MoonPoint Support Logo

 

Shop Amazon Warehouse Deals - Deep Discounts on Open-box and Used ProductsAmazon Warehouse Deals



Advanced Search
October
Sun Mon Tue Wed Thu Fri Sat
           
         
2016
Months
Oct


Wed, Oct 26, 2016 9:57 pm

Mailman mailing list commands

GNU Mailman provides a means to manage electronic mailing lists. The software is written primarily in Python and is free; it is licensed under the GNU General Public License (GPL), which allows you to modify the code for the software, if you wish.

If your email address is in a Mailman mailing list, you can send an email message to the list with help in the subject or body of the email to get an email reply showing you the commands that you can put in email messages to the list. E.g., supposing that you are a member of a mailing list called "browncoats" on the server example.com. To see a list of the available commands supported by the Mailman mailing list handling email to that mailing list, you would send an email with help in the subject or body of the message to browncoats-request@example.com. I.e., you would put the name of the mailing list, in this case "browncoats" followed by a dash and the word "request" as the email address to which you would be sending the command. If you put help in the body of the message, you don't need to specify a subject, but put help as the first line of the message with no other text on the line.

[ More Info ]

[/network/email/mailing_list/mailman] permanent link

Mon, Oct 24, 2016 10:10 pm

Outlook 2010 0x800CCC91 error - plaintext authentication disallowed

A user who uses Microsoft Office Professional Plus 2010 as his email client reported that he could no longer download email. Whenever the user would check his email, a window would appear prompting him to re-enter his userid and password. Even after I reset his password on the server, the same thing kept happening. At the bottom, right-hand corner of the Outlook window, I saw a "Send/Receive error" messsage next to a yellow triangle with an exclamation mark within it.

Outlook 2010 send receive error

When I clicked on that error message, I saw "reported error (0x800CCC91): 'Your e-mail server rejected your user name. Verify your user name for this account in Account Settings. The server responded -ERR [AUTH] Plaintext authentication disallowed on non-secure (SSL/TLS) connections.'"

[ More Info ]

[/network/email/clients/outlook/2010] permanent link

Sun, Oct 23, 2016 10:27 pm

freshclam.exe - Ordinal Not Found

After I upgraded ClamWin to version 0.99.1 on an HP laptop running Microsoft Windows 7 Professional, I saw a window titled "freshclam.exe - Ordinal Not Found" with the message "The ordinal 177 could not be located in the dynamic link library libclamav.dll."

freshclam.exe - Ordinal Not Found

When I right-clicked on the ClamWin icon in the notification area at the lower, right-hand corner of the screen and selected Open ClamWin, I saw the prompt "You have not yet downloaded Virus Definitions Database. Would you like to download it now?" I chose "Yes" and saw the "Ordinal Not Found" message again.

[ More Info ]

[/security/antivirus/clamav] permanent link

Sat, Oct 22, 2016 10:50 pm

Installing iPerf on a Mac OS X system

Iperf is a network bandwidth testing tool that is available for a variety of operating systems. It is available as C++ source code and also in precompiled, executable versions for the following operating systems from iPerf - Download iPerf3 and original iPerf pre-compiled binaries:
  1. Windows
  2. Android
  3. iPhone / iPad
  4. Apple macOS
  5. Ubuntu / Debian / Mint
  6. Fedora / Red Hat / CentOS
  7. openSUSE
  8. Arch Linux
  9. FreeBSD

It can be used to determine available bandwidth using both Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) data streams.

[ More Info ]

[/os/os-x] permanent link

Fri, Oct 21, 2016 11:29 pm

Python script to extract a column from an Excel spreadsheet

I use the Python xlrd module to extract a column from an Excel spreadsheet. I've been using a Python script, extract-addresses.py to pull the data from a set column in an .xls spreadsheet, Directory.xls, and store it in a text file. I decided to make the script more generic, so that I can extract the data from a spreadsheet I specify when I run the script rather than a set spreadsheet and to have the specific column and output file name be variable as well. The new script is extract-column.py. The Python xlrd module will need to be installed for the script to work; xlrd can be downloaded from one of the links below:

Python Software Foundation
MoonPoint Support (version 1.0.0)

If no arguments are provided on the command line, the script will prompt for the name of the spreadsheet file from which the data should be extracted, the column number containing the data to be extracted (A is treated as column 1, B as column 2, etc.), and the name of the output file to hold the extracted data.

[ More Info ]

[/languages/python/excel] permanent link

Sun, Oct 16, 2016 10:10 pm

Checking a server's public host key on the server

If you receive a message from a Secure Shell (SSH) or Secure File Transfer Protocol (SFTP) application regarding the host key of the server to which you are attempting to connect being unknown or changed, such as the message from WinSCP below, you can check the server's public host key on the server itself, if it is a Linux server, using the ssh-keygen utility.

WinSCP unknown server 
host key

$ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key.pub
2048 96:f3:8b:03:13:06:13:4d:3c:7c:4b:fa:94:33:90:83   (RSA)
$

The -l option shows the fingerprint of a specified public key file. Private RSA1 keys are also supported. For RSA and DSA keys, ssh-keygen tries to find the matching public key file and prints its fingerprint. If the -l option is combined with -v, an ASCII art representation of the key is supplied with the fingerprint. The -f filename option allows you to specify the file name of the key file.

The ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key.pub command isn't showing the key itself, but instead shows the "fingerprint" for the key, which is a sequence of 32 hexadecimal digits. You can see the much larger key value itself by issuing the command cat /etc/ssh/ssh_host_rsa_key.pub.

[/network/ssh] permanent link

Sat, Oct 15, 2016 8:58 pm

Core temperature above threshold

On a CentOS 7 system I saw "Core temperature above threshold, cpu clock throttled" messages like those below appear on the console today.

[68546.319229] CPU1:  Core temperature above threshold, cpu clock throttled (total events = 189995)
[68546.319240] CPU0:  Core temperature above threshold, cpu clock throttled (total events = 189989)
[68546.519121] CPU0:  Core temperature above threshold, cpu clock throttled (total events = 192228)
[68546.519131] CPU1:  Core temperature above threshold, cpu clock throttled (total events = 192234)

I checked to see if the lm_sensors package was installed on the system, so I could check fan speeds and the central processing unit (CPU) temperature. It wasn't installed, so I installed it from the root account with yum install lm_sensors.

[ More Info ]

[/os/unix/linux/utilities/sysmgmt] permanent link

Thu, Oct 13, 2016 10:38 pm

Viewing an email message header in Outlook 2011

To view the email message headers in Outlook 2011, which is part of Microsoft Office for Mac 2011, right-click on the message and choose View Source.

Outlook 2011 - view source

[/network/email/clients/outlook/2011] permanent link

Wed, Oct 12, 2016 11:00 pm

Ncat 5.59BETA1 for Microsoft Windows

Ncat, which is a reimplementation of the netcat computer networking utility, is a utility which reads and writes data across a network from a command-line interface (CLI), such as a shell prompt or a Microsoft Windows command prompt. It supports TCP and UDP, SSL, and proxy connections via SOCKS4 or the HTTP CONNECT method.

You can downloaded a precompiled binary version of the utility from Nmap.org or this site.

Nmap.org
MoonPoint Support

[ More Info ]

[/os/windows/software/network] permanent link

Sat, Oct 08, 2016 11:00 pm

Creating a signature in Microsoft Outlook for MAC 2011

Email clients often allow you to create a signature block that will automatically be added to the bottom of every email message you compose. Signatures typically contain items such as the sender's name, email address, physical address, phone numbers, company name, etc. To create such a signature in Outlook 2011, which is part of Microsoft Office for Mac 2011, take the following steps inside Outook:

[ More Info ]

[/network/email/clients/outlook] permanent link

Fri, Oct 07, 2016 11:09 pm

Get-AppLockerFileInformation versus Get-FileHash hash codes

AppLocker is a policy-based security component of Microsoft Windows introduced in Windows 7 Professional, Enterprise and Ultimate editions and Windows Server 2008 R2. It enables or disables execution of software based on rules such as location, properties and digital signature, so it can be used to restrict that software that can be run on a Microsoft Windows system. Executable file restrictions can be based on a hash value, publisher certificate, etc. Further details on AppLocker can be found at An approach for managing Microsoft AppLocker policies.

The Get-AppLockerFileInformation PowerShell cmdlet will return a hash code it labels as "SHA256". But you will find that a hash code it returns differs from one returned by the Get-FileHash cmdlet for executable, e.g., .exe files.

[ More Info ]

[/os/windows/PowerShell] permanent link

Thu, Oct 06, 2016 9:46 pm

Indian scammers posing as U.S. IRS employees busted

I heard some good news on the radio while driving home from the office this afternoon. Indian law enforcement officers arrested 70 people working in call centers on the outskirts of Mumbai who were involved in a phone scam operation where they would call U.S. citizens and leave voice mail messages where they claimed to be U.S. Internal Revenue Service (IRS) agents demanding payments for taxes those called supposedly owed with the threat of arrest if the callee doesn't pay. Assistant police commissioner Bharat Shelke stated that "Fearing arrest, some used to call back, and employees at the call center then demanded a few thousand dollars to settle the case." Shelke also stated that an estimated $36.5 million was extorted from Americans duped into paying the scammers. Unfortunately, the police haven't yet caught the ringleaders of the operation.

Indian authorities stated that the callers were trained to disguise their Indian accents, so that they would sound more like native-born Americans. Employees of the scammers were given a six-page script with tips on how to allay potential victims suspicions. For their jobs as criminals, callers were paid between 10,000 rupees and 70,000 rupees every month, which is equivalent to between $150 and $1,050 U.S. dollars, police said. Shelke stated "Employees were aware of the fraud, but since they were getting a good salary, they remained silent."

I received a call from a scammer pretending to be an IRS employee in February of this year. In that instance, the person I spoke to had an obvious Indian accent. When I told him I knew he was a fraudster, he responded with a reference to a sexual act and hung up. Subsequently, my wife has received many similar bogus IRS calls. In the case where I spoke to the caller in February, the scam operation was spoofing the calling phone number.

Such scammers don't target just Americans. Tax agencies in Canada and Australia have all issued warnings over such scam callers. Last year, Sahil Patel, a scammer residing in Pennsylvania, was sentenced to 14 1/2 years in prison for his role in a similar scam where callers posed as law enforcement officers or tax agents. He was also ordered to forfeit one million dollars. The call centers Patel worked with used software that allowed them to spoof calling numbers so that those called would see a phone number that appeared to be associated with the agency with which the callers claimed to be associated.

At a Senate hearing in 2015 prior to Patel's conviction, a U.S. Department of the Treasury official estimated that such scams generated between 9,000 and 12,000 complaints a week and had gained scammers more than $15.5 million from 3,000 victims.

So kudos to Indian law enforcement officers for the recent operation; I hope they catch the kingpin(s) for whom those arrested worked.

References:

  1. Indian police seek kingpins in tax scam aimed at Americans
    By Rajendra Jadhav and Rahul Bhatia | Mumbai
    Date: October 6, 2016
    Reuters
  2. Pennsylvania man gets 14-1/2 years in prison for India-based phone scam
    By Joseph Ax | New York
    Date: July 8, 2015
    Reuters

[/security/scams] permanent link

Wed, Oct 05, 2016 9:08 pm

Creating local folders in Outlook 2011 on a Mac system

If you wish to create folders in Outlook 2011, which is part of Microsoft Office for Mac 2011, so that you are using less space on a Microsoft Exchange Server, where you might have a quota limiting your mailbox storage, you can create local folders that will result in the email messages being placed in them being stored on your computer's disk drive, instead, of on the server. To do so, you can take the following steps:
  1. Click on Outlook at the top of the top, left-hand corner of the Outlook window.
  2. Select Preferences
  3. Click on General under Personal Settings. In the General settings window, uncheck the check boxes next to "Group similar folders, such as inboxes, from different accounts and "Hide On My Computer folders". You can then close the window by clicking on the red circle at the upper, left-hand corner of the window.
  4. Click on Inbox under ON MY COMPUTER
  5. Click on File then select New and then Folder
  6. When you provide a name for the new folder, it will be placed under the Inbox folder, but you can click on it and drag it up to On MY COMPUTER to put it at the same level in the hierarchy as the Inbox. Once you have a folder at the same level as the Inbox folder, you can create subfolders beneath that folder by clicking on it to select it and then selecting File, New, and Folder from the menu bar.
  7. To copy a message from the Inbox on the server to the ON MY COMPUTER inbox, click on the message and drag it to the new location. If you want to move the message, instead, click on the message to select it then click on Message from the Outlook menu bar then select Move and select the folder you created under ON MY COMPUTER that should hold the message.

[ More Info ]

[/network/email/clients/outlook] permanent link

Tue, Oct 04, 2016 10:43 pm

Determining the application that will open a file from the command line

If there is no program set as the default application for opening a file type, when you right click on a file of that file type and choose Properties, you will see "Pick an app" next to "Opens with".

.lit file properties

If you wish to identify all of the extensions known by the system, you can use the assoc command. If you type the command at a command prompt with no parameters, you will get a long list. You can redirect the output to a file with assoc > list.txt or page through it by piping the output of the command to the more command with assoc | more.

[ More Info ]

[/os/windows/commands] permanent link

Mon, Oct 03, 2016 7:49 am

Hiding an element on a webpage with JavaScript

JavaScript can be used to control the display of elements on a web page. E.g., suppose I don't wish visitors to a webpage to see a certain element on the page unless the width of their browser window is a specified value. The element could be a div, which might contain an advertisement or some other image that might be too wide for a browser window that was less than a certain width. So I want to hide the display of the element, so that it doesn't detract from the aesthetics of the page.

I could put the following code in the HEAD section of the webpage, if I wanted any DIV element on the page that has a class of sometimesHide to be hidden in certain circumstances. The styling I chose below is arbitrary, you could use would ever you preferred and you could put the style information in an external Cascading Style Sheets (CSS) file, instead.

<style type="text/css">
   .sometimesHide { background-color: MediumOrchid; color: white; margin: 25px;}
</style>

[ More Info ]

[/languages/javascript] permanent link

Sun, Oct 02, 2016 5:18 pm

Microsoft Edge Process Memory Consumption

While working on a family member's PC, which is running Microsoft Windows 10 Professional edition, I found performance was slow while I was trying to look up some information in a tab in the Microsoft Edge browser. When I hit Ctrl-Alt-Del and brought up the Windows Task Manager, clicked on the Performance tab, then clicked on Memory to view the memory utilization, I saw that most of the system's memory was being consumed, which would contribute to poor performance, if information needs to be swapped in and out of memory to disk while I'm switching between open applications. CPU utilization was also, high.

Task Manager - memory utilization

When I clicked on Details and then clicked on the "Memory (private working set)" column header to order the processes by memory consumption, I saw that the 7 topmost consumers of memory were MicrosoftEdgeCP.exe processes, i.e., Microsoft Edge web browser processes.

[ More Info ]

[/network/web/browser/edge] permanent link

Sat, Oct 01, 2016 10:21 pm

Align attribute is obsolete

With HTML 4, you can horizontally align an element in a cell in a table using the align parameter, e.g.: <td align="right"> to horizontally align text to the right side of a cell. However, with HTML5, use of the align parameter for horizontally aligning text within elements of a table has been deprecated. E.g., if you check your HTML code for adherence to the HTML 5 standard with the Nu Html Checker provided by the World Wide Web Consortium, you will see an error similar to the following one displayed if you are using align in the HTML code for a table.

The align attribute on the td element is obsolete. Use CSS instead.
From line 118, column 5; to line 118, column 22
</tr>↩<tr><td align="right">;<b>Vir

[ More Info ]

[/network/web/html/css] permanent link

Valid HTML 4.01 Transitional

Privacy Policy   Contact

Blosxom logo