‘SoftRAID Lite XT’. (SoftRAID XT is a version of SoftRAID bundled with OWC hardware).
  • SoftRAID now reports the number of total bytes written for most SSDs. If available, this is displayed in the disk tile for the SSD (in SoftRAID’s main UI window). We will be adding support for additional SSDs in the future. If the total bytes written value does not appear for your brand of SSD, please contact support@softraid.com so we can add it.
  • Added support for future OWC products to SoftRAID XT.
Bugs Fixed:
  • SoftRAID 5.6.4 contains a work-around for a macOS bug which caused a kernel panic every time Apple’s Disk Utility program was used to erase a SoftRAID disk. This bug was introduced in Mac OS 10.12. With this work-around, the Mac no longer kernel panics but the Disk Utility application still hangs.
  • SoftRAID takes security very seriously, and all SoftRAID DMG files are now code signed, so users can be certain the image they download from our site is an unaltered DMG file.
  • SoftRAID 5.6.4 fixes a bug which caused the SoftRAID Tool to crash when volumes were unmounted or initialized using the command line interface.


  • OS X 10.6.8 or later
  • Support for TRIM commands on SSD's require OS X 10.7.5 or later


Download Now]]>

PDF to Word Converter 6.0.0 - Convert your PDFs into Word documents.

MacUpdate - Mac OS X - 7 hours 56 min ago


PDF to Word Converter is a highly accurate and easy-to-use application which converts PDF files into Microsoft Word document, keeping the original content, layout and formatting. Stop retyping PDF content manually today. With Lighten PDF to Word Converter, copying from PDF or reusing content in Word documents couldn't be easier.

Features
  • Start with a neat and clear interface, start conversion immediately without learning
  • Convert PDF precisely. Support PDF with multi-column, graphics, tables, formatting, and preserve everything perfectly in Microsoft Word
  • Let you import and convert as many PDFs as you like
  • Convert any particular pages (e.g., 1,5-10,21, or all pages) to save your time
  • Built-in PDF reader is a good way to view a batch of PDFs within the app
  • Convert a 100-page PDF file within a minute
  • Support PDF with copying and printing restrictions
  • Convert PDF to plain text (.txt)
  • Supports Microsoft Office 2008/2011


Version 6.0.0:
  • Enhanced the conversion for Asian characters, including Chinese and Japanese, and optimized the algorithm for font matching
  • Fixed the compatibility problem for macOS 10.13
  • Other bugs fixed and enhancements


  • OS X 10.7 or later


Download Now]]>

Apple iPhone X: Two weeks in the life of an anxious user

The Register - 7 hours 58 min ago
A smartphone that plucks at your heartstrings, not always in a good way

A top-end smartphone isn’t just for Christmas: it’s for 18 months, maybe two years, two-and-a-half at a push. So here at The Reg, we let the stardust settle around Apple's iPhone X launch before putting the product to test in the field for longer than an afternoon. Fanboi squeals written up just after you peel away the cellophane are no use to anyone.…

Opera 50.0.2762.58 - High-performance Web browser.

MacUpdate - Mac OS X - 8 hours 1 min ago


Opera is a fast and secure browser trusted by millions of users. With the intuitive interface, Speed Dial and visual bookmarks for organizing favorite sites, news feature with fresh, relevant content, speed-boosting Opera Turbo mode and more handy features, Opera has everything you need to do more on the web. Also, with 1700+ available extensions, you can mix and match additional features to customize the browser the way you want.



Version 50.0.2762.58:
  • DNA-66085 Avoid direct downloads of currency exchange rates
  • DNA-66436 [Adblocker] New rules should be downloaded on upgrade
  • DNA-66467 Bookmarksbar is shown upon update to O50
  • DNA-66480 Blank history, white StartPage


  • OS X 10.10 or later


Download Now]]>

Vonage 2018 Predictions: How Three of the Most Influential Consumer Technologies of 2017 Will Change the Way Businesses Communicate in 2018

As technology continues to develop and evolve, there seem to be two universal truths: an Apple device can always get skinnier and what happens in the consumer world, happens in the enterprise. 2017 has seen some waves of debate about artificial intelligence (AI), virtual reality, personalizable media (chat and social media like SnapChat, Facebook Messenger and Instagram) and most prominently recently, cryptocurrency. In general, the focus has been on the consumer side of these topics, but they have significant business implications as well. ...(read more)

What is the impact and likelihood of global risks?

The World Economic Forum, a not-for-profit foundation that each year gathers participants from around the world to discuss a wide range of global issues, has published its yearly Global Risks Report. Based on the opinions of almost 1,000 global experts and decision-makers, the top 5 global risks in 2018 in terms of likelihood are extreme weather events, natural disasters, cyber attacks, data fraud or theft, and failure of climate-change mitigation and adaptation. Cyber attacks and … More →

Debugging Environment Specific Application hangs - tools and services

Sysadmin - 8 hours 2 min ago

So I have a new bane of my existence. Some horribly written software that only seems to work for us reliably on Windows 10 when run as a local administrator with no policies applied (i.e. not domain joined).

When run with a domain joined Win 10 instance with full software load outs it has issues. Hangs, crashes, permissions problems etc.

We're currently using some software to elevate processes (Quest / KACE Process Manager (was Privilege Authority when we bought it). This may be leading to hangs when the process does something PA misses to elevate.

Attempts to hook with SpyStudio from Nektra (my go to for these things) cause the application to hang immediately and no trace is recovered.

Whyhang from nirsoft can capture a stack trace, which I'm far less familiar with. It's been a long time since I had to look at one of these, and never on Win 10.

Anyway, has anyone written something like whocrashed that tells you what was failing? Is there a forum where I can get help with traces and suggested troubleshooting or a paid service that might be able to remote in and see where this is hanging?

I'm ending up at a bit of a loss, and may need additional eyes on this... Any suggestions?

Background: Of course, I'd love to say don't use the software - but it's the only way to control some industrial hardware which I've been told is $250,000 cheaper than the competitors we've used in the past with far less software issues. Our budgets aren't going to let us do the obvious and throw this "crap" out. Much that I wish we could.

Application virtualization failed because the app would only run one window under Cameyo (the tool we currently have) and the users insisted they must be able to open multiple instances at once. The tool doesn't have tabs etc.

The program also needs regular updates which installs in new folders and uses new ini files that they store in C:\Windows\System32 (Because why not? FML). The program cannot be installed silently and repackagers like EmcoSoft MSI Builder fail to generate a successful MSI.

So users needed unrestricted elevation to get updates to work and permissions to write to these ini files in System32 or the program hangs. We don't have time to write config for this every week or so, hence the privilege elevation software - it's at least auditing what's elevated. But... it's also apparently not working for various parts of the software.

As part of this we were attempting to isolate these computers using Windows Advanced Firewall - blocking internet access outbound and only allowing connections to our internal fileserver, AD and KMS. This is to try and prevent "dumb" web browsing. But maybe this is breaking Win10 or the software or who knows what. This also may be a stupid compensating control.

Anyway, before we just "give up" and give these people unmanaged run as admin all the time so this software works extra computers - with no internet restrictions - i.e. do everything wrong just to run this ***#$# software - this post to try to find better debugging ideas and help (or heck, better security methods or whatever).

submitted by /u/jmp242
[link] [comments]

SerialMailer 7.9.11 - Create personalized email newsletters.

MacUpdate - Mac OS X - 8 hours 2 min ago


SerialMailer lets you add personalized details to your mass email messages. Give each message a custom name, order number, or even attachment. Engage your customers and colleagues, or show your friends and family that you care -- when it comes to bulk email messages, a touch of personality goes a long way! Take the headache out of mass emailing with SerialMailer.



Version 7.9.11:
  • [Bug fix] Could no longer switch to formatted text if the font set as default font was uninstalled


  • OS X 10.8 or later


Download Now]]>

Norton AntiVirus Definitions 01/16/2018 - Virus definitions for Symantec/Norton AntiVirus.

MacUpdate - Mac OS X - 8 hours 4 min ago


Norton AntiVirus Definitions are the latest anti-virus detection files. The installer will automatically update Norton AntiVirus virus definitions and engine files to detect and repair the most recently discovered Mac viruses. This file is a self-extracting archive which contains the Norton AntiVirus Virus Definitions Installer. Once downloaded and expanded on your hard drive, simply double-click on the Installer and the appropriate files will be installed on your computer.



Version 01/16/2018:
  • Includes the latest virus definitions


  • OS X 10.4.11 or later
  • Symantec Endpoint Protection 11.0.6 through 12.1.3, Norton AntiVirus 11.x, or Symantec AntiVirus 10.2


Download Now]]>

Dyrii Journal 1.14.1 - Diary for your memories (was Dyrii).

MacUpdate - Mac OS X - 8 hours 4 min ago

Dyrii Journal is more than just a diary or a journal. It is a time capsule for all your memories and experiences on planet earth!

Examples of use:

  • Write privately instead of on social media
  • On busy days, capture photos, audio, video on-the-go
  • Automatically log all the places you visit in a day
  • Keep notes on your health and mood
  • Effortlessly write using a library of templates specialized for dream notes, gratitude, annual resolutions, CBT, health, and wellness etc
Features
  • Timeline for all your private posts and activities
  • Record rich text, photos, audio, video, sketches, handwritten notes
  • Advanced editor with inline formatting and multiple attachments
  • Automatic journal to keep log of all the places your visit each day
  • Day/Week view to easily glimpse through your days
  • Tags for organizing and indexing your own way
  • Health and mood tracker to keep notes about health incidents
  • Creative Slate to sketch, doodle, or create handwritten notes with the Apple Pencil
  • Private storage to securely store your data in your iCloud account
  • Offline mode to store data locally on the device for additional privacy
  • Other features such as passcode and Touch ID, reminders, print to PDF, and import data from other apps

Note: This application contains in-app and/or external module purchases.



Version 1.14.1:
  • Resolved an issue that caused date header in the editor to not display the changed datetime value
  • Added a new "Advanced" tab under Preferences to display account-ID barcode


  • OS X 10.11 or later


Download Now

Pages