Security - Wipe Tools

On blog was already published, some articles, mentioning several wipe tools:

Programma - HardWipe bonificare un Hard disk e cancellare i propri dati

USB Live - Creare una USB autoavviante per fare il WIPE di un Hard Disk 

Privacy - Two tools to completely wipe data and create USB/CD Live 


An alternative wipe tool could be using ABAN 

(ABAN’s name is inspired by Darik’s Boot and Nuke, an older (and unfortunately no longer maintained) program that does something very similar. But but other than that, it's completely unrelated.)

https://aban.derobert.net/

https://gitlab.com/derobert/aban

You can burn it using RUFUS

Here it is an old blog article (that mentioned RUFUS too):

https://www.alessandromazzanti.com/2015/04/microsoft-free-download-link-windows-81.html

Monitor - Syslog using PRTG or Kiwi Syslog Server

On old blog article I already mentioned several monitoring/security tools

I am highlighting Kiwi Syslog Server that permit to:

  1. Centrally manage syslog messages, snmp traps and windows Event logs.
  2. Store and archive logs, receive promptly alerts based on critical events.
  3. Respornd to syslog messages
  4. Email alerting
  5. Diagnose network issues

Freeware - SolarWinds All Free Network/System/Security/DB/clients monitoring tools

<==============>

About configuring Kiwi Syslog on Cisco devices, here it is a small guide/tutorial

Kiwi Syslog Server Getting Started Guide

About configuring Syslog, on Cisco ASA, you can review this guide:

ASA Syslog Configuration Example

<==============>

At the same time I would like to mention that PRTG (free up to 100 sensors) has possibility to use sensor acting as syslog server

https://www.solarwinds.com/kiwi-syslog-server/use-cases/network-troubleshooting

Here they are old PRTG blog articles

Server - PRTG Network Monitor Tool

Monitoring - PRTG monitors freeware version until 100 sensors

Security - Radius Server

 Here it is a basic article related to Radius protocol, I am taking note, on blog, for future purposes and, in case, it would be useful for seomeone


https://techgenix.com/radius-protocol-authentication-management-guide/

Antivirus - Sophos Message Relay/Cache Manager #FIREWALL PORTS

Sophos Central endpoints has possibility, to update themselves, or send messages status, to a LAN server (that operate as Sophos Update Cache and Message Relay)

Alternatively Endpoints updates, themselves, to internet.

Here they are ports that are necessary to be opened (to permit previously behaviors)

https://support.sophos.com/support/s/article/KB-000035367?language=en_US

Tips - Webex Cache cleaning procedure

There is an easy and quick procedure necessary , to be done, to clear Cisco Webex Cache. 

It is really easy, but, in any case, I take note, about it, on blog.

Be aware that, on Citrix Environment, you should add, this path, to Exclusions list - folders that you should not syncronize (using Roaming profiles) (avoiding, in this case, to waste time during login and wasting disk space as well)

https://help.webex.com/en-us/article/WBX9000035301/How-Do-I-Clear-the-Cache-for-Cisco-Webex-Meetings-on-Windows?

Windows 10 - Autologon

On previous article we explained how to configure XP/Windows 7 autologon (without user and password request)

https://www.alessandromazzanti.com/2013/02/tips-abilitare-autologon-in-windows.html


Using Windows 10 situation is slightly different:



Related Articles:








Teams - How to disable message reading acknowledgement

On teams, there is possibility, like on WhatsApp, to disable message reading acknowledgement/read receipt, here it is relative setting:



More details:

https://www.addictivetips.com/web-conferencing/microsoft-teams-read-receipts/

Tips - All Web Site history

If you want to review single website content, in any other time/date in the past,  Web Site Archive is the correct website that you need to visit/use:

 https://web.archive.org/

Automation - Constellation Brands Nava Brewery

I share this video that show how much huge, and automated, can be a brewery plant.

It is really impressive!!!



Tips - Windows Shortcuts

Here they are shortcuts lists (that, IMO, are quite useful) (yellow highlighted commands that I did not know or I found particularly useful)

  1. Tap the Windows key to open and close the Start Menu. Windows+opens File Explorer. 

  2. Windows+L immediately locks the screen.

  3. Ctrl+to copy; Ctrl+V to paste; Ctrl+Z to undo.

  4. Ctrl + Y Redo an action.

  5. Windows key + V Open Clipboard bin.

  6. Windows+E: Opens File Explorer.

  7. Windows+I: Opens Settings.

  8. Windows+Spacebar: Cycle through your language and keyboard options.

  9. Windows+D: This hides all of the open apps and takes you directly to the Windows 10 desktop. Using this command a second time will display all of your open apps again.

  10. Windows+M: Minimizes all open apps and windows.

  11. Windows+Left arrow: Snaps an app or window to the left side of the screen.

  12. Windows+Right arrow: Snaps an app or window to the right side of the screen.

  13. Windows+Up arrow: Maximizes all open apps and windows that have been minimized.

  14. Windows+Down arrow: Minimizes all apps and windows.

  15. Ctrl+Shift+Esc: Opens Task Manager. This is used to show you all apps that are currently running and how much processing power they're using.

  16. Alt+Tab: Displays all open apps and lets you switch between them quickly.

  17. Ctrl+Alt+Tab: Shows all open apps.

  18. Windows+0 (zero): Opens the Windows 10 Sticky Notes app.

  19. Window+. or (semicolon): Brings up the emoji box. This is incredibly useful when typing in an app that has no built-in emoji or emoticon options.
    1. Tips - Windows 10 /Outlook Emoticons shortcuts
  20. Alt + D Select address bar.
  21. Windows key + PrtScn Capture a full screenshot in the "Screenshots" folder.
  22. Windows key + Shift + S Capture part of the screen with Snip & Sketch.

Tips - Win 10 e virtual desktops

  • Windows key + Ctrl + D Create a virtual desktop.
  • Windows Key + Tab switch between different virtual desktops (graphically)
  • Windows key + Ctrl + F4 Close active virtual desktop.
  • Windows key + Ctrl + Right arrow Switch to the virtual desktop on the right.
  • Windows key + Ctrl + Left arrow Switch to the virtual desktop on the left.
  • Windows key + Ctrl + Shift + B Wake up the device when black or a blank screen.

[original articles]

https://www.windowscentral.com/best-windows-10-keyboard-shortcuts

https://www.lifewire.com/best-windows-10-keyboard-shortcuts-4177070

Firewall/Security - IPS ( Intrusion Prevention Systems ) overview

I am taking note on blog about article related to IPS (Intrusion Prevention Systems) overview and relative comperazation to IDS:

"Unlike its predecessor the intrusion detection system (IDS) – which is a passive system that scans traffic and reports back on threats – the IPS is placed inline, directly in the flow of network traffic between the source and destination. Usually sitting right behind the firewall, the solution is actively analyzing and taking automated actions on all traffic flows that enter the network. These actions can include:

  • Sending an alarm to the administrator (as would be seen in an IDS)
  • Dropping the malicious packets
  • Blocking traffic from the source address
  • Resetting the connection
  • Configuring firewalls to prevent future attacks"



[Original Articles]


Hacker - Banking trojans

Zimperium recently published report about 10 most diffused home banking trojans, on Android OS, affecting more than 600 home banking apps.

This trojans are injected through harmless apps available on google store.

After that these apps are installed on mobile phones, and succesfully infected mobile devices, they show, to end users, similar home banking websites and work to intercept, user, password and one time passwords.

Here they are original articles

https://www.hwupgrade.it/news/sicurezza-software/trojan-bancari-e-emergenza-i-10-piu-diffusi-prendono-di-mira-app-scaricate-un-miliardo-di-volte_107688.html

https://www.forbes.com/sites/daveywinder/2022/04/09/these-6-dangerous-phone-apps-need-to-be-deleted-immediately/

REMARK This is why I still use hardware home banking token :)


<============>

About other Security/Hacker articles please review below blog sections:

https://www.alessandromazzanti.com/search/label/Hacker

https://www.alessandromazzanti.com/search/label/Security

Windows 10 - Windows 10 logs

 STEP 1:

  1. Starting with Windows 10 build 9926, Windows Update logs are no longer saved to "%windir%\Windowsupdate.log".
  2. Windows Update client now uses Event Tracing for Windows (ETW) to generate diagnostic logs saved as .etl files in the "%windir%\Logs\WindowsUpdate" folder. This method improves performance and reduces disk space usage. However, the logs are not immediately readable as written.
  3. After Windows 10 build 9926 logs are here located but no longer readable.
  4. Click Windows key + R to open Run and type Evntvwr.msc -->  Applications and Service Logs\Microsoft\Windows\WindowsUpdateClient


STEP 2:

  1. Click Windows key + R to open Run and excute PowerShell with administrative rights and press Enter.
  2. Enter Get-WindowsUpdateLog into the elevated PowerShell, and press Enter.
  3. When finished running, this will create a WindowsUpdate.log file on your desktop. It will take a moment to finish.

STEP 3:

  1. Click Windows key + R to open Run and type cmd with administrative rights and press Enter.
  2. Type regedit.exe and press Enter.
  3. Browse to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU


  4. Change the key UseWUServer from 1 to 0
  5. Inside cmd with administrative rights execute below commands:
    1. net stop wuauserv
    2. net start wuauserv
  6. Open windows update:
    1. Run updates and select the option to get updates online.

STEP 4:

  1. Click Windows key + R to open Run and type cmd with administrative rights and press Enter.
  2. Type rsop.msc and press Enter.
  3. Check domain policies applied and verify Windows update section as well.


STEP 5:

Here they are some screenshots on how we could proceed, working on GPOs, changing bandwitch usage












Windows Server - AD cleanup/Removal DC procedure

On AD Microsoft server infrastructure it might happen that a DC death suddenly and there is any possibility to recover it (other than format/delete/wipe it)

In this specific case furthermore, you should cleanup AD metadata (to delete any referring that specific DC).

I am taking note, on blog, procedure (saving some articles that I used, in the past, to find workflow):

Metadata Cleanup Using NTDSUTIL in Windows Server 2008 R2
Clean Up Server Metadata

[Update 2022-08.02]

Security - Shodan

Major person does not have exactly perception about how much could be invasive technology, what it mean internet (World Wide LAN that interconnect all devices through internet) and how much security perception is lower than how much is dangerous.

Other than this aspect I am taking note about Shodan, that is a search engine, for internet-connected devices.

Here it is a presentation. There are other aspects, for which this website can be used but, due to security aspects/concerns, I would prefer to omit them. (to indicate them on blog)

https://help.shodan.io/the-basics/what-is-shodan

<============>

About other Security/Hacker articles please review below blog sections:

https://www.alessandromazzanti.com/search/label/Hacker

https://www.alessandromazzanti.com/search/label/Security

Extra IT - Family mediator mention/Mediatrice Familiare menzione #FRANCESCA #FABBRI

Mediation, as a constructive life approach, means to solve conflicts, finding a fair agreement (acceptable for both parts), having first objective to preserve children (in family mediation case) and focus on their supreme good. 

Afterward, another family mediation objective is focusing on shared parenting.

Parents agrees, and are helped (working on themselves and on their behavior), maintaining good communication, helping each other and good relations. 

Love that does no longer exists between parents, is preserved versus children, and parents work closely to maintain vice versa good behavior/fair, helping each others and having good relations.

Family mediation permit to outcome previous target (stipulating a written agreement too)

Consider that any war or hate attitude, as general concept, is negative versus any person (there are several medicine/philosophical/religious confirms that, in any case, I omit to indicate in this article). 

This is more negative specifically versus ex-wife/ex-husband.

Be aware that, children's face has 50 % similarity to both parents. 

If you hate ex-wife/ex-husband it means that you are hating children's half. (so this is terrible!)

Due to this reasons, achieve separation, through familiy mediatior, it permit to avoid/limit previous risk (if ex-wife/ex-husband declare war, each other, through lawyer, previous risk is decisevely higher) and, in any case, signing a written agreement protects all parts (and children at first)

So, considering 28/7/22 importance date, for me (anniversary date) I would like to share, and strongly endorse, Dott.ssa Francesca Fabbri

Fabbri's professionalism, and correcteness, was the key to sucessfully achieve an excellent result. (in my case)

These are references (in case they would be useful for someone)

 https://www.misericordia.firenze.it/Documents/Fabbri%20profilo%20professionale.pdf

https://it.linkedin.com/in/francesca-fabbri-988a7120

<================>

La mediazione, come approccio costruttivo alla vita (sia in ambito familiare che in tutti gli altri ambiti), significa risolvere i conflitti, trovando un accordo equo, (quindi accettabile per entrambe le parti). 

Nel caso della mediazione familiare significa avere come primo obiettivo il preservare i figli focalizzando sul loro bene supremo. 

Successivamente, un altro obiettivo, anch'esso importante, della mediazione familiare, è concentrarsi sulla genitorialità condivisa.

I genitori si impegnano e, allo stesso tempo, vengono aiutati, (mettendosi in gioco e lavorando su se stessi) a mantenere buoni rapporti, aiutandosi a vicenda e mantenendo una buona, e rispettosa, comunicazione.

L'amore infatti, che non esiste più tra i genitori, deve essere preservato rispetto ai figli. 

Per questo motivo i genitori lavorano a stretto contatto, con la mediatrice, per mantenere, viceversa (come gia' detto prima), un buona relazione, avere un buon dialogo (rispettoso) ed aiutandosi a vicenda. (ed alla fine stipulando un accordo )

E' giusto rimarcare che, qualsiasi forma di guerra o di odio, come concetto generale, è negativo nei confronti di qualsiasi persona (non sto qui a dare spiegazioni filosofiche/teologiche/mediche che avvalorano il concetto). 

L'odio e' ancora più negativo quando questo coinvolge l'ex moglie/ex marito.

Infatti il viso del figlio ha il 50% di somiglianza del padre e della madre. Se l'ex moglie/ex marito odia l'altro genitore significa che odia la metà del figlio. (e questo può essere altamente pericoloso)

Proprio per questo rischio, che aumenterebbe considerevolmente, se le parti si affidassero ad una guerra reciproca, fatta con avvocati, questo percorso, tramite mediazione familiare, permette di ottenere la separazione limitando fortemente (se non rimuovendo) il precedente rischio. 

E comunque, essendo un accordo scritto, e depositato in tribunale, garantisce tutte le parti, affinché' sia rispettato (figli in primis e per il loro superiore bene)

Quindi, visto che 28/7/2022, era una data di anniversario importante, ci tengo a condividere, e allo stesso tempo raccomandare fortemente, la mediatrice familiare Dott.ssa Francesca Fabbri. (La sua professionalità ha permesso, nel mio caso, di ottenere risultati eccellenti)

Questi sono riferimenti (nel caso potessero essere utili a qualcuno)

https://www.misericordia.firenze.it/Documents/Fabbri%20profilo%20professionale.pdf

https://it.linkedin.com/in/francesca-fabbri-988a7120

Mobile - How to reset lan settings

 Here they are offial apple article that explain on how to reset iphone lan settings

https://support.apple.com/it-it/guide/iphone/iphea1c2fe48/ios

Security - 6 Security Tips

Person majority does not have exactly perception about how much it could be invasive technology, what it really means internet (*) and how much security perception is lower than how much it is dangerous and appliable to normal life activities.

Due to this reasons I am focusing, with this article, on some interesting aspects.

Consider that, in this article, there is a specific topic that explain effects that technology abuse might affects teenagers (italian language)

(*) World Wide WEB means that all devices are interconnected each other, through internet, it implies that all world devices are, theoretically, reachable from any users and from location. Security concerns should easily realized :-)

1) PASSWORD SHARING

This website permits to create weblinks containing PrivateText & Passwords (that could be securely shared with remote users).

https://privnote.com/

To strengten security there are furthers settings that we strongly suggest to use.

  • Password could be shown only "one time" (or extended up to 30 days deprecated)
  • You can add email address having real time notification (when weblink was effectively read)
  • You can create master password, about web link, that you should communicate, to end user, using different communication ways (SMS, by phone, by voice etc. etc.)

2) HAVE YOU POWNED

Here it is an old article that explains how to verify if, your email account, was  affected in any data breach (occurred on any websites where you registered)


3) VERIFY FILES/WEBLINKS/EMAIL/DOCUMENTS ON ALL ANTIVIRUS VENDORS

During these years I often had necessity to check files/emails/URLs understanding if they had any sort of infection (that was not yet discovered from latter antivirus definitions)

To get this result often I connect through this website that queries all majority AV versions and relative latter definitions.



4) PROXY BROWSER ON LINE

After virustotal checks if weblink is fine but you suspect that it could be a phishing targeted attack you might open weblink through a specific website (registration is for free for basic settings) and you might verify real contents and requests (withouth any risk on you pc/device):


5) PASSWORD TOOLS

Here they are some password tools from old blog article



6) HOW TO VIEW RDP HISTORY SCREENSHOTS

How to view RDP activities done on any Server/client


6.BIS) CYBERBULLISMO

Here it is an optional article that explain technology abuses that could occur on teenagers and persons (italian language only)



<============>

About other Security/Hacker articles please review below blog sections, there are several other aspects that are important to take awareness

https://www.alessandromazzanti.com/search/label/Hacker

https://www.alessandromazzanti.com/search/label/Security


Extra IT - Leave a Legacy

I am sharing a video that I received last year.

I think that message, intrisically contained, should be, by default, included in all our DNA/"Firmware" (for each human person).

The questions are, which memories and legacies you will leave, in any place, with each person with whom you interacted, during all your life? 

https://resources.franklincovey.com/the-8th-habit/leave-a-legacy

Live, Love, Learn

Leave a legacy

Life is short

So...

Live

Love

Learn

Leave a Legacy

LIVE

What makes life worth living

What's missing

LOVE

How do I know..

How do I show love?

LEARN

Where are the answers?

What do I need to learn? to unlearn?

LEAVE A LEGACY

How will I be remembered?

What do I dream of?

What is my fire within?

To live

To love

To learn

To leave a legacy

Life is short

So?

Extra IT - Horse country Resort

Recently we had opportunity to have holidays at following Village Resort (located in Italy-Sardegna).

https://www.horsecountry.it/
https://www.instagram.com/horsecountryresort
https://www.facebook.com/HorseCountryResortCongressSPA/

Considering quotations, quite cheap compared to similar offers, the services provided was excellents. (and we were satisfied)

Internal restaurant, beach restaurant,  3 bars (one of them beach located), horse riding school, SPA wellness center, internal shop, western-style saloon (with relative country music shows), pizzeria, two swimming pools, services offered on the beach (*), soccer field, tennis court, table tennis, karaoke events etc. etc.

Last, but not least, the animation was one of the keys due to our resort permanence (and satifaction): professional, pleasant and funny (it is completely suitable for this kind of locations).

I must endorse villlage animation manager (Gennaro) that was able to coordinate and create an excellent animation team. Another endorsement must be given to both kids mini club girls (Marika and Giada) that has an unique kids positive approach. Latter mention must be given to one animation guy (Francesco)

 I share this information in case it would be useful for someone (and to contradict, partially, "fake news / negative feedbacks" that you might find surfing on web)

 (*) apart sea quality concerns, however well-known and indicated in several web reviews (be aware that, for those who, like us, had a car, it was not absolutely a problem)

<=============>

Ho avuto modo di soggiornare, recentemente, presso la seguente struttura.

https://www.horsecountry.it/

https://www.instagram.com/horsecountryresort

https://www.facebook.com/HorseCountryResortCongressSPA/

Considerando il prezzo, piu' che ragionevole, i servizi forniti sono ottimi. (rimanendone soddisfatti)

La ristorazione, il ristorante sulla spiaggia, i tre bar ( di cui uno sullo spiaggia)  il maneggio, il centro benessere SPA, il negozio interno, il saloon tipo western (con relativa musica country), pizzeria, le due piscine, il servizio spiaggia (*), campo calcetto/tennis, ping pong, serate karaoke etc. etc.

Ultimo, ma non ultimo, l'animazione, professionale, piacevole e non invadente, sono il giusto completamente (se non la vera ciliegina sulla torta). 

E' doveroso menzionare la bravura e professionalità del capo animazione (Gennaro) che e' stato in grado di coordinare e creare un eccellente team di animazione. Un'altra menzione e' doverosa per entrambe le due ragazze (Marika e Giada) del mini club ( per i piu' piccoli) che hanno un approccio, verso i bambini/e, unico e positivo allo stesso tempo (da segnalare anche la baby dance serale), Ultima segnalazione, positiva,  verso una persona dell'animazione (Francesco)

Condivido l'informazione nel caso torni utile a qualcuno (e per contraddire, in parte, le "fake news/feedbacks" che girano sulla struttura). E' giusto menzionare anche uno dei vari animatori (Francesco) con cui sono entrato in sintonia

(*) a parte qualche concerns relativi al mare, comunque ben noti ed indicati nelle varie recensioni che girano su internet, per chi, come noi, aveva la macchina, non era assolutamente un problema

Tutorial - PFX to PEM certificate exporting procedure #HOW TO

If you have necessity to transform .PFX certificate to .PEM files you have to follow a specific procedure:

Consider that PFX file is a certificate, in PKCS#12 format, it contains SSL certificate (public keys) and corresponding private keys.
Be aware that a PEM file is a text file, containing one or more items, in Base64 ASCII encoding, each with plain-text headers and footers (e.g. -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----)

Here they are steps that you should take place

  1. Install OpenSSL
    https://slproweb.com/products/Win32OpenSSL.html

  2. Copy .pfx files in same folder where OpenSSL.exe is located

  3. First case: To convert a PFX file to a PEM file that contains both the certificate and private key:

    Launch below commands:
    openssl pkcs12 -in original_certificate.pfx -nocerts -out Exported_certificate_private_key-encrypted.key

    (you will be prompted to insert original password and new one)

    openssl pkcs12 -in original_certificate.pfx -clcerts -nokeys -out Exported_certificate_private_key-encrypted.crt

  4. Second case: How to convert PFX file to PEM file (that contains both certificate and private key):
    openssl pkcs12 -in original_certificate.pfx -out Exported_certificate.pem -nodes

    (you will be prompted to insert original password and new one)
[Original articles]



Mobile - Iphone how to force brute restart

I am taking note about a very simple topic related on how to hard reboot Iphones devices.

Here it is relative link

https://support.apple.com/it-it/guide/iphone/iph8903c3ee6/ios

Scripting - Enumerate file extension, count them and indicate total size

If you have necessity to analyze single folder (and relatives subfolders), identifying all files extensions, count files numbers and indicate total size this script will assist you on this requirement

$directory = "D:\foo"

#Get all items

Get-ChildItem -Path $directory -Recurse |

#Get only files

Where-Object { !$_.PSIsContainer } |

#Group by extension

Group-Object Extension |

#Get data

Select-Object @{n="Extension";e={$_.Name -replace '^\.'}}, @{n="Size (MB)";e={[math]::Round((($_.Group | Measure-Object Length -Sum).Sum / 1MB), 2)}}, Count

https://stackoverflow.com/questions/22616634/determine-recursively-both-count-and-sum-of-all-extensions-in-a-folder


Hardware - mSATA vs SATA vs M.2 SSD

Here it is a quick article that well explain differences between mSATA vs SATA vs M.2 SSD

https://techgenix.com/msata-ssd-comparison/

Security - MFA override

Here it is mentioned, in italian language a way to override MFA when a proper phishing email is sent to user that will redirect him to a similar website page (a.e. web bank)

End user will insert user and password. Immediately crimes will insert user and password on original website (a.e. bank).

User will receive email with temporary code (true), that will be inserted in duplicated page. Crimes will use this latter code on original webpage having full access on user account (a.e. bank)

So attention to phishing emails must be improved.

https://www.hwupgrade.it/news/sicurezza-software/l-autenticazione-a-due-fattori-puo-essere-bucata-dall-italia-arriva-la-scoperta-ma-non-c-e-soluzione_106327.html

[Update 2022.06.27]

https://www.securityinfo.it/2022/06/27/phishing-supera-l2fa-con-app-microsoft-webview2/

Security - Edge VPN built-in feature Microsoft implementation on going and Opera Built in VPN free

Today  I would like to mention that Microsoft is working to release new Edge version with VPN integrated, it should be for free for limited traffic amount, an account creation should be necessary. 

In any case is an interesting information (to improve security) and encrypt traffic, for providers too, and to hide you public IP address

https://www.cnet.com/tech/services-and-software/microsoft-edge-is-getting-a-built-in-vpn/

https://www.hwupgrade.it/news/sistemi-operativi/microsoft-edge-avra-la-sua-vpn-integrata-e-gratuita-arriva-l-annuncio-ufficiale_106800.html

Another browser that already have, built in VPN feature, for free, is Opera, have a look to below link:

https://www.opera.com/features/free-vpn

Server - SMB Protocols some useful information



Consider that on each Win O.S. there are two services (one is necessary to connect to remote shares, other one is necessary to publish shares):
  1. Client (LanmanWorkstation)
    Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation
  2. Server side (LanmanServer
    Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer

Here they are some useful commands:

Get-Service Lanman*
Get-SmbShare
Get-Service LanmanServer -DependentServices

To log any if SMB 1.0 protocol is enabled on file server you must use below powershell command 

Set-SmbServerConfiguration -AuditSmb1Access $True -Force

On eventviewer logs are here located:

Applications and Services Logs > Microsoft > Windows > SMBServer > Audit

EventID 3000 

to view events using powershell you must use:

Get-WinEvent -LogName Microsoft-Windows-SMBServer/Audit | Out-GridView

to view if SMB 1.0 is enabled 

Get-SmbServerConfiguration | select EnableSMB1Protocol

If you want to see which SMB versions are using your clients

Get-SmbSession | select ClientComputerName, ClientUserName, NumOpens, Dialect

Dialect is correct column indicating SMB version

There are possibilities to encrypt End-to-End encryption, for single share:

Set-SmbShare -Name Projects$ -EncryptData $True -Force

and for entirely file server

Set-SmbServerConfiguration –EncryptData $True -Force

Meanwhile Microsoft is going to not support, SMB 1 on Windows 11 due to well known security problems. (driver and DLL would not be included)


[original article]


IIS - How to enable IIS errors logging

On IIS errors troubleshooting is easier if errors reasons are verbosely indicated in their logs.

This article quickly explain on how to proceed in verbose errors logging procedure

https://4sysops.com/archives/enable-detailed-iis-errors/

Windows 11 - System Requirements

 Microsoft releases below link where system requirements are verbosely indicated:

https://www.microsoft.com/en-us/windows/windows-11-specifications?r=1

Email - Antispam websites #how to verify your email/smtp server or domain is blacklisted

If you have necessity to check if your email/SMTP Server, or domain, is blocked by some antispam here they are some websites that might be useful for this check purposes.

Website Blacklist Checker

https://sitechecker.pro/blacklist-checker/

 

Blacklist Check

https://mxtoolbox.com/blacklists.aspx

 

Email Health

https://mxtoolbox.com/emailhealth

 

SpamHaus

https://check.spamhaus.org/not_listed/?searchterm=ruffino.it

 

IP Blacklist & Email Blacklist Check

https://dnschecker.org/ip-blacklist-checker.php

 

Antiabuse project 

http://www.anti-abuse.org/multi-rbl-check/ 


[update 2022.05.09]

You can send, your email, to a specific address to understand it it has some spam related problems

http://www.isnotspam.com/

https://www.emailchecky.com/en/

[update 2022.05.26]

https://talosintelligence.com/


[update 2022.05.27]

If you need to verify DNS propagation here it is an useful website:

https://dnschecker.org/#TXT/_dmarc.ruffino.it


University - 24/04/2002 -24/04/2022 #personal special anniversary date

I have always found several difficulties publishing, on internet, or on social media, personal information and photos (if not in pediatric quantities).

But, today an exception is necessary, in fact, exactly 20 years ago, I got IT Engineer bachelor degree (five-year).

I finished high school having several difficulties and, the admission judgment ( exam state), was deserved (in negative sense). Among other things, my inclusion (Work world ) was strongly suggested.

I was really problematic (during high school time period)

I finished high school, using tooth and nails, due to fact I had presentiment that University was my way/destiny (the doubt was which one)

The computer science professor was decisive in choosing the university who, in addition to being a father's friend, welcomed us, into his office, telling us about engineer and his University experience.

After this meeting my, university roadmap, was clear in front of me.

Many thanks to IT professor, my parents who supported me financially (and in particular my father who, even he did not speak so much, always trusted in me), several sacrifices that I made (even more necessary, more than other students, due to the fact that I had studied almost nothing on high school) and, why not, a bit of luck (which, in life, it is always useful).

Due to reasons, indicated at the beginning, I do not publish degree day photos but, I like to mention, what "the great" Mathematical Analysis's professor Massimo Furi usually said:

"... There are no differences between a freshman who enters the university and an engineer, the freshman does not know anything for obvious reasons. Those who have just graduated no longer remember anything about what they have studied. But graduated persons has changed their mind/"formas mentis" ... "

and, I feel to add: graduated guys has, surely, two more gears (like mental plasticity)

I end up saying "IT Engineer Bachelor Degree was one, of the 'Missions impossible', that I successfully achieved"

.... latter things, here it is, friends of mine endorsement with whom we studied various exams... He mentioned, some aspects, that rarely are noticed by almost persons.


<=============>

Trovo, da sempre, grande difficolta' nel pubblicare su internet, o sui social, informazioni e foto personali (se non in quantita' pediatrica).

In questa giornata e' doveroso fare una, piccola, eccezione.

Oggi, vent'anni fa esatti, mi laureavo:

Terminai le superiori con grossa difficolta', ed il giudizio di ammissione all'esame di stato (APPENDICE --> GIUDIZIO AMMISSIONE ESAME SUPERIORI), era meritato (in senso negativo). Tra l'altro si caldeggiava il mio inserimento nel mondo del lavoro (APPENDICE --> ESITO ESAMI SUPERIORI)

Ero, effettivamente, molto problematico (durante il periodo delle superiori)

Terminai le superiori, con le unghie e con i denti, perche' dentro me avevo il presentimento che la mia strada era di fare l'universita' (il dubbio era su quale)

Fu determinante, nella scelta dell'ateneo, l'allora professore d'informatica che, oltre ad essere amico di mio padre, ci accolse, nel suo ufficio per raccontarci di Ingegneria e della sua esperienza (essendo lui Ingegnere).

Dopo questo incontro ne rimasi folgorato ed ero oramai certo di quello che avrei voluto fare da grande.

Devo ringraziare tantissimo il professore di Informatica, i miei genitori che mi hanno sostenuto economicamente (ed in particolare mio padre che, anche se era di poche parole, ha sempre creduto in me), i tantissimi sacrifici da me fatti (ancor piu' necessari, piu' di altri studenti, per il fatto che avevo, alle superiori, studiato quasi niente) e, perche' no, un pizzico di fortuna (che nella vita serve sempre).

Non metto foto della laurea per i motivi indicati all'inizio ma indico quello che disse il "grande" professore di Analisi Matematica I e II Massimo Furi:

"...Non vi e' differenza tra una matricola che entra all'universita' e un ingegnere, la matricola non sa nulla per ovvi motivi. Chi si e' appena laureato non ricorda piu' niente di quello che ha studiato. Ma la persona laureata ha cambiato "formas mentis" ..."

ed aggiungo, ha due marce in piu' (come plasticita' mentale)

Finisco dicendo "IT Engineer Bachelor Degree was one, of the 'Missions impossibles', that I successfully achieved"

....dimenticavo, aggiungo l'endorsement di un mio amico con il quale abbiamo fatto vari esami insieme e, se non ricordo male, ci siamo laureati a pochi mesi di distanza... Ha centrato aspetti che ai piu' sfuggono, o sono sfuggiti, sul mio conto...



APPENDICE

GIUDIZIO AMMISSIONE ESAME SUPERIORI


ESITO ESAMI SUPERIORI