If your email address is in a Mailman mailing list, you can send an
email message to the list with help in the subject or body of
the email to get an email reply showing you the commands that you can put
in email messages to the list. E.g., supposing that you are a member of
a mailing list called "browncoats" on the server example.com. To see a list
of the available commands supported by the Mailman mailing list handling
email to that mailing list, you would send an email with help
in the subject or body of the message to
browncoats-request@example.com. I.e., you would put the name
of the mailing list, in this case "browncoats" followed by a dash and the
word "request" as the email address to which you would be sending the
command. If you put help in the body of the message, you don't
need to specify a subject, but put help as the first line of
the message with no other text on the line.
A user who uses Microsoft Office Professional Plus 2010 as his email
client reported that he could no longer download email. Whenever the
user would check his email, a window would appear prompting him to
re-enter his userid and password. Even after I reset his password on
the server, the same thing kept happening. At the bottom, right-hand
corner of the Outlook window, I saw a "Send/Receive error" messsage
next to a yellow triangle with an exclamation mark within it.
When I clicked on that error message, I saw "reported error (0x800CCC91):
'Your e-mail server rejected your user name. Verify your user name
for this account in Account Settings. The server responded -ERR [AUTH]
Plaintext authentication disallowed on non-secure (SSL/TLS) connections.'"
After I upgraded ClamWin to version 0.99.1 on an
HP laptop running Microsoft Windows 7 Professional, I saw a window titled
"freshclam.exe - Ordinal Not Found" with the message "The ordinal 177
could not be located in the dynamic link library libclamav.dll."
When I right-clicked on the ClamWin icon in the
notification area
at the lower, right-hand corner of the screen and selected Open ClamWin,
I saw the prompt "You have not yet downloaded Virus Definitions Database.
Would you like to download it now?" I chose "Yes" and saw the
"Ordinal Not Found" message again.
I use the Python xlrd module
to extract a column from an Excel spreadsheet. I've been using a
Python script,
extract-addresses.py to pull the data from a set column in an .xls
spreadsheet, Directory.xls, and store it in a text file. I decided to
make the script more generic, so that I can extract the data from a
spreadsheet I specify when I run the script rather than a set spreadsheet and
to have the specific column and output file name be variable as well. The
new script is
extract-column.py. The Python
xlrd module will need to be
installed for the script to work; xlrd can be downloaded from one of the links
below:
If no arguments are provided on the command line, the script will prompt
for the name of the spreadsheet file from which the data should be extracted,
the column number containing the data to be extracted (A is treated as
column 1, B as column 2, etc.), and the name of the output file to hold
the extracted data.
If you receive a message from a
Secure
Shell (SSH) or
Secure File
Transfer Protocol (SFTP) application regarding the host key of the server
to which you are attempting to connect being unknown or changed, such as
the message from WinSCP below, you can check the server's public host key on the
server itself, if it is a
Linux server, using the
ssh-keygen utility.
The -l option shows the fingerprint of a specified public key file.
Private RSA1 keys are also supported. For
RSA
and DSA keys, ssh-keygen tries to find the matching public key
file and prints its fingerprint. If the -l option is combined
with -v, an ASCII art representation of the key is supplied with
the fingerprint. The -f filename option allows you to
specify the file name of the key file.
The ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key.pub command isn't
showing the key itself, but instead shows the
"fingerprint" for
the key, which is a sequence of 32
hexadecimal
digits. You can see the much larger key value itself by issuing the
command cat /etc/ssh/ssh_host_rsa_key.pub.
On a CentOS 7 system I saw "Core temperature above threshold, cpu clock
throttled" messages like those below appear on the console today.
[68546.319229] CPU1: Core temperature above threshold, cpu clock throttled (total events = 189995)
[68546.319240] CPU0: Core temperature above threshold, cpu clock throttled (total events = 189989)
[68546.519121] CPU0: Core temperature above threshold, cpu clock throttled (total events = 192228)
[68546.519131] CPU1: Core temperature above threshold, cpu clock throttled (total events = 192234)
I checked to see if the lm_sensors package was installed on
the system, so I could check fan speeds and the
central processing unit (CPU) temperature. It wasn't installed, so I
installed it from the root account with yum install lm_sensors.
Ncat, which is a reimplementation of
the netcat
computer networking utility, is a utility which reads and writes data across a
network from a
command-line interface (CLI), such as a shell prompt or a Microsoft Windows
command prompt. It supports
TCP and
UDP,
SSL, and proxy connections via
SOCKS4 or
the HTTP CONNECT method.
You can downloaded a precompiled binary version of the utility from
Nmap.org or this site.
Email clients often allow you to create a
signature block that will automatically be added to the bottom of every
email message you compose. Signatures typically contain items such as the
sender's name, email address, physical address, phone numbers, company name,
etc. To create such a signature in Outlook 2011, which is part of
Microsoft Office for Mac 2011, take the following steps inside Outook:
AppLocker is a policy-based security component of Microsoft Windows
introduced in Windows 7
Professional, Enterprise and Ultimate editions and
Windows Server
2008 R2. It enables or disables execution of software based on rules such
as location, properties and digital signature, so it can be used to restrict
that software that can be run on a Microsoft Windows system.
Executable file restrictions can be based on a
hash value, publisher certificate, etc. Further details on
AppLocker can be found at
An approach for managing Microsoft AppLocker policies.
The
Get-AppLockerFileInformationPowerShell
cmdlet will return a hash code it labels as "SHA256". But you will find
that a hash code it returns differs from one returned by the Get-FileHash
cmdlet for executable, e.g., .exe files.
