Using Ubiquiti networking equipment in an enterprise environment

As a leading provider of networking equipment and software, Ubiquiti is a trusted choice for businesses of all sizes. In this post, we’ll take a look at why we recommend using Ubiquiti’s products in an enterprise environment.

High-quality, reliable products: Ubiquiti is known for its high-quality, reliable products, which are built to withstand the demands of an enterprise environment. The company’s routers, switches, and access points are designed to deliver fast, stable connections, even in high-traffic situations.

Wide range of products: Ubiquiti offers a wide range of networking products, including routers, switches, access points, and software. This allows enterprises to choose the best products for their specific needs, whether they are looking to upgrade their Wi-Fi network or build a new one from scratch.

Scalability: Ubiquiti’s products are designed to be scalable, which means they can grow with your business as your networking needs change. The company’s UniFi software, for example, makes it easy to add new access points or switches to your network as you expand.

Ease of use: Ubiquiti’s products are known for their ease of use, which is a major advantage in an enterprise environment where there may be multiple users with different levels of technical expertise. The company’s UniFi software, in particular, is user-friendly and intuitive, making it easy to set up, monitor, and manage your network.

Affordable prices: While enterprise-grade networking equipment can be expensive, Ubiquiti’s products offer a great combination of performance and value. The company’s products are typically more affordable than those of some of its competitors, making them a cost-effective choice for businesses of all sizes.

In conclusion, there are many good reasons to consider using Ubiquiti’s networking equipment in an enterprise environment. The company’s high-quality, reliable products, wide range of options, scalability, ease of use, and affordable prices make it an excellent choice for businesses looking to upgrade their networking capabilities.

DMARC with quotes or without? [SOLVED]

Does my DMARC record need to include quotation marks or not?

9/10 times, no quotes are needed.

However, this all depends on where you edit your DNS.

In the raw DNS zone file, which is what is passed from machine to machine, the .txt record DOES need to be enclosed in quotation marks if it contains spaces. It is unlikely that your domain/DNS provider however will give you direct edit access to this, and instead will be providing their own interface to edit entries with pre-built in quotation marks. Exceptions to this can be found when directly editing via CLI at the root of a server, or when using the raw edit mode on WHM.

For example, Cloudflare will automatically wrap any string of text in a .TXT record in quotes for you, and remove extra quotes you may add,

namesco however will not automatically remove extra quotations to their already provided ones – which could lead to double quotations, and issues further down the line.

It pretty much boils down to your provider, it is best to have a quick skim of their DNS Q&A section – or to test by trial and error!

My favorite testing site is currently https://mxtoolbox.com/DMARC.aspx

BGP vulnerable? – is the web as we know it at risk?

The BGP (protocol) has been on my mind the last few weeks.

It boggles my mind how fragile the web is that we all operate on, more specifically that we rely on BGP TCP/IP to maintain connections between two or more autonomous system routers.
BGP is simply put, is the Internet’s greatest weakness.

OK, so what is BGP?

According to he RFC (last pub 2006)

The primary function of a BGP speaking system is to exchange network
reachability information with other BGP systems.

GP-4 provides a set of mechanisms for supporting Classless Inter-
Domain Routing (CIDR) [RFC1518, RFC1519]. These mechanisms include
support for advertising a set of destinations as an IP prefix and
eliminating the concept of network “class” within BGP. BGP-4 also
introduces mechanisms that allow aggregation of routes, including
aggregation of AS paths.

Attacking it?

Acording to Sean Convery (cisco) from his blackhat talk in 2003 below is how you shoudld go about it (kindof, we will go into more detail later):
Reset a single BGP session to control a block of IP’s and corrupt other BGP routers. The easiest way to do this would be to gain lawful access to a BGP backbone, e.g. become an engineer for a site, or befriend someone who has access.
BGP Vulnerable

OK, so?

Well from all my readings and research, it seems like this is where the bottom foundational layer of trust the WHOLE internet lies. Without the BGP, there is no CIDR, without CIDR there is no IP’s, without IP’s there is no DNS, without DNS there is no websites, without websites many services simply die and cue end of the world scenarios.

Why was this on my mind? Well i’ve been curious about it before, but recently i have been thinking about the unseen weaknesses in CryptoCurrencies. If the internet breaks, or a government decides to hard fork/cut access and limit it, then crypto as we know it is valueless. It simply looses ALL value.
Crypto other than a few projects all works from HTTP, ip, tor, IPFS etc.. which relies on IP addressing. When the very foundation of these protocols is in question, then the whole behemoth is in danger. BGP simply is the biggest threat to modern crypto economies.

tl;dr: An old protocol (BGP) run by potentially vulnerable companies, could break the internet by issuing bad or malicious commands.

Further reading:
BGP RFC
on wired
Cisco press
techopedia
Network computing.com

What is Ransomware & how do i stop it?

Ransomware is upon us, but what is this thing, and how can i protect myself or my business from it?

So the definition and description according to Wikipedia is the below:

Ransomware is a type of malicious software that blocks access to the victim’s data or threatens to publish or delete it until a ransom is paid. Any action is possible once device or system is infected and there is no guarantee that paying the ransom will return access or not delete the data.

So how to i prevent and stop Ransomware?

Patch,
Secure,
Backup

>Patch

Patching it often the most overlooked defense in anyone’s arsenal. Patching is as simple as making sure that your windows updates are current and installed, and also checking over other software that you use on a regular basis for updates. Things to keep a keen eye out for, and PDF viewer (Adobe Acrobat, Foxit, Reader DC), Adobe Flash, M$ Office, Web browsers.

>Secure

Securing your PC from Ransomware is as easy as installing a known, tried and trusted AntiVirus software.
Other steps to look into include, adding a firewall to your network, or tighten your current routers firewall settings. Adding Malware protection, using a VPN, locking down user permissions, and a whole lot more.

>Backup

The key to recovering from an infection is a good backup strategy. Backing up is the single most useful thing you can do to prevent falling victim to a ransomware attack. With a good offline backup – or at least a backup to another PC, cloud or server location – the whole process of being infected is alot less of an issue.

There you have it, a very short and simple overview of ransomware in 2017 – if you want to know more on any of the three above steps, feel free to get in contact, or leave me a comment below.

The Windows Death command – Kill a Windows PC

Sometimes in the IT world you just need to let off some steam – sometimes a pile of old PC’s through in the PC ‘Graveyard’ are a fun way to do so.


Kill a Widows PC

Often we will play with various ways to kill off old PC’s before they are then securely wiped and recycled, and this command we are about to go into is one of the basics.

del /S /F /Q /A:S C:\windows

Thats it.

Yes it really is that easy to kill a windows PC!

Lets go through it and some of the pitfalls you may find.

del – This is the windows command to delete an object, pretty self explanatory
/S – Deletes specified files from the current directory and all subdirectories. Displays the names of the files as they are being deleted.
/F – Forces deletion of read-only files.
/Q – Specifies quiet mode. You are not prompted for delete confirmation.
/A:S – Deletes files based on the following file attributes, in this case: s = System files
C:\windows – The destination we are deleting.

Why does this work? – Well most people reading this know already, but if you didn’t – the Windows folder simply put is the heart of the Windows operating system. Killing it will stop the OS from booting.

Most users readers will be asking “Why put the C:\Windows” at the end of the script, should it no logically be put in front of the other switches? Well this is to do with personal preference really, and to do with the fact that it is convinient to then go about and delete more contect using the same script, by hitting up arrow, then simply backspacing and changing your destination. Lazy much? You bet you!

Bonus post of to Kill a Windows PC and to make this more effective coming next week – little hint:
takeown /f C:\Windows /r /d y

p.s. This is for information only – be responsible!

Hydrocoptic Marzel Vane – A script for the modern techie

OK, so its not a script like you are thinking.  Nope, no command line switches here! Instead a Hydrocoptic marzel vane is part of the fictional ‘Turbo Encabulator’ machine. 

Well thanks for that, now what am i supposed to gain by knowing this information!?
Simply put, this is a technical jargon inside joke – and something that we can learn a couple of lessons from,

  1. When speaking to your customers, keep your jargon to a minimum! 
    No-one wants to really know how power is generated by “the relative motion of conductors and fluxes, it is produced by the modial interaction of magneto-reluctance and capacitive diractance” – You will save your time and effort in having to explain, and then re-explain. You are most probably not paid to give a detailed explanation of every detail of an issue. Focus on your customer service instead.
  2. When a customer knows a little bit and insists on ‘more information’ – give it to them in full. A study found that out of 21 engineers and Physicist’s were asked to imagine what this fictitious device actually did, not one of them came out with the same answer. Basically put, sometimes you are never going to satisfy the curiosity of someone who thinks they know it all, therefore, this is a great way to put an end to a discussion, practice and rehearse all your best jargon to them, not only will it baffle hem, but it will also prove to them that you may just know something more than them and are well versed in the area and problem you are currently solving.

Video here:

Full transcript below:

“For a number of years now, work has been proceeding in order to bring perfection to the crudely conceived idea of a transmission that would not only supply inverse reactive current for use in unilateral phase detractors, but would also be capable of automatically synchronizing cardinal grammeters. Such an instrument is the turbo encabulator.

Now basically the only new principle involved is that instead of power being generated by the relative motion of conductors and fluxes, it is produced by the modial interaction of magneto-reluctance and capacitive diractance.

The original machine had a base plate of pre-famulated amulite surmounted by a malleable logarithmic casing in such a way that the two spurving bearings were in a direct line with the panametric fan. The latter consisted simply of six hydrocoptic marzlevanes, so fitted to the ambifacient lunar waneshaft that side fumbling was effectively prevented.

The main winding was of the normal lotus-o-delta type placed in panendermic semi-boloid slots of the stator, every seventh conductor being connected by a non-reversible tremie pipe to the differential girdle spring on the “up” end of the grammeters.

The turbo-encabulator has now reached a high level of development, and it’s being successfully used in the operation of novertrunnions. Moreover, whenever a forescent skor motion is required, it may also be employed in conjunction with a drawn reciprocation dingle arm, to reduce sinusoidal repleneration.

Further information is available about this great device is available here on its own Wikipedia page: Turboencabulator Transcript is from TheChiefStoryteller.

Turing Phone will work in all countries & announcement of the Black Dragon model

 

Following our updates with the latest batch of emails leading up to the Turing phone release, and with one day to go, we have been provided with yet another added feature to this already jam packed ultra-phone. In the latest email we were told that the phone will support all major frequency bands used by international carriers, including;  GSM, WCDMA, TD-SCDMA, CDMA EVDO, TDD LTE, FDD LTE.

We were also given information, that a Fourth model the ‘Black Dragon’ model of the Turing phone will also be coming soon, exclusively with 128GB, and a “style and aesthetic is unlike any phone on the market”

 

Pre-orders open up tomorrow, but with the US and Canada getting first dibs, I have no idea on when i will finally get my hands on what promises to be a game changing phone for 2015.

 

one day until you can reserve your Turing Phone black dragon model
There’s only one day left before you can reserve your Turing Phone™. We’ve received an overwhelming number of requests, but since you’re on this list, you get access to reserve yours before anyone else.

The world is your playground

In the last few weeks Turing Phone has reinvented itself with major enhancements. Turing Phone is now a world phone. This means you can use the phone anywhere in the world. It works for every band* with every carrier in every country. Turing Phone is sold unlocked and supports all carriers in the U.S. and carriers around the world. Travel anywhere and you can still use your Turing Phone.

How to reserve Beowulf, Cardinal and Pharaoh

1. Go to www.turingphone.com
2. Enter your email address
3. Reserve up to four phones (no credit card required)

Beowulf, Cardinal and Pharaoh will be available to reserve between 12:00PM EDT on July 31st through 11:59PM EDT on August 13th. Reservations will be tracked via your email address.

Purchase and pricing

U.S. and Canadian customers will be the first to purchase and receive shipment. If you reside in the United States or Canada, once your reservation is received we will email you the next step for payment (on www.turingphone.com) when the Turing Phone is close to the final shipping date.

Customers from other countries will be notified to make their purchase (onwww.turingphone.com) when it’s close to the shipment date in their regions.

The Beowulf, Cardinal and Pharaoh come in three models: 16GB ($610), 64GB ($740) and 128GB ($870).

Black Dragon

This special edition Turing Phone to be released will be epic. Very soon we’ll provide details of our bellwether model. Black Dragon’s style and aesthetic is unlike any phone on the market. We can’t wait to show it to you.

Black Dragon comes in one model, the 128GB ($999).

The world is ready, are you?

Thank you,

– Turing Robotic Industries

P. S.Forward to a friend. so they can reserve their own Turing Phone.

*Bands Turing Phone will work on include GSM, WCDMA, TD-SCDMA, CDMA EVDO, TDD LTE, FDD LTE

Stay Connected
LinkedInFacebookTwitterInstagram
“Turing the world, one person at a time.”
– SYL Chao
www.turingphone.com

Turing Robotic Industries

Spear Tower
One Market Plz

San Francisco, CA 94105

Add us to your address book

Copyright © 2015 All rights reserved.

Turing phone model names revealed: Introducing Pharaoh, Beowulf and Cardinal.

We for One Cannot wait for the pre-orders to open up, but which Turing Phone will we choose? Pharoh, Beowulf or Cardinal? Turing phone model names revealed.

If you have been following the recent Turing Robotic industries ‘Turing Phone updates, you may have received the below email:

Every legend has an origin story. Today we’d like to introduce you to three legends in the making, Cardinal, Beowulf and Pharaoh.In a few days, you’ll have a chance to make one of these yours.
Front and back of the Turing Phone model: Cardinal
Cardinal
While the Cardinal wasn’t developed by the Earth Federation, it is inspired by the Gundam RX-78, piloted by Amuro Ray. Just as the famed mobile combat suit was built from ultra performing metals, the Cardinal was forged of Liquidmorphium™, a metal three times harder than stainless steel and more than twice as hard as titanium. One thing’s for sure, the Cardinal is a phone fit for a hero.
Back of the Turing Phone Beowulf
Beowulf
For the Beowulf, Turing Phone™ drew from the classic Old English poem about a warrior turned king of the same name. Nowhere is this more evident than the gold crown that adorns the camera. Also on the back you’ll find more retelling of the tale. The dark blue signifies battles at sea, while the scales represent victory over the great dragon of Earnaness. And just like the story, Turing’s Beowulf is epic. (photo credit: The Verge)
Pharaoh
The third Turing Phone™ named Pharaoh symbolizes innovation and wonder. The cherry and cranberry reds, navy blue and gold on the phone’s back all allude to the colored garments Ramesses II, Pharaoh’s namesake, would have adorned. Since the Valley of the Kings, technology has enabled us to do amazing things. Pharaoh is the perfect device to take us into the future. (photo credit: Digital Trends)
It’s almost time to choose,- TRI TeamP.S. Forward to a friend and show them the future.
Never miss anything! Follow us here:
FacebookTwitterInstagramLinkedIn
“We are moving into the cipher phone era.”
– SYL Chao, CEO TRI
www.turingphone.com

Turing Robotic Industries

Spear Tower
One Market Plz

San Francisco, CA 94105

Add us to your address book

Copyright © 2015 All rights reserved.

New Email out from Turing Phone

New Email out from Turing Phone
turing phone
Welcome to the latest in Turing Phone™ news!First of all, thank you for your interest in the Turing Phone™.

We’re overwhelmed by the response and support you’ve given us since announcing our July 31st pre-order date. We’re working through your questions and will reveal much in the coming weeks.

Watch your inbox and receive the news first. Next week, we’ll be sharing pre-order details and unveiling new product photography.

Last week our CEO, SYL, stopped by the Mashable office to talk about the next evolution of phones, the cipher phone, as well as give a sneak peek of the Turing Phone™. In case you missed it, take a look:

Read Article
Thanks again for joining us in building the future. Patrons and supporters, like you, inspire us to keep challenging the status quo and pushing the limits of technology.Stay tuned for more exciting news,

– TRI Team

P.S. Forward to a friend and show them the future.

Top 5 Obvious but little known useful cmdlets and IT support tricks

As an IT technician, I am often adding new quick tricks to my mental shorcuts list, here are my current top 5:

  1. Need to log onto a domain as the local PC admin but don’t know the PC name?
    Simply use ” .\” at the start of the admin username to log on as a local PC user.
  2. Powershell if PC has trust relationship
    Test-ComputerSecureChannel –Server *dc name* -Verbose
  3.  shutdown /i (-i ) remote shutdown
  4. Create big dummy file:
    Cd \sysinternalssuite
    Contig -n 2gbEmptyFile.txt 20000000
  5. For Spooler Crashes, first try below to clear all jobs
    net stop spooler
    pause
    del /S /F “C:\Windows\System32\spool\PRINTERS\*”
    net start spooler
    pause

::end