The LMS servers and curriculum have won several awards for innovation and administration (Under TTC Shelbyville)-
Tennessee College of
2014 InfoWorld Technology Leadership Nominee
Hits | SV (NI)
- 2,085,498 hits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Bits of Bytes' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
- Partition your HDD to increase performance
- Test your network speed
- Block ads at your router – ADBlock and Tomato Firmware
- Cannot update to Windows 8.1 or Windows 8.1 Update
- Bonjour, the chatty protocol
- 0xAB Bluescreen Windows 10 Technical Preview
- Increase performance on MySQL with a SSD and modifying your my.ini or my.cnf file
- Windows 10 Support Links – Tips-Tweaks
- Test Your Hard Drive Speed With Windows 7's Device Manager
- Realtek PCIe GBE Family Controller performance issues
- Speed up Chrome with a ram disk
- Rufus USB boot and Hiren's Boot ISO
- What is core parking and should you adjust it?
- Commands in Telnet - DD-WRT and Tomato routers
- Optimize your SSD Drive
- Defending your network with Snort for Windows
- Red X on network icon - Windows 7
- Export VMWare Player's Virtual Machines to an OVF file
- CVE-2013-4440 (pwgen)Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.
- CVE-2013-4442 (pwgen)Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.
- CVE-2013-6435 (rpm)Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
- CVE-2013-7401The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.
- CVE-2013-7402 (c-icap)Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.
- CVE-2013-4440 (pwgen)
- Android anti-virus antivirus apple Business cloud computing College Computer computer hardware computer repair Computers computer security computer technology Computer Utilities downloads Droid Education facebook Firefox freeware google hackers Hacking Hardware higher ed higher education Information Technology Internet Internet Explorer internet security iPad iphone IT K-12 laptops Law Life Linux mac Malware Microsoft microsoft office microsoft windows microsoft windows 7 network networking Network Security News PC School Security Server 2008 Software spyware TBR Technology Tennessee Ubuntu VirtualBox virtualization Virus Viruses Vista web Web 2.0 Windows windows 7 Windows 8 windows server windows utilities Windows Vista Windows XP Wireless wireless networking XP
- Governor Haslam Announces Workforce Development Grant Recipients goo.gl/rKx16K 1 week ago
- The 2014 Graduation ceremony took place December 5th, 2014. Look for the video and pictures on our website this week. http://t.co/j3p1RwmKyW 1 week ago
- Tim Lawrence, Executive Director SkillsUSA interview #SkillsUSA youtube.com/watch?v=xrj3Qr… 3 weeks ago
- Visit our website - tcatshelbyville.edu 1 month ago
- Instagram pics from TN Promise instagram.com/tnpromise 1 month ago
After being asked ‘Why?’ are these devices are on the web, we have sent a series of questions to industry leading experts…coming soon
SCADA devices are systems that control manufacturing or infrastructure devices. We are always calling for the need to protect these devices with appropriate security measures. Here’s a look at how easily they can be found and seen by anyone on the internet.
Steps to protect SCADA (Supervisory control and data acquisition networks)
While disabling LLMNR can speed up your SQL connection sometimes, ironically you may be slowed down by MS14-066 (KB2992611).
See this article -
“Microsoft does it again, botches KB 2992611 SChannel patch” – Infoworld
What do you do? The article above gives some advice and more advice comes from the link at the bottom of this blog posting.
Here’s a couple of fixes if you installed KB2992611 and your SQL server came to a crawl
Possible fixes if you’re already affected:
Go to computer configuration > administrative templates > Network > SSL Configuration Settings > SSL Cipher Suite Order
Set it to enabled
Reboot or gpupdate /refresh at an elevated command prompt
The policy populates the Windows registry with the legacy cipher suites less the 4 new cipher suites added by MS14-066 /2992611.
Source/Credit : http://blogs.msmvps.com/spywaresucks/2014/11/16/hold-off-installing-ms14-066-kb-2992611/
Note: ALWAYS backup your data before your try reversing a patch or modifying policies or the registry.
Microsoft should fix this soon…
Here’s how to improve performance – LLMNR -
One of the most talented people I know is Jared Ledlow. A former student, Jared was remarkable at diagnosing computers, learning new technology and absolutely loved playing and writing music. His personality is contagious and his unselfishness in learning and teaching others is above reproach.
After graduation, Jared started as a government contractor resolving help desk tickets.
He went on to become a Technical Assistance Associate in one of the largest data centers.
Jared now monitors the critical infrastructure behind the day to day operations in his company’s data center.
Some of his responsibilities include monitoring UPSs, CRAC units and a ton more.
In IT you need motivation, initiative, worker ethics, a desire to learn and more. Jared Ledlow has these qualities and more.
If you cannot change accounts in Windows 8, 8.1 or Windows 8.1 Update there are several things you can try -
First try editing the registry
In the search box, type regedit
Navigate to the following:
Modify the registry value of HideFastUserSwitching from 1 to 0
Log off and restart the machine
Did it work? If not, try editing the group policy
In the search box, type gpedit.msc
Navigate to -
Local Computer Policy/Computer Configuration/AdministrativeTemplates/System/Logon
Double click Hide Entry Points for Fast User Switching to bring up a dialog box to change Fast User Switching policy setting.
Close the group policy editor
Open a command prompt and type gpupdate /force
If the above did not work, try a refresh pc
Go to a “Command Prompt” as an Administrator
shutdown.exe /r /o /f /t 00
The computer will restart
Select Refresh PC
After some some updates, you may notice that you cannot see all of the users when logging in.
Open GPEdit.msc (Group Policy Editor)
Navigate to Windows Settings, Security Settings, Local Policies, Interactive logon: Do not display last username and double click. Select enable and reboot your computer or use gpupdate /force.