I heard some good news on the radio while driving home from the office this
afternoon. Indian law enforcement officers arrested 70 people working in
call centers on the outskirts of Mumbai who were involved in a phone scam operation where they
would call U.S. citizens and leave voice mail messages where they claimed to be
U.S. Internal Revenue Service (IRS) agents demanding
payments for taxes those called supposedly owed with the threat of arrest
if the callee doesn't pay. Assistant police commissioner Bharat Shelke
stated that "Fearing arrest, some used to call back, and employees
at the call center then demanded a few thousand dollars to settle the
case." Shelke also stated that an estimated $36.5 million was extorted
from Americans duped into paying the scammers. Unfortunately, the police
haven't yet caught the ringleaders of the operation.
Indian authorities stated that the callers were trained to disguise their
Indian accents, so that they would sound more like native-born Americans.
Employees of the scammers were given a six-page script with tips on how to
allay potential victims suspicions. For their jobs as criminals, callers
were paid between 10,000 rupees and 70,000 rupees every month, which is
equivalent to between $150 and $1,050 U.S. dollars, police said. Shelke
stated "Employees were aware of the fraud, but since they were getting
a good salary, they remained silent."
Such scammers don't target just Americans. Tax agencies in Canada and
Australia have all issued warnings over such scam callers. Last year,
Sahil Patel, a scammer residing in
Pennsylvania, was sentenced to 14 1/2 years in prison for his role in
a similar scam where callers posed as law enforcement officers or tax agents.
He was also ordered to forfeit one million dollars. The call centers
Patel worked with used software that allowed them to spoof calling numbers so
that those called would see a phone number that appeared to be associated with
the agency with which the callers claimed to be associated.
At a Senate hearing in 2015 prior to Patel's conviction, a
U.S. Department of the Treasury official estimated that
such scams generated between 9,000 and 12,000 complaints a week and had gained
scammers more than $15.5 million from 3,000 victims.
So kudos to Indian law enforcement officers for the recent operation; I hope they catch the kingpin(s) for whom those arrested worked.
If you wish to create folders in Outlook 2011, which is part of
Microsoft Office for Mac 2011, so that you are using less
space on a Microsoft Exchange Server, where you might have a quota
limiting your mailbox storage, you can create local folders that will result
in the email messages being placed in them being stored on your computer's
disk drive, instead, of on the server. To do so, you can take the following
steps:
Click on Outlook at the top of the top, left-hand corner of the
Outlook window.
Select Preferences
Click on General under Personal Settings. In the General
settings window, uncheck the check boxes next to "Group similar folders, such
as inboxes, from different accounts and "Hide On My Computer folders". You can
then close the window by clicking on the red circle at the upper, left-hand
corner of the window.
Click on Inbox under ON MY COMPUTER
Click on File then select New and then Folder
When you provide a name for the new folder, it will be placed under the
Inbox folder, but you can click on it and drag it up to On MY
COMPUTER to put it at the same level in the hierarchy as the Inbox.
Once you have a folder at the same level as the Inbox folder, you can
create subfolders beneath that folder by clicking on it to select it and then
selecting File, New, and Folder from the
menu bar.
To copy a message from the Inbox on the server to the ON MY COMPUTER
inbox, click on the message and drag it to the new location. If you want to move
the message, instead, click on the message to select it then click on
Message from the Outlook menu bar then select Move and select
the folder you created under ON MY COMPUTER that should hold the message.
If there is no program set as the default application for opening a file
type, when you right click on a file of that file type and choose
Properties, you will see "Pick an app" next to "Opens with".
If you wish to identify all of the extensions known by the system,
you can use the assoc command. If you type the command
at a command prompt with no parameters, you will get a long list.
You can redirect the output to a file with assoc > list.txt
or page through it by piping the output of the command to the
more command with assoc | more.
JavaScript can be
used to control the display of elements on a web page. E.g., suppose I
don't wish visitors to a webpage to see a certain element on the page
unless the width of their browser window is a specified value. The element
could be a
div, which might contain an advertisement or some other image that might be
too wide for a browser window that was less than a certain width. So I want
to hide the display of the element, so that it doesn't detract from the
aesthetics of the page.
I could put the following code in the HEAD section of the webpage, if
I wanted any DIV element on the page that has a class of
sometimesHide to be hidden in certain circumstances. The
styling I chose below is arbitrary, you could use would ever you preferred
and you could put the style information in an external
Cascading Style Sheets (CSS) file, instead.
While working on a family member's PC, which is running Microsoft Windows 10
Professional edition, I found performance was slow while I was trying to look
up some information in a tab in the
Microsoft Edge browser. When I hit Ctrl-Alt-Del and brought up the
Windows Task Manager, clicked on the Performance tab, then clicked on Memory to view the
memory utilization, I saw that most of the system's memory was being consumed,
which would contribute to poor performance, if information needs to be swapped
in and out of memory to disk while I'm switching between open applications.
CPU utilization was also, high.
When I clicked on Details and then clicked on the "Memory (private
working set)" column header to order the processes by memory consumption,
I saw that the 7 topmost consumers of memory were
MicrosoftEdgeCP.exe processes, i.e.,
Microsoft Edge web browser processes.
With HTML 4, you can horizontally align an element in a cell in a
table using the align parameter, e.g.:
<td align="right"> to horizontally align text to the right
side of a cell. However, with HTML5, use of the align
parameter for horizontally aligning text within elements
of a table has been deprecated. E.g., if you check your
HTML code for adherence to the HTML 5 standard with the Nu Html Checker provided by the
World
Wide Web Consortium, you will see an error similar to the following
one displayed if you are using align in the HTML code for a table.
Thealignattribute on thetdelement is obsolete.
Use CSS instead.
From line 118, column 5; to line 118, column 22
</tr>↩<tr><td align="right">;<b>Vir