Vista, 7 and 8 Networking Woes – Fixed

These tips work on Snap Servers and NAS devices that say they are NOT Vista, 7 and 8 capable and XP workstations that will not connect.

Option 1

When connecting Vista, 7  or 8 to XP, if you have problems, make sure the time is correct on both machines

Option 2

On the Vista, 7 or 8 Computer
select Administrative Tools->Local Security Policy.
Select Local Policies->Security Options->Network security->LAN Manager authentication level.
Select this and use the drop down to change it to:
Use the setting “Send LM & NTLM – use NTLM v.2 if negotiated”

If you go to the UNC Path \\yourcomputer, you will have to use the username:

thecomputeryouareconnectingtoname\usernameonthatcomputer  then enter your password.

Vista, 7 or 8 has great networking features, you just have to know how to use them. Click on Images to Enlarge.

Linux Vulnerability

There appears to be a Linux vulnerability that has been around for about seven years.  Although a patch is coming out  soon (some patches have been released) doesn’t mean the dozens of other ‘flavors’ of LInux have been patched.

Get your updates.

Want a vulnerable Linux? Link to an unsecure Linux

SANS Internet Storm Center article on “How to Suck at Information Security”

You can’t ignore this article.  This excellent article points out the ‘what not to dos’.   Lenny Zeltser does a great job at listing information that is often overlooked.  Here are a few examples from this article.  Make sure you read the entire article.  I can go through and find flaws in my operations just by looking at it.  It is never too late to correct your flaws….

  • Ignore regulatory compliance requirements.
  • Assume the users will read the security policy because you’ve asked them to.
  • Use security templates without customizing them.
  • Jump into a full-blown adoption of frameworks such as ISO 27001/27002 before you’re ready.
  • Create security policies you cannot enforce.
  • Enforce policies that are not properly approved.
  • Blindly follow compliance requirements without creating overall security architecture.
  • Create a security policy just to mark a checkbox.

Read More…

Two Devices with the Same MAC Address

It could only happen to Mike and I.  We can’t win the lottery, but we have had some network issues with our wireless.  We discovered that two of our Wireless Access Points have the same MAC address.  I just read that this is impossible.  Whatever.  Thank you very much.  Oh and our DHCP server thanks you.

Here’s a cool excerpt from the internet….

“If you have two different devices with the same MAC address your network will become unstable and unpredictable results will occur.  Therefore all devices on the planet have a different MAC address”     

Welcome to MARS!

More Fake Antivirus Information


More fake antiviruses are floating around!!!

From:  Bleeping Computer

Some Information on the following:

  • PersonalAntiSpy
  • SystemOptimizer2008
  • VirusGuardPlus
  • VirtualPCGuard
  • AntiMalware 2009
  • AntivirusProtection
  • Security Scanner 2008
  • eAntivirusPro
  • VirusResponse Lab 2009
  • Antivirus Lab 2009
  • Antivirus Security
  • Micro Antivirus 2009
  • AntiSpyware Pro XP
  • XP Protector 2009


    As a computer technician, it becomes a rollercoaster of up and down with viruses and malware.  Antivirus VISTA/XP 2008 or 2009 is probably one of the most clever viruses written.  The files change.  Polymorphic viruses are bad.  They change. Versions change.  It’s an illegal practice by these hackers/companies…its extortion.

    Don’t visit questionable websites. 
    Don’t click on pop ups.
    Don’t download music or videos that you don’t know the source.
    Don’t click on file attachments from anybody unless you are expecting it.

    Go in Safe Mode if infected

    Run SmitFraudFix
    Run SuperAntispyware
    Run Spyware Terminator
    Run Rougefix
    Run Combo Fix

    and yes, if you are too infected.  Sometimes it’s just a good idea to reformat (Time and energy is just too much).  ….Hopefully you have backed up your files.

    Rogue Fix or
    SmitFraudFix or
    Malwarebytes RogueRemover or

    Most Valuable Certifications – Lucky Seven

    1. CISSP
    2. CEH/CNDA  –  Growing at an unreal pace
    3. MCSE            – Boot camps aren’t good!  Unless you have the experience…you aren’t an engineer if you don’t know what you are doing!
    4. Linux
    5. MCP
    6. Security+
    7. Network+

    The lucky seven, and you better have the hands-on to prove it. 

    Memorizing a study guide does not make you a professional.  Period. 

    Our students get 2100 hours lecture and labs.  We constantly give them positive feedback but tell them the negatives of just memorizing a study guide.  Why is it people won’t do the excercises with virtual computers, real labs, internships and play with their own computer until they break it?  They would rather memorize a test and pass it. 

    Knock it off, you are hurting the industry.  Even if you break into a job with certs, get the big bucks, you are going to fall if you don’t have the skills.  Old IT guys can see through it.  The customer can see through it.  The title doesn’t make you smart. 

    A degree or diploma doesn’t make you smart. 

    Skills in your industry and worker ethics are what makes a good IT person.