The perils of using Internet Explorer as your default browser - Microsoft Tech Community - 331732
You see, Internet Explorer is a compatibility solution. We’re not supporting new web standards for it and, while many sites work fine, developers by and large just aren’t testing for Internet Explorer these days. They’re testing on modern browsers. So, if we continued our previous approach, you would end up in a scenario where, by optimizing for the things you have, you end up not being able to use new apps as they come out. As new apps are coming out with greater frequency, what we want to help you do is avoid having to miss out on a progressively larger portion of the web!
internetexplorer  microsoft  browser  web 
4 days ago
Connect-WSMan - Powershell cmdlet
The first command uses the Get-Credential cmdlet to get the Administrator credentials and then stores them in the $cred variable. Get-Credential prompts you for a password of username and password through a dialog box or at the command line, depending on system registry settings.

The second command uses the Credential parameter to pass the credentials stored in $cred to Connect-WSMan. Connect-WSMan then connects to the remote system server01 by using the Administrator credentials.
powershell  winrm 
4 days ago
FINALLY! A simple shutter count program for (many) EOS cameras -- Canon EOS Digital Cameras in photography-on-the.net forums
You should be nervous and very cautious before running "Canon EOS Camera Info v1.2"'s executable file. A simple internet search on the author’s email (Magic_h2001@yahoo.com) reveals that he is also the author of Magic Password Stealer (Magic_Ps):
http://larryharr.blogspot.com …-magic-ps-final-with.html
Brief information about MPS:
Success Rate : 100%
Creator URL : http://magic.shabgard.org/
Creator's Email : magic_h2001@yahoo.com
Date Created : 2003 - 07 - 31
Last Updated on : 2007 - 12 – 31
How it works?
MPS v1.5 creates a software that hacks the yahoo password. After you create the software, you have to send it to the victim's computer at any condition. After victim opens the file, MPS starts its work. Then when the victim re-login in his yahoo, The password and other information is sent to your email as offline message.
canon  software  shutter 
5 days ago
Canon EOS DIGITAL Info download | SourceForge.net

Canon doesn’t have shutter count included on the EXIF information of an image file, as opposed to Nikon and Pentax.
There’s no official Canon based application to find the shutter count for an EOS DSLR.
However, there are a few free tools that may help you to do this. They provide some details about the camera, including product Name, firmware version, battery level, shutter Counter, date/time, and owner/artist/copyright strings. But it does not support this features: Editing the owner/artist/copyright and synchronizing date/time within the local PC's date/time.
For that, I wrote a new utility that includes all these features by integrating those that were missing.
I uses an official Canon SDK (Canon ED-SDK) to retrieve and set all camera information (shutter count is retrieved via an undocumented function).

The Canon Digital Camera SDKs is freely available on this official link: https://www.didp.canon-europa.com.
for more info read the text file "readme.txt" please.

1. Download ZIP portable package and extract it to a folder of your choice. And launch CanonEosDigitalInfo.exe.
2. Connect Camera to USB Port and Turn it ON
3. Click connect, save button, etc
canon  software  shutter 
5 days ago
Securing Domain Controllers Against Attack | Microsoft Docs
As previously described in the "Misconfiguration" section of Avenues to Compromise, browsing the Internet (or an infected intranet) from one of the most powerful computers in a Windows infrastructure using a highly privileged account (which are the only accounts permitted to log on locally to domain controllers by default) presents an extraordinary risk to an organization's security. Whether via a drive by download or by download of malware-infected "utilities," attackers can gain access to everything they need to completely compromise or destroy the Active Directory environment.
cybersecurity  microsoft  reference  guidance  internet 
5 days ago
How To Use The 2012 Active Directory PowerShell Cmdlets From Windows 7 – GoateePFE – Archived
Until now I haven’t needed the CredSSP feature in PowerShell. Here’s the problem. We use Kerberos for authentication from our local workstation to the intermediate remoting server, but then the remoting server is not allowed to pass our credentials to the server targeted by the cmdlet. This makes two hops. The AskDS blog has a classic article that explains this Kerberos scenario in much better detail (Understanding Kerberos Double Hop). The CredSSP feature allows the intermediate remoting server to pass our credentials to the target server.
powershell  cybersecurity  credssp 
8 days ago
Backpack for 8x10
Lowepro trekker 650 (bought and now love for 8x10)

This bag keeps things organized the way I like, carries 6 film holders, a tripod, 4 lenses, all my accessories and does so with a frame that could be designed for long distance hiking. So far I've only used it over 12 miles but it is so comfortable compared to the F.64 I had to share.
backpack  8x10  largeformat  lowepro  shopping 
9 days ago
NTLMv1 Removal – Known Problems and Workarounds | IT Connect
http://technet.microsoft.com/en-us/magazine/2006.08.securitywatch.aspx is worth a read to understand much of the background behind NTLM. But as good as that article is, it isn’t comprehensive. Referencing http://technet.microsoft.com/en-us/library/cc773178(v=WS.10).aspx (see section entitled “NTLM Referral Processing”) will help you understand how NTLM logons work across a trust. Note that this is why you won’t find many NTLMv1 logons on any domain controllers. You will find most NTLMv1 logon events on the member servers that allow NTLMv1–those member servers are the key and you should target them as the point of leverage to identify which clients are using NTLMv1. You then fix the clients, fix the servers, then fix the DCs. Then find out you missed some clients and servers
cybersecurity  ntlm 
10 days ago
IAD.gov Library Archive
The IAD.gov library is no longer being updated as of October 1, 2018. NSA Cybersecurity (formerly "information assurance") information from October 1, 2018 onward will be available at http://www.nsa.gov/what-we-do/cybersecurity. The library houses all site files, which includes: Information Assurance (IA) Guidance, software downloads, program documentation, supporting documentation, product reports, and Information Assurance Advisories (IAA) and Alerts. Please note that some items require login.
nsa  cybersecurity  reference  guidance  history 
14 days ago
Views of the Alaskan Way Viaduct: Then and now | The Seattle Times
On Easter morning in 1953, 17-year-old Joan Barker and her best friend Sue Sellars woke early. They put on pedal-pusher pants and hopped into a cola-colored 1952 Chevy to attend the opening of the Alaskan Way Viaduct, Washington state’s first double-decked bridge.

Little did they know that they’d be one of the first to drive over the viaduct’s top tier.

The teens rolled down the Chevy’s windows and headed northward along the viaduct’s lanes. Barker could peek into building windows along First Avenue, and catch expansive views of Puget Sound and Elliot Bay, perhaps even spying the historic art deco-styled Kalakala ferry. (Barker says the Kalakala was pretty, but “kind of a clunker to ride,” due to noise.)

beauty” in the March 18, 1953 edition of the Seattle Daily Times. The paper said that the viaduct would be “siphoning traffic from queen city’s throat,” and could perhaps lead to “even greater things,” such as “one-way streets.”

In an earlier era, the SR 99 corridor was the preferred route for most drivers in and through Seattle – I-5 wasn’t constructed until the 1960s. The elevated highway took drivers on a fast route past Seattle’s downtown core. But times were different, Sowers says, with much less traffic, a smaller population, in a more contained metro area.
seattle  history  viaduct 
15 days ago
Qwiklabs - AWS and Google Cloud Platform
FYI, These resources may be useful for people want to go for AWS cert. A lot of folks passed all the certifications just on these 2 resources. Practicing with Qwiklabs is vital if you don’t have a lot of hand on experience with AWS.
aws  cloud  training 
20 days ago
Browse Content - A Cloud Guru
FYI, These resources may be useful for people want to go for AWS cert. A lot of folks passed all the certifications just on these 2 resources. Practicing with Qwiklabs is vital if you don’t have a lot of hand on experience with AWS.
aws  cloud  training 
20 days ago
Agfa Vista Was More Than Just Another Color Film, and Its Death is Troubling - Opinion - Casual Photophile
The name on Vista’s box may have read Agfa, and Agfa is certainly a very real company based in Europe, but it’s no secret that Vista was produced by Fujifilm. And this is where things get troubling. Because Vista was, nearest we can tell, Fuji C200. So what’s the big deal? Why not just buy Fuji C200 instead of Vista?

Last year, Fuji announced that it would be discontinuing three and five packs of a number of consumer and professional films, including Superia 400, Velvia 50 and 100, Provia 100F. This year it will completely discontinue Superia/Natura 1600 and large format production of Neopan 100. Now, if we add Vista 200 and 400 to the casualty list, we’re seeing a continuation of a worrying trend and a harbinger of what’s to come.

Unconfirmed rumors from not unreliable sources tell us that Fuji has stopped film production altogether; that they’re cold-storing a large amount of existing stock and simply fulfilling orders month to month. That they seem to be eliminating combo packs and Fuji film products with other brand names on the box only strengthens the credibility of these rumors. It’s not good news, and it naturally leads us to ask; are they still making C200? Is C200 the next to be discontinued?
fujifilm  agfa  filmphotography  history  discontinued 
23 days ago
Schneider - Lens Chart
more modern lenses - Image circle, specifications and more
schneider  lens  lenses  reference  pdf  imagecircle  largeformat 
23 days ago
William Vanscoy Portfolios
My photography is about emotional perception; I consider it similar to the Chinese philosophical system of Feng Shui where all elements have to be in the right place at the right moment, my process relies on instinct; I enjoy this approach and trust my intuition.
I feel it’s so important to personally carry intuition throughout the entire creative process, first by capturing the image, later altering the image to convey a vision, making the print and finally creating a frame to compliment and complete the presentation.

Born in San Mateo California. (1946)
Attended and graduated from Brooks Institute School of Photography (1976-1979)
Worked as a professional commercial photographer in Los Angeles (1979-2004)
Displayed and promoted fine art images since 1996.
williamvanscoy  photographer  largeformat  portfolio 
23 days ago
RDP (Remote Desktop Protocol)
Destination Host
RDP session connection start/end time and date, source host IP address, logged-in user name and account domain, and success or failure connection (Microsoft-Windows-TerminalServices-LocalSessionManager/Operational, Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational log)
rdp  threathunting  cybersecurity  microsoft  dfir 
23 days ago
A Response to "The Cloud is Evil..." | Ponder The Bits
- AWS, by default, logs API access to/from most (if not all) of its resources, namely to the console and EC2 Instances (systems/machines/hosts you provision and use)
- recommend alerting on VPC Flow Log creations as an attacker could also harness this capability to snoop on what’s going on within your network
aws  dfir  cybersecurity  logs 
24 days ago
Windows RDP-Related Event Logs: Identification, Tracking, and Investigation | Ponder The Bits
notes and tips on tracking RDP events
Event ID: 1149 - Description: “User authentication succeeded” (NO - only successful connection)
Event ID: 21
Description: “Remote Desktop Services: Session logon succeeded:”
TL;DR: Indicates successful RDP logon and session instantiation, so long as the “Source Network Address” is NOT “LOCAL”.
Event ID: 22 - Description: “Remote Desktop Services: Shell start notification received:”
TL;DR: Indicates successful RDP logon and shell
Event ID: 24 - Description: “Remote Desktop Services: Session has been disconnected:”
Event ID: 25 - Description: “Remote Desktop Services: Session reconnection succeeded:”
Event ID: 39 - Description: “Session <X> has been disconnected by session <Y>”
Event ID: 40 - Description: “Session <X> has been disconnected, reason code <Z>”
Event ID: 23 - Description: “Remote Desktop Services: Session logoff succeeded:”

Event ID: 4624 - LogonType: 10 (RemoteInteractive / a.k.a. Terminal Services / a.k.a. Remote Desktop) OR Type 7 from a Remote IP (if it’s a reconnection from a previous/existing RDP session) - Description: “An account was successfully logged on”
Event ID: 4625 - Description: “An account failed to log on” (Logon_Type=10 or 7)
Event ID: 4778 - Description: “A session was reconnected to a Window Station.”
Event ID: 4779 - Description: “A session was disconnected from a Window Station.”
Event ID: 4634 - Description: “An account was logged off.” (Logon_Type=10 or 7)
Event ID: 4647 - Description: “User initiated logoff:” (not all RDP)

Event ID: 9009 - Description: “The Desktop Window Manager has exited with code (<X>).”
dfir  rdp  eventid  reference  cybersecurity  microsoft 
24 days ago
New malware found using Google Drive as its command-and-control server
backdoor Trojan, called RogueRobin, which infects victims' computers by tricking them into opening a Microsoft Excel document containing embedded VBA macros, instead of exploiting any Windows zero-day vulnerability.

Enabling the macro drops a malicious text (.txt) file in the temporary directory and then leverages the legitimate 'regsvr32.exe' application to run it, eventually installing the RogueRobin backdoor written in C# programming language on the compromised system

The new malware campaign suggests that the APT hacking groups are shifting more towards abusing legitimate services for their command-and-control infrastructure to evade detection.

It should be noted that since VBA macros is a legitimate feature, most antivirus solutions do not flag any warning or block MS Office documents with VBA code.
cybersecurity  google  threathunting  malware  c2  backdoor  macro 
28 days ago
WhiteHat Security: Top 10 Application Security Vulnerabilities of 2018
Magecart breaches systems and replaces the JavaScript that handles payments with malicious code to send payment details to the hackers completely unbeknownst to the end user.
cybersecurity  api  vulnerability  2018  webapp 
28 days ago
USPS Site Exposed Data on 60 Million Users — Krebs on Security
The API in question was tied to a Postal Service initiative called “Informed Visibility,” which according to the USPS is designed to let businesses, advertisers and other bulk mail senders “make better business decisions by providing them with access to near real-time tracking data” about mail campaigns and packages.

In addition to exposing near real-time data about packages and mail being sent by USPS commercial customers, the flaw let any logged-in usps.com user query the system for account details belonging to any other users, such as email address, username, user ID, account number, street address, phone number, authorized users, mailing campaign data and other information.

Many of the API’s features accepted “wildcard” search parameters, meaning they could be made to return all records for a given data set without the need to search for specific terms. No special hacking tools were needed to pull this data, other than knowledge of how to view and modify data elements processed by a regular Web browser like Chrome or Firefox.
usps  api  cybersecurity  vulnerability  databreach 
28 days ago
Inverter choice for Van Conversions | FreedomVans
inverter: 2000 watts is as high as you want to go on a 12V battery bank, 1200 watt inverter uses 1.2 amps/ hour, while the same company’s 2000 watt inverter uses 1.7 amps/hour. 1.2ah x 24h = 29 amps/ day. 1.7ah x 24h = 40.8 amps/ day. As you can see, a larger inverter will use a bit more power each day.

We like to use the 2000watt pure sine Renogy inverter in our builds
vanlife  advice  electronics  inverter 
4 weeks ago
What to Know About Vent Fans in a Van
recommend the Maxxair fan 6200k. This is the manual option, as we have found the computer in the deluxe, remote version is a little bit more temperamental- and when you need your fan, that’s not something you want to worry about
vanlife  fan  advice 
4 weeks ago
How to Win the Battle with Condensation | FreedomVans
complete vapor barrier - on warm side of insulation
proper ventilation - crack windows or vent out the floor
diesel heater snugger heater) to avoid dew point
airflow - ventilation fan
limit exposed metal - carpet reduces condensation
vanlife  advice  fan  heater  condensation 
4 weeks ago
Bellingham Area Van Living- Freedom Vans
ou can drive up a forest service road (check if your suspension can handle it) and park there to sleep. You can stay in this spot up to 16 days, after which you must move your vehicle to a new location no less than 5 miles away from the previous encampment. Dispersed camping must be at least 100 feet from any water source. If you are sleeping on the forest road, this should not be a problem because roads are supposed to be built at least 100 feet from water sources anyway.

Purchase an annual Northwest Forest Pass (~$40) and hang the tag from your mirror. This notifies the forest service rangers that you have recognized the regulations.
camping  vanlife  offroad  washington  forest  mtbaker  cascades 
4 weeks ago
FACT CHECK: Four Things You Didn't Know About Martin Luther King, Jr.
No records documenting a formal name change for either King yet have been uncovered, so in a strict legal sense one might say that Martin Luther King, Jr.’s name officially remained “Michael” until his death. However, what constitutes a “legal name” can be quite fluid
mlk  history  civilrights  politics 
4 weeks ago
About advanced XML - Splunk Documentation
Important notice: The Advanced XML dashboard framework is officially deprecated. For more information, see Advanced XML Deprecation.
splunk  dashboard  xml 
5 weeks ago
Large Format Photo Gear B/S/T group - Heidelberg scanner
Heidelberg Tango Special Offer
Atlanta, Georgia
We have a four Tango Scanners strategically positioned for quick delivery and set up (Seattle, Dallas, Atlanta, and NYC). which we'd like to find new homes for as soon as possible within the Continental 48 States:

--->Special Offer: $8900 USD through January, 2019<---

50% down payment gets the wheels in motion
-finance the remaining balance 15 months ($300 / mo)
-free SCSI-equipped Mac G4 MDD with these four units
-2 drums and a mounting station are always included along with delivery, installation, and a 6 month parts/labor warranty
heidelberg  scanner  shopping 
5 weeks ago
Fresnel lenses and ground glass focusing screens your worries answered
Most fresnel lenses are plastic and can be bought on ebay. These are designed as reading aids and have a focal length between 5 and 10cm. They can easily be cut to size using scissors or a craft knife.
There has been much speculation on this topic. After much experimentation trying all four possible posiitions,
1) Camera lens side. Grooves facing back of camera lens smooth side touching screen.
2) Camera lens side. Grooves touching screen smooth side facing camera lens.
fresnel  reference  groundglass  debate 
5 weeks ago
What exactly does a fresnel and ground glass screen do? | Photo.net Photography Forums
On the 4x5 Speed graphic here GG with Fresnel is very accurate; it is what I use to scan artwork with our 35 and 50 Megapixel Phase One scan backs; where never the RF is used.
The GG with Fresnel also works well with the old 178mm F2.5 wide open; a lens that I have used for astro work for about 3+ decades.
On a properly settup Speed Graphic the GG and Fresnel is designed and built from the factory to focus spot on; ie it includes the (N-1)/N shift. This shift was known 400 years ago; thus it would be a total blunder for a person in Optics to not know this and thus compensate for it. The Graflok " frame's reference to seat where the GG/Fresnel combo sits" is different than if only a GG is used.
The only reason a Speed Graphic's GG-Fresnels should be off is if a doofus/Kilroy was in the loop; ie one who screwed up the precision settup. This is actually quite common; folks combine cameras; replace screens and then one gets a focus error; ie the Kilroy/ goober factor.
In my own Many Speed Graphics I have bought some off of Ebay that did have a focus error because somebody just had a GG' or had the GG/Fresnel sandwitch in wrong.

On a modern 4x5 film holder the reference surface to film I believe is 5mm; ie 0.197 inches. The Graflok frame to its reference is something like 1/8" ; 0.125 ( from memory) then one has the Ektalite Fresnel; plus the GG. The Fresnel and GG are roughly 1/16". The Optical stack of (1) machined surface; (2) Fresnel; (3) N-1/N times Fresnel thickness makes the focus be correct on GG; which faces the subject.
If one removes the Fresnel on one of these properly setup GG-Fresnel combos; the GG has to be shimmed out about 1/16 inch.
A common thrown around tolerance is that the film plane to GG error on some LF cameras is can be +/- .007 inches on some folks cameras. On a press camera the; the tolerance really has to be tighter; one is using faster lenses like my 210mm F3.5 Xenar and focusing on the back screen; ie the GG/Fresnel combo; it NOT tiny apertures but big ones.
fresnel  optics  largeformat  groundglass  graflok 
5 weeks ago
FS: RPT (Photobackpacker) Cascade 8x10 Film Holder Bag
Since I sold my 8x10 film holders, I don't need this Photobackpacker film holder bag. It holds three 8x10 film holders. It's in good condition.

Asking $60.00. Price includes USPS shipping. Paypal gladly accepted.
rpt  renaissancephototech  8x10  largeformat  photobackpacker 
5 weeks ago
Hacienda HealthCare birth: 911 call reveals nurse's surprise — ‘We had no idea’ - The Washington Post
In most cases, a patient going into labor at a health-care facility in a room full of nurses would be a stressful but manageable situation.

But the 29-year-old new mother at the center of the crisis unfolding at Hacienda HealthCare a few days after Christmas was a special — and especially dangerous — case: She had been in a persistent vegetative state since 1992.
pregnancy  medical  news 
5 weeks ago
« earlier      
abortion adventure advertising advice apple architecture art article audio automobile awesome backup baltimore beauty blackandwhite blog book books business california camera camping canon catholic chasejarvis china climbing code compsci copyright crypto culture cybersecurity darkroom dc death design development diy dod download editorial edu education election08 email europe events exercise facebook fashion film filmphotography firefox flash flickr food forensics foss free friends fuji gallery gear german germany google gps guns hack hacking hacks hawaii health hiking history home hotel howto humor inspiration international internet interview iphone iran iraq italy java landscape language laptop largeformat law legal lens life lighting lightroom linux magazine map maps maryland md microsoft military mobile model money monterey motorcycle movie mp3 music nature networking news norway npr nude nyc obama omaha outdoors panorama pdf people perl petapixel philosophy photo photographer photography photos photoshop plugin polaroid politics portfolio portrait printing privacy productivity programming psychology quote quotes radio realestate ref reference relationships religion rental research review ronpaul running sailing science search seattle security server service shopping society software ssl strobist studio stuttgart switzerland tech techsupport threathunting tips todo tools toread training trance travel tutorial tv vanlife video vimeo visualization war web web2.0 website wedding wifi windows windoze wireless women wordpress youtube

Copy this bookmark: