Turbo 5 Minute Binary Options Youtube - Doe Run Lodge

Part 2: Tools & Info for Sysadmins - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments or suggestions.
u/crispyducks
submitted by crispyducks to sysadmin [link] [comments]

Временно бесплатные курсы Udemy

Временно бесплатные курсы Udemy

https://preview.redd.it/se7zt100k9c31.jpg?width=700&format=pjpg&auto=webp&s=b7d9eb97754935764b044d2dd31900c6106efab5
Подборка временно бесплатных курсов Udemy.122 шт. Промокоды, вшиты в ссылки.Все курсы на английском.

  1. Agile Retrospective: Continuous Improvement + Kaizen Wth Scrum
  2. Artificial Intelligence Concepts - AI 101
  3. Build Interactive Apps Using VueJS, Vuex And VueRouter
  4. C Programming 2019
  5. CloverETL Data Integration
  6. Create A SHMUP With Unity 3D
  7. Google Cloud Platform Associate Cloud Engineer Practice Test
  8. How To Create Android Apps Without Coding Advance Course
  9. How to Install Linux Mint (Cinnamon) on a Virtual Machine
  10. How to Install Ubuntu Linux on a Virtual Machine
  11. How To Uv Unwrap Models In Blender
12. Introduction To SAS
13. iOS 12 Chat Application Like WhatsApp And Viber
14. iOS App Grocery List (Swift 3.1, iOS10.3) From 0 To AppStore
  1. iOS12 Animations, Learn Swift Animation With UIKit
16. iOS12 Bootcamp From Beginner To Professional iOS Developer
  1. JavaScript & LeetCode | The Ultimate Interview Bootcamp
  2. Learn Angular 8 By Creating A Simple Full Stack Web App
  3. Learn How To Make Trading Card Game Menus With Unity 3D
20. Learn React JS And Web API By Creating A Full Stack Web App
  1. Learn To Code Trading Card Game Battle System With Unity 3D
  2. Learn To Code With Python 3!
  3. Linux For Absolute Beginners!
  4. Linux Shell Terminal Command Basics
  5. Machine Learning iOS 11
  6. MapReduce Architecture For Big Data
  7. QuickChat 2.0 (WhatsApp Like Chat) iOS10 And Swift 3
  8. Random Forest Algorithm In Machine Learning
  9. Scrum Advanced: Software Development & Program Management
  10. Scrum Certification Prep + Scrum Master + Agile Scrum Training
  11. Simple And Advanced Topics Of Animating 2D Characters
  12. SSL Complete Guide: HTTP To HTTPS
  13. Start your own online store now for FREE
  14. Swift Weather (Meteorology) Application With REST API
  15. The Complete jQuery Course 2019: Build Real World Projects!
  16. Understanding On Google Charts
  17. User Stories For Agile Scrum + Product Owner + Business Analysis
  18. WP Plugin Development - Build Your Own Plugin!
  19. Double Your Office Productivity Using Google Apps
  20. How to become a much better & safer driver & avoid accidents
  21. Leadership Wisdom - Advanced Leadership Strategies
  22. Use your perfectionism to be more successful at work
  23. 3D Animation Film-Making With Plotagon: Ultra-Speed 2019 Design
  24. Blender Beginners Guide To 3D Modeling Game Asset Pipeline Design
  25. Citrix 1Y0-371 Designing Deploying Managing Citrix Exam IT & Software
  26. Complete Whiteboard Video Creation With VideoScribe: 2019 Design
  27. Create Lightning Fast Videos With InVideo: AI Video Making Design
  28. Learn Cinema 4D: Low Poly Tree Design
  29. Learn Illustrator CC: Create Simple Flat Vector Characters Design
  30. The Illustration Masterclass Design
  31. The Open Source Multimedia Masterclass Design
  32. Camtasia Studio 9: Become a Video Editing Guru With Camtasia
  33. 10 Copywriting Hacks That Work In 2019
  34. 10 Facebook Marketing Hacks That Work In 2019
  35. Certified Facebook Marketing 2019 (Complete Masterclass)
  36. Certified Network Marketer (Network Marketing & MLM Mastery)
  37. ClickBank Affiliate Marketing Secrets Home Business Success
  38. ClickBank Affiliate Marketing: NO Cost, No Website - Proven
  39. Competitor Analysis Tools For 2019: Part 1
  40. Digital Marketing Secrets For Beginners
  41. Email Blasting For Commissions [CPA & Affiliate Marketing]
  42. Email Marketing Mastery to Earn More & Build a Huge List
63. Facebook Ads 101. Complete Facebook Ads & Marketing Course
  1. Facebook Marketing: Advanced Targeting Strategies
  2. Facebook Marketing: How To Build A List With Lead Ads
  3. Facebook Marketing: How To Build A Targeted Email List
  4. Fraud Analytics Using R & Microsoft Excel
  5. Gamification: Use Gamification In Marketing
  6. Google Analytics For Beginners 2019
  7. Google Analytics For WordPress to Track Your Website Traffic
  8. Home Business: CPA Marketing From Scratch
  9. How To Get Your First 1,000 Facebook Fans: For Beginners
  10. How To Promote CPA Offers With Bing Ads
  11. Influencer Content Marketing: Killer Tactics For 2019
  12. Instagram Marketing Growth Tips [Influencer Shortcuts]
  13. Marketing Analytics Using R And Excel
  14. Master ClickFunnels & Create Sales Funnels Like a Boss
  15. Modern Social Media Marketing - Complete Certificate Course
  16. Powerpoint 4 Video Part A - Introduction + Character Animation
  17. Secrets Exposed: Find The Most Profitable Niches Of 2019
  18. Talking Robots: Artificial Intelligence Audiobook Creation
  19. The Complete Social Media Marketing Agency Masterclass
  20. VideoScribe: Whiteboard Animation From Zero To Hero
  21. VideoScribe Whiteboard Animation: Create Amazing Promo Video
  22. Viral Content Buzz - Killer Tactics For Blog Promotions
  23. YouTube Creator Tips [Grow A Channel-Get More Subs & Views]
  24. Youtube SEO Course: How TO Rank # 1 On YouTube In 2019
  25. YouTube Video Marketing For Domination: ViralNomics 2019
  26. Artificial Intelligence Music Creation & Remixing 2019
  27. STRUMMING SIMPLIFIED: 51 Guitar Rhythms For All Styles!
  28. Agile Project Management: Scrum Step By Step With Examples
  29. Amazon Dropship Mastery
  30. Amazon FBA Tycoon - The Ultimate Private Label Masterclass
  31. Artificial Intelligence And Predictive Analysis Using Python
  32. Binary Options Trading Ninja: The Bandit Strategy
  33. Bitcoin Valuation: Methods And Frameworks
  34. Business Education: Guide To Blockchain And Cryptocurrencies
  35. Certified Network Marketer (Network Marketing & MLM Mastery)
  36. ClickBank Affiliate Marketing Secrets Home Business Success
  37. Dropshipping With WordPress: Create A Dropship Business Fast
  38. eCommerce Business: Set Up Your Own Business From Home
  39. Entrepreneurship: Complete Guide To Business Model Creation
  40. Entrepreneurship Bootcamp: Create Work At Home Business
  41. Entrepreneurship Tips For Success
  42. Futures Trading Ninja: DIY Futures Trading Course (12 Hour)
  43. Gamification: Use Gamification In Marketing
  44. Home Business: CPA Marketing From Scratch
  45. How To Be Lucky In Business And Life
  46. Lean Six Sigma Applications In Information Technology
  47. Online Business: How I Make 5 Figure Passive Income on JVZoo
  48. Pandas With Python Tutorial
  49. Personal / Business Networking Skills For Maximum Success!
  50. Project Management: Deliver On Time + Scrum Project Delivery
  51. Scrum Master Training: Case Studies And Confessions
  52. Start Making Passive Income Online: The Complete Bundle
  53. The BeLive Studio2 Course For Live Broadcasters
  54. The Complete Personal Productivity Course - Business & Life
  55. Transformational Leadership - Ultimate Leadership Course
  56. Ultimate Time Management - BEST Time Management Course
  57. User Stories For Agile Scrum + Product Owner + Business Analysis
  58. Your Complete Guide To Agile, Scrum, Kanban
  59. Your Ultimate Blueprint To Sell Products Online


Источник: Телеграм-канал WScoupon
submitted by abbelrus to Pikabu [link] [comments]

Victoria’s Secret: Have the Angels Fallen from Grace? (Interesting article on how the Epstein saga has affected the VS Brand)

Link to article
Link to archive of article: (I recommend archiving every article you come across. I usually use www.archive.is because I find it more user-friendly than The Wayback Machine.)
TEXT OF ARTICLE
Victoria’s Secret: Have the Angels Fallen from Grace?
by Dimitar Ganev | Oct 2, 2019

Victoria’s Secret, the largest lingerie retailer in the US, has been one of the most iconic apparel brands since the 1990s, not least because its sexually charged imaging set the industry’s standard for decades and exerted a strong influence on body image norms. But since 2015, the shares of its parent company L Brands have been dropping as sales keep taking hits from shifting consumer tastes, executive turnovers and emerging competition.
The Victoria’s Secret brand, built on skinny girls and scantily clad lingerie, is now largely perceived as inadequate for a time when consumers’ preferences have moved away from sex appeal and towards empowerment, inclusiveness and comfort. To many, the brand’s traditional marketing strategy, which bets on fashion shows where supermodels walk in stiletto heels and angel wings, seems tone-deaf in the era of #MeToo, which condemns all forms of objectifying women and imposing hard-to-achieve beauty standards.
The Victoria’s Secret Angels, once considered symbols of sexiness, have now started to alienate consumers: a recent study found that 68% of them like the brand “less than they used to” and 60% feel that Victoria’s Secret is “forced” or “fake.” Demand for its products has cooled as up-and-coming rival brands have become more attractive by promoting themselves through unedited images featuring women of more diverse shapes and sizes. The retail giant reported that it will close 53 stores in North America this year, citing a “decline in performance.”
The brand itself admitted that it relied on hypersexualised imaging for far too long and it needs to rethink its identity. At L Brands‘ recent investor day, John Mehas, head of Victoria’s Secret Lingerie, asserted that the company needs to evolve and to reconnect with consumers by launching new products, hiring new executives and using new marketing strategies.
An essential part of the narrative shift would be a more diverse group of models, improving the merchandise, replacing the brand’s marketing chief and “rethinking” its annual Victoria’s Secret fashion show, the only fashion show regularly broadcast around the world, whose ratings keep falling. The brand hinted that network television would no longer be the “right fit” for the event, which has been criticised for being focused on empowering the models who walk in it instead of trying to relate to consumers.
Inclusivity, Diversity and Epstein
Many specialised fashion publications and business outlets embarked on questioning how the once-beloved brand managed to garner such a bad reputation. Analysing the media conversation around Victoria’s Secret in the top-tier English language publications from October 2018 to September 2019, we found that the most often discussed topics were body inclusivity, the company’s ties with Jeffrey Epstein and gender diversity:
The strongest coverage drivers for both the “Body inclusivity” and “LGBTQ+ diversity” topics were the comments which 71-year-old chief marketing officer Ed Razek made in a 2018 interview with Vogue that quickly went viral. Razek, who reportedly has final say over who’s in the televised fashion show, said that he didn’t think Victoria’s Secret‘s fashion event should include transgender or plus-size models because it is supposed to be “a fantasy”.
“Shouldn’t you have transsexuals in the show? No. No, I don’t think we should,” he said. “Well, why not? Because the show is a fantasy. It’s a 42-minute entertainment special. That’s what it is. It is the only one of its kind in the world, and any other fashion brand in the world would take it in a minute, including the competitors that are carping at us. And they carp at us because we’re the leader.”
The remarks prompted a strong backlash from consumers. As with the most severe social media crises, Victoria’s Secret was embroiled in an outrage cascade — outbursts of moral judgment which start to drive the conversation around brands, their products and their corporate messages. In these cases, the virality of moral judgements is facilitated by the fact that most of the content on social media feeds and timelines is sorted according to its likelihood to generate engagement.
The fact that fashion brands in particular face a growing number of crises could be explained by the supposition that fashion items are often taken to be markers of cultural and social identity, and thus are susceptible to be perceived as controversial across social networks. For instance, designers often draw inspiration from other cultures’ traditions, which has recently given rise to accusations of “cultural appropriation”.
Razek later used the company’s Twitter account to issue a formal apology, saying that his remark “came across as insensitive.”
In August 2019, Razek retired just days after the lingerie brand hired its first openly transgender model for its teen label PINK: Brazilian Valentina Sampaio. The hire was generally welcomed by commentators – for instance, Kendall Jenner, daughter of trans icon Caitlyn Jenner, posted “celebrate trans women” to her 98 million Instagram followers.
Meanwhile, media monitoring organisation GLAAD, which deals with lesbian, gay, bisexual and transgender issues, said Sampaio’s move comes as transgender people are becoming more visible in advertising. Examples of the trend include recent campaigns by Calvin Klein, Gap and H&M, while Playboy’s first transgender Playmate appeared in 2017.
Another strong coverage driver within the ‘Body inclusivity‘ topic was the protest outside Victoria’s Secret‘s store on Oxford Street in London, in which protesters stripped to their underwear and held signs demanding more diversity in fashion. To address such concerns, the latest investor meeting saw Victoria’s Secret deciding it will no longer rely on a small group of supermodels to promote its sexy lingerie, in a bid to use more inclusive marketing.
An example of this new strategy was an Instagram post of model Barbara Palvin, which was celebrated for being more body-inclusive, as social media users perceived Palvin to be curvier than the other supermodels. The post received over 780,000 likes in two days, generating 4.2 times the average number of likes, with users commenting that the model looks “normal” and “healthy”.
But the brand wasn’t that successful in managing another crisis: the widely publicised ties between L Brands founder Les Wexner and financier Jeffrey Epstein, an accused child sex trafficker who committed suicide in jail. Although Epstein didn’t actually work for Victoria’s Secret or L Brands, he had control over Wexner’s finances and personal life, according to reporting by The New York Times, and used his connections with Victoria’s Secret to facilitate his alleged crimes.
L Brands tried to distance itself from Epstein, saying it had cut ties with him nearly 12 years ago and disclosing that it had hired outside counsel to review the case. Wexner said: “Being taken advantage of by someone who was so sick, so cunning, so depraved, is something that I’m embarrassed that I was even close to. But that is in the past.”
In many media reports, the ‘Epstein ties‘ topic was closely related to the ‘Sexual harassment‘ topic, which was dominated by a petition urging Victoria’s Secret to take a stand against sexual harassment and violence. The open letter was addressed to Victoria’s Secret CEO John Mehas and signed by more than 100 models, many of whom have worked with the brand in the past, and also by the Model Alliance, an advocacy organisation in the fashion industry, and the Time’s Up movement against sexual harassment which was founded in response to the Weinstein effect and #MeToo.
The petition cited “numerous allegations of sexual assault, alleged rape, and sex trafficking of models and aspiring models”. Several of the company’s photographers have been accused of misconduct, on top of the links with Jeffrey Epstein. A Victoria’s Secret spokesperson said the firm has been in conversations with the Model Alliance “for some time”: “We are always concerned about the welfare of our models and want to continue to have dialogue with the Model Alliance and others to accomplish meaningful progress in the industry.”
Crisis mode
Ed Razek‘s aforementioned controversial comments regarding transgender and plus-size models made him the most often quoted spokesperson in the discussion around Victoria’s Secret:
Razek’s dominance in the conversation underlined the crisis of perception the brand suffers: his remarks were taken by many media outlets as a sign that the brand is unwilling to adapt to the current sociocultural climate. Models who have previously worked with the brand and who had a relatively large share of voice in the media conversation were quick to criticise him. For example. Karlie Kloss and Lily Aldridge posted a photo reading “Trans and GNC [gender non-conforming] people are not a debate” to their Instagram stories.
Karlie Kloss was one of the most vocal critics: she recently told Vogue that she had decided to terminate her relationship with Victoria’s Secret because the image was not “truly reflective” of who she was and the “kind of message I want to send to young women around the world about what it means to be beautiful.” Model Tess Holliday was harsher, leaving a message to Razek on Twitter following his Vogue interview: “Who needs VS anyway? They never supported plus ladies & now they are trying to dis my trans sisters? Hell nah. Kiss my fat ass, [Victoria’s Secret].”
The majority of media reports on Razek’s retirement announcement cited these remarks as one of the key points in his career and highlighted that he was one of the main figures in the highly sexualised beauty ideal put forth by the brand. The crisis of perception was also emphasised by the fact that L Brands CEO Les Wexner, another major corporate spokesperson in the conversation, was quoted primarily in relation to the Epstein scandal.
However, some of the spokespeople portrayed Victoria’s Secret in a positive light. Adriana Lima, one of the best-known Angels, quit the label after two decades and 18 fashion shows with the brand, sharing the news on Instagram with a heartfelt caption: “Dear Victoria, Thank you for showing me the world, sharing your secrets, and most importantly not just giving me wings but teaching me to fly.”
And while she presented the brand positively, some media publications reminded their readers of a an interview she gave to Grazia in 2011 in which she outlined the physical challenges she went through in order to be in shape, especially after her pregnancy.
Angel Behati Prinsloo tried to defend the Victoria’s Secret Fashion Show against the criticism for its lack of transgender models and diverse body types. In an interview with Elle, she explained what the show stands for: ‘There’s a lot of talk about everything but I think people need to also understand that it’s a show. It’s not saying negative or positive about any body type, it’s ‘this is who they are’.”
In the meantime, Barbara Palvin was named as a Victoria’s Secret Angel after the successful Instagram post which customers perceived to be more body-inclusive. She announced the news to fans also via Instagram and her hire was generally interpreted by the media as a sign that the label is finally starting to listen to its critics.
CEO John Mehas‘ comments about the brand’s marketing shift were met with similar enthusiasm, especially his plans to include messaging that responds to the #MeToo movement. But the most warmly welcomed move was the hire of Valentina Sampaio: although some publications suggested that the brand’s first openly transgender model came too late, most commentators said that the retailer has finally moved in the right direction.
Lingerie wars
While Victoria’s Secret is caught up in a fierce discussion, L Brands‘ other flagship label, Bath & Body Works, a personal-goods retailer, continues to report strong earnings, supporting its struggling parent. Many reports on Victoria’s Secret‘s controversial reputation outlined this development, making Bath & Body Works the most frequently mentioned brand in the conversation:
While L Brands is firmly focused on the Victoria’s Secret turnaround story, Bath & Body Work is perceived as staying relevant with updated stores and new product tests, maintaining a wholesome image as “America’s sweetheart of beauty brands.” Its loyal core consumer base of millennial women is boosted by fan blogs and YouTube accounts dedicated to sharing new products. The brand also plans to ramp up volume by having a digital makeover for the first time in India.
Investors have even started pressuring L Brands to make Bath & Body Works a standalone company which would not be associated with Victoria’s Secret. Hedge fund Barington Capital, whose CEO James A. Mitarotonda was one of the few corporate spokespeople in the conversation, sent a lengthy letter to L Brands CEO Les Wexner arguing for a spinoff.
But after Bath & Body Works posted its first unchanged quarter of store traffic in five years during 2019’s second quarter, Jefferies analyst Randal Konik suggested that the best days for the bath and candle retailer may be over. Konik also said that the teen brand PINK is the next sore spot for L Brands, with sales falling by low double digits in the fourth quarter, as the label is “without fans and rudderless.”
ThirdLove, American Eagle Outfitters and Savage X Fenty were identified as the main competitors which have capitalised on Victoria’s Secret’s reputational struggles. ThirdLove, an online bra startup which was launched in 2013, was perceived as coming head to head with Victoria’s Secret as it focuses on inclusive sizing and marketing, which have helped its annual sales to grow at a rate of 180% for the past four years.
The brand opened its first pop-up store in New York in July 2019, putting itself in direct competition with Victoria’s Secret as the lingerie giant had a store less than a 10 minutes’ walk away. ThirdLove also joined the discussion around Razek’s comments, taking out a full-page ad in The New York Times, in which co-founder and co-CEO Heidi Zak said she was appalled when she read them: “I’ve read and re-read the interview at least 20 times, and each time I read it I’m even angrier. How in 2018 can the CMO of any public company — let alone one that claims to be for women — make such shocking, derogatory statements?”
When asked whether Victoria’s Secret was worried its customers might now be looking for something different, Razek mentioned ThirdLove: “We’re nobody’s ThirdLove,” Razek said. “We’re their first love. And Victoria’s Secret has been women’s first love from the beginning.”
American Eagle Outfitters was also viewed as one of the main companies to break Victoria’s Secret‘s grip on the apparel industry by offering fitting bras and using messaging which pitches inclusiveness and comfort over sex appeal. Its activewear and lingerie brand Aerie has built an image of an “anti-Victoria’s Secret” label with untouched ads featuring models of all shapes and sizes. Kyle Andrew, American Eagle’s CMO, said the company’s success is due to its willingness to experiment and find ways to better listen to its teen customer base.
Rihanna’s Savage X Fenty recent show, streamed on Amazon Prime, has been making headlines everywhere, with commentators saying it was everything that Victoria’s Secret’s annual runway show wishes it could be by featuring models of all shapes, sizes, and ethnic backgrounds, with a clear focus on body inclusivity and acceptance.
Meanwhile, retail corporation Target also tried to capitalise on Victoria’s Secret’s struggles with a strategy similar to ThirdLove, American Eagle Outfitters and Savage X Fenty: it launched a new bra and underwear brand called Auden with a campaign featuring women “in all different shapes and sizes.”
Nike was mentioned as one of the brands which have gotten ahead of the curve with their socially-conscious marketing efforts featuring ex-NFL quarterback Colin Kaepernick, who had participated in racial justice demonstrations during national anthem ceremonies. Fast-fashion brand H&M got involved in the discussion for selling a $199 bra similar to Victoria’s Secret’s $1 million Fantasy Bra as part of its collaboration with Moschino.
Victoria’s Secret‘s reputational woos come at a time when the fashion and apparel industries occupy a central place in the extensively covered #MeToo movement and play a major role in ongoing media discussions around gender and identity. Since such issues naturally polarise consumers, brands which are dealing with products directly related to them are regularly caught up in fierce debates.
The growing importance of the debates around gender in the fashion industry has also been highlighted in the accelerating gender-neutral trend. The latest seasons have seen luxury brands like Gucci, Saint Laurent and Haider Ackerman combining menswear and womenswear runway shows, Others, such as Proenza Schouler and Rodarte, have started showing women’s pre-collections or women’s ready-to-wear during the back-to-back menswear and couture calendar. Meanwhile, fast-fashion labels such as Zara started releasing ungendered collections with models of both sexes dressed in the same clothes.
There are also a growing number of new brands like the Phluid Project, Agender and Rebrand which are built around the concept of non-binary dressing. Beyond fashion houses, the trend has also been recently reinforced by the Council of Fashion Designers of America (CFDA), which added a unisex/non-binary option for New York Fashion Week. Spokespeople for the CFDA explained that this decision came as a response to “a growing number of designers whose collections are not delineated by gender”, which “reflects the cultural momentum.”
submitted by ALiddleBiddle to Epstein [link] [comments]

Week 48; Experts in authoritarianism advise to keep a list of things subtly changing around you, so you’ll remember.

The humanitarian crisis in Puerto Rico worsened with the inadequate response by the federal government. Amid criticism, Trump threatened to pull out, but later backed off. Although the death count officially stands at 45, reporting revealed possibly hundreds more preventable deaths related to the Hurricane Maria.
Trump remains silent on both California’s deadliest wildfires and the deadliest combat incident since he took office. He continues to focus on undoing Obama’s legacy, piece-by-piece. The Mueller investigation hit Trump’s inner-circle, and social media’s role in aiding Russia continues to unfold.
  1. On Saturday night, Richard Spencer led another white supremacist torch-lit rally at University of Virginia. The rally lasted 10 minutes and 40-50 people attended. Spencer vowed, “we will keep coming back.”
  2. On Sunday, Trump attacked former ally Sen. Bob Corker in a series of incendiary tweets, saying “Corker “begged” me to endorse him for re-election” and “wanted to be Secretary of State.” Trump claimed to have said no to both.
  3. Corker responded, tweeting it’s a shame the WH has become an “adult day care center,” and that someone “missed their shift this morning.”
  4. On Sunday, Pence left a Colts game after a protest during the national anthem. Pence later issued a full statement opposing the protests. The Colts were playing the 49ers, a team known to protest.
  5. Before the game, Pence tweeted a photo of him and the Second Lady wearing Colts gear. The photo was one he originally tweeted in 2014.
  6. Shortly after, Trump tweeted he had asked Pence to leave the game “if any players kneeled,” and said he was proud of Pence and the Second Lady.
  7. The pool of journalists covering Pence were not allowed into the stadium, and were told, “there may be an early departure from the game.” ABC estimated Pence’s flight cost taxpayers nearly $250k.
  8. Bowing to pressure from Trump, the Cowboys’ Jerry Jones, after kneeling with players in week 3 of the season, changed course saying any player who “disrespects the flag” by kneeling will not be allowed to play.
  9. On Tuesday, Trump threatened the NFL over protests saying the league is “getting massive tax breaks” and the law should be changed. This claim is false: the NFL gave up its 501(c)(6) tax-exempt status in 2015.
  10. On Tuesday, bowing to pressure from Trump and fans, NFL Commissioner Roger Goodell, who previously had said players had the right to voice their opinions, sided with owners opposed to letting players demonstrate.
  11. On Monday, Pence headlined a fundraiser in CA for Republicans including controversial, Kremlin-ally Rep. Dana Rohrabacher. Rohrabacher had a previously undisclosed meeting in Russia with Veselnitskaya described in Week 47.
  12. University of Wisconsin approved a policy which calls for suspending or expelling students who disrupt campus speeches and presentations. The policy mirrors Republican legislation passed by the state Assembly.
  13. On Columbus Day, unlike Obama, Trump celebrated the “arrival of Europeans,” but did not mention of the suffering of Native Americans.
  14. On Sunday, the Trump’s DHS allowed the Jones Act waiver, which helped speed relief to Puerto Rico, to expire. No explanation was given.
  15. Trump’s EPA announced it would repeal the Clean Power Plan, Obama’s signature policy to curb greenhouse gas emissions from power plants. The statement described the regulation as the “so-called Clean Power Plan.”
  16. On Friday, Trump addressed the Value Voters Summit hosted by the Family Research Council, which has been classified by SPLC as an anti-gay hate group. Trump is the first US leader to address the group.
  17. Reuters reported the Trump regime has been quietly cutting support for halfway houses for federal prisoners, severing contracts with as many as 16 facilities, necessitating some inmates stay behind bars longer.
  18. ABC reported the Treasury Dept’s inspector general is looking into allegations reported by BuzzFeed in Week 47 that agency officials have been illegally looking at private financial records of US citizens.
  19. A report compiled by the Government Accountability Office (GAO) at House and Senate Democrats’ request, found the Trump transition team ignored ethics officials and refused to cooperate with the GAO.
  20. Trump named Kathleen Hartnett White to the WH’s Council on Environmental Quality. Hartnett White, a climate science denier, once also said, “fossil fuels dissolved the economic justification for slavery.”
  21. In response to a filing by CREW, Trump’s DOJ told a court in DC that Trump can destroy records without judicial review, including tweets.
  22. Brian Brooks became the second candidate under consideration for deputy Treasury Secretary to withdraw from consideration. Mnuchin said he has no plans to fill the number two slot in his agency.
  23. WAPO reported at the Interior Dept, when Zinke enters the building a staffer takes the elevator to the seventh floor, climbs the stairs to the roof and puts up a special flag. The flag comes down when he leaves.
  24. On Wednesday, NBC reported Tillerson calling Trump a “moron” was provoked by Trump suggesting a tenfold increase in the US nuclear arsenal during a July 20 meeting with the high-ranking national security leaders.
  25. In response to the story which he called “Fake News,” Trump tweeted a threat to revoke the broadcasting licenses of “NBC and the Networks.”
  26. Later that afternoon, at a news conference, Trump again lashed out at the independent news media saying it’s “frankly disgusting the press is able to write whatever it wants to write.”
  27. In a statement Wednesday night, Republican Sen. Ben Sasse asked Trump if he was “recanting” his oath to protect the First Amendment.
  28. Indiana Republican lawmaker Jim Lucas drafted a bill that would require professional journalists to be licensed by state police.
  29. Under pressure to confirm Trump’s judicial nominees, McConnell will no longer allow “blue slips,” used by senators to deny a nominee from their state a Senate Judiciary Committee hearing and vote on confirmation.
  30. The Trump regime withdrew from United Nations Educational, Scientific and Cultural Organization (UNESCO), citing anti-Israel bias and a being in arrears on a $550 million payment. Israel remains part of UNESCO.
  31. NYT published an interview with Corker in which he said Trump is treating his office like a “reality show” with reckless threats at other country that could put our country “on the path to World War III.”
  32. Corker said he is concerned about Trump, and Trump’s behavior should concern “anyone who cares about our nation.” He added there is no ‘good cop, bad cop’ underway with Tillerson — Trump is undermining diplomacy.
  33. Corker said nearly all Senate Republican share his concerns: “the vast majority of our caucus understands what we’re dealing with here.”
  34. WAPO reported Trump is frustrated by his cabinet and that he is not getting enough credit for his handling of three hurricanes. Trump is lashing out and rupturing alliances with both Republicans and Democrats.
  35. One confidant said Trump is like a whistling teapot, saying when he does not blow off steam, he can turn into a pressure cooker and explode: “I think we are in pressure cooker territory.”
  36. Politico quoted 10 sources current and former WH aides who employed strategies like delays and distractions as “guardrails” in trying to manage Trump’s impulsivity.
  37. Vanity Fair reported sources say Trump is “unstable,” “losing a step,” and “unraveling.” They say the WH is in crisis as advisers struggle to contain Trump who is increasingly unfocused and consumed by dark moods.
  38. Trump allegedly told his former bodyguard Schiller, “I hate everyone in the White House!” Kelly is allegedly miserable in the job, and is staying on in a sense of duty and to keep Trump from making disastrous decisions.
  39. One former official speculated Kelly and Mattis have discussed what they would do if Trump ordered a nuclear strike — “would they tackle him?”
  40. According to sources, Bannon said the risk to Trump’s presidency wasn’t impeachment, but the 25th Amendment. Bannon thinks Trump has only a 30% chance of making it the full term.
  41. In a column “What Bob Corker Sees in Trump,” conservative columnist Peggy Noonan urged Republicans they have a duty to speak on the record about what they see happening with Trump.
  42. On Thursday, at a signing ceremony for his health care executive order, Trump nearly walked out of the room without signing the order. Pence pulled him back in.
  43. On Tuesday, Trump said in an interview with Forbes that he could beat Tillerson in an IQ test. Trump met with Tillerson later that day at the WH.
  44. On Friday, Corker called out Trump for his effort to disempower Tillerson saying: “You cannot publicly castrate your own secretary of state without giving yourself that binary choice.”
  45. CNN’s Fareed Zakaria said, “It’s very clear now that we essentially have no diplomacy going on in the United States,” adding the way Trump has treated Tillerson is “the most dramatic example of it.”
  46. On CBS’s 60 Minutes, Parscale claimed he fine-tuned ads on Facebook to directly reach voters with the exact messages they cared most about. He also claimed he handpicked Republican Facebook employees to help.
  47. Daily Beast reported the Kremlin recruited two black video bloggers, Williams and Kalvin Johnson, to produce incendiary YouTube videos calling Hillary a racist. The videos were spread on social media platforms.
  48. WAPO reported Google has uncovered evidence about $100k of ads purchased by Russian agents to spread disinformation on across the company’s many products, including YouTube, during the 2016 election.
  49. Google said the ads do not appear to be from the same Kremlin-linked troll farm that bought ads on Facebook. Some ads touted Trump, Bernie Sanders, and Jill Stein, while others aimed to fan the flames of divisive issues.
  50. Rep. Devin Nunes, who recused himself as Chair of the House Intel Committee’s Russia probe, unilaterally signed off on subpoenas to Fusion GPS, the research firm that produced the Steele dossier. Democrats were not consulted.
  51. Reuters reported Chuck Grassley, the Republican chair of the Senate Judiciary Committee, is also taking steps to discredit the dossier according to Democrats on the committee.
  52. Carter Page told the Senate Intel Committee that he will not cooperate with any requests to appear before the panel on Russia, and will plead the Fifth.
  53. Daily Beast reported the House Permanent Select Committee on Intelligence is looking at Cambridge Analytica’s work from the Trump campaign as part of its Russian probe.
  54. Cambridge Analytica, which has ownership ties to the Mercers and Bannon, was brought in to help the campaign by Kushner. The company is also under investigation in the UK watchdog for its role in Brexit.
  55. NYT reported Israel caught Kaspersky Lab working with the Russian government to search the world for US secrets, using Kaspersky software to scan for classified words. Kaspersky software is used by 400 million people.
  56. WSJ reported that Russia’s use of the Kaspersky program to spy on the US is broader and more pervasive than the operation against one individual in Week 47. Trump continues to deny Russian meddling in the US election.
  57. Politico reported as part their posture to cooperate, Trump’s attorneys may offer Mueller a meeting with Trump. If Mueller doesn’t ask by Thanksgiving, attorneys may force the issue by volunteering his time.
  58. Legal experts were surprised by Trump’s lawyers strategy noting Trump would be speaking under oath and he routinely distorts facts, and that Trump would be interviewed in connection with a criminal investigation.
  59. CNN reported Russian operatives used YouTube, Tumblr, and even Pokémon Go as part of their effort to interfere in the election, using a campaign titled “Don’t Shoot Us” to spread a divisive message.
  60. NBC reported Manafort had a previously undisclosed $26 million loan from Deripaska through a series of transactions. It is unclear if the $26 million is a loan or an indirect payment from the Russian oligarch.
  61. The loan brings the total financial relationship between Manafort and Deripaska to $60 million over the past decade, according to financial documents filed in Cyprus and the Cayman Islands.
  62. Manafort’s spokesman, Jason Maloni, initially responded to NBC with a statement including: “Mr. Manafort is not indebted to former clients today, nor was he at the time he began working for the Trump campaign.”
  63. Maloni’s statement was later revised and that sentence was removed. Both Manafort and Maloni have received subpoenas to supply documents and testimony in the Mueller probe.
  64. Yahoo reported Andrew Feinberg, former correspondent for Sputnik, provided a guide and emails to FBI investigators looking into possible violations of the law which requires agents of foreign nations to register with the DOJ.
  65. Further, the Senate Select Committee on Intelligence is investigating RT and Sputnik as possible parts of the Russian state-run propaganda machine in the broader probe into Russia’s election meddling.
  66. On Friday, Mueller’s team interviewed Trump’s former chief of staff, Priebus. Priebus’ lawyer said he voluntarily met with investigators and “was happy to answer all of their questions.”
  67. Priebus was present during Trump’s efforts to limit the Russia probe, and for discussions that led to the firing of Comey. He was also asked to leave the Oval Office before the infamous Trump-Comey conversation.
  68. Politico reported Twitter deleted tweets and other user data of potentially irreplaceable value to investigators in the Russia probe.
  69. Federal investigators believe Twitter was one of Russia’s most potent weapons. Bots and fake accounts launched recurring waves of pro-Trump, anti-Clinton story lines that were either false or greatly exaggerated.
  70. AP reported Twitter has turned over 201 accounts linked to Russian attempts at influencing the 2016 election to Senate investigators. It is unclear if the posts associated with these accounts have been deleted.
  71. CNN reported an attorney for Roger Stone said he has complied with the House Intel Committee request to provide the identity of his intermediary to WikiLeaks’ Assange.
  72. WSJ reported Congressional investigators are homing in on connections between the Trump campaign, and Facebook, and Twitter. Digital director Parscale was paid $88 million during the campaign, the highest paid vendor.
  73. Every vendor that worked with Parscale on the Trump campaign signed a nondisclosure agreement, and there are no federal disclosure requirements for online ads.
  74. Both Congress and Mueller are investigating the role activity on Facebook and Twitter played in the 2016 election, and whether the Russian social-media activity was in any connected to the Trump campaign.
  75. A Morning Consult poll found Trump’s approval has fallen in every state since he took office. The swings were as high as 30 percentage points in blue-states IL and CA, to 11 points in red-state LA.
  76. A Reuters/Ipsos poll found Trump’s popularity is eroding in small towns and rural communities: in September 47 approve/47 disapprove, down from 55/39 in his first four weeks in office.
  77. WAPO reported as of October 10, Trump’s first 263 days in office, he has made 1,318 false or misleading claims.
  78. The Brookings Institute released a 108-page report which concluded Trump “likely obstructed justice” in his firing of Comey. If Mueller agrees, there are legitimate articles of impeachment that could be drawn up.
  79. In a letter to Mattis, over 100 Democrats are demanding proof that Trump did indeed consult with the Pentagon as he claimed in a tweet, prior to announcing his ban of transgender individuals from military service.
  80. A Kaiser Foundation poll found 62% of Americans say Puerto Ricans aren’t getting the help they need. 76% were aware Puerto Ricans are US citizens.
  81. On Thursday, in a series of tweets, Trump threatened to abandon Puerto Rico’s recovery effort, blaming the island for its infrastructure problems and saying and relief workers would not stay “in P.R. forever.”
  82. The tweets follow harsh criticism from Puerto Rico of the Trump regime’s response to Hurricane Maria. One Puerto Rican said, “He doesn’t think of us as Americans.”
  83. Trump also quoted a Sharyl Attkisson, a television journalist with Sinclair Broadcasting, in saying that while Puerto Rico survived Hurricane Maria, now “a financial crisis looms largely of their own making.”
  84. Later Thursday, the WH issued a statement committing “the full force of the U.S. government” for now, but adding “successful recoveries do not last forever.”
  85. At a House Energy and Commerce hearing about efforts to rebuild the island’s energy grid, Sec. Rick Perry referred to Puerto Rico as a country.
  86. Next day, Trump referred to the Virgin Islands’ governor as a president.
  87. VOX reported although the official death count in Puerto Rico is 45, they found 81 death linked to Hurricane Maria, as well as 450 more reported deaths, most of causes still unknown, and 69 still missing.
  88. Puerto Rico’s governor said four deaths are being investigated as cases of leptospirosis, a disease spread by animals’ urine through contaminated water. A total of ten people have come down with the disease.
  89. Rachel Maddow reported a doctor resigned from the disaster response team in Puerto Rico after seeing medical workers getting manicures and pedicures from residents of the island in medical triage tents.
  90. NYT reported on Puerto Rico’s health care is in dire condition, and continues to suffer from mismanagement. The US Comfort ship with 800 medical personnel which can serve 250, has seen 82 patients in six days.
  91. CNN reported Puerto Ricans are drinking water from a hazardous-waste site, having no other options for water.
  92. A Politico/Morning Consult poll found just 32% of registered voters think the federal government has done enough to help Puerto Rico.
  93. Bloomberg revealed one of its reporters was inadvertently put on the Pentagon’s internal email list which detailed how to spin Hurricane Maria to convince the public that the government response was going well.
  94. On Thursday, Trump also signed an executive order ending Obamacare subsidies for the poor. Not paying the subsidies could boost premiums for millions and send the health insurance exchanges into turