// Archives


This category contains 10 posts

Postini service end of life

Google announced last month that it’s shutting down it’s popular Postini email filtering service and forcing users to transition to Google Apps. Google will stop selling Postini services on December 31, 2012 and completely shut the service down by the end of 2013. Users that don’t want to switch to Google Apps will have few […]

Mac printing to a non-Postscript printer

I have to admit I am not a Mac expert. I am a PC guy but I have learned a few things about Mac’s over the years. One of which is that Mac’s like to use Postscript as the default emulation method for printing. Unfortunately, not all printers support Postscript out of the box. In […]

How to determine who is relaying mail through your Exchange server

Problem If you have relay access control properly configured, only authenticated users should be able to relay mail through your server. If you are still seeing messages being relayed, then it’s possible a user account has been compromised. This will allow you to see which users are relaying mail so you know which account has […]

Dissecting and removing the SHV5 rootkit

Yesterday I noticed some odd behavior on one of the Linux servers that I maintain. For one thing, every time I would run ‘top’ or ‘ps’, I would see the following message Unknown Hz value! (75) Assume 100 I decided to run rkhunter to check for rootkits. Needless to say, I was disappointed to discover […]

How to backup your MySQL databases to separate files

I wanted to dump all my MySQL databases using the mysqldump utility, but I wanted each database to be in a separate file. I couldn’t find a solution online, so I wrote my own script. Here it is: #!/bin/sh USERNAME=admin PASSWORD=topsecret BACKUPDIR=/var/local/mysql-backups for i in $(mysql -u $USERNAME -p$PASSWORD -e “SHOW DATABASES;” –skip-column-names –batch) do […]

Remove Personal Antivirus in 3 easy steps

What is Personal Antivirus? Personal Antivirus sounds like a wonderful program that might be good to have, right? Actually, it’s just one of an increasingly common type of malware called a rogue anti-virus or rogue anti-spyware program. It appears to be harmless or even beneficial on the surface, but it’s actual goal is to scare […]

Blackberry purgatory

Blackberries. You gotta love em. They’re great when they work but sometimes it’s a challenge to get them setup properly. I must have taken at least three phone calls on Friday from clients who needed help getting their Blackberries setup with their corporate email accounts. Two of them were using BES (Blackberry Enterprise Server) and […]

Synchronize files between multiple computers without breaking a sweat

If you have more than one computer that you use on a regular basis, it seems like the file you need is always on the other computer. Sure, you can use a flash drive but if that’s still too much work, you need Dropbox! I use it all the time to sync files between my […]

Free Online Backup…with a buddy.

One of the questions I get asked the most is “How do I backup my PC?” Of couse, there’s a million ways to backup data but few are easy, reliable, or cheap. This might be the answer to all three of those problems. All you need is a high-speed Internet connection, and a friend. http://www.cucku.com/

Virtualization is coming to a desktop near you

Everybody’s heard about server virtualization and what it can do to make your server room easier to manage. Now desktop virtualization is poised to become the next holy grail. Check out this video of Citrix’s new Xen Based Client Hypervisor. [youtube]http://www.youtube.com/watch?v=msyvpFqFl0I&feature=related[/youtube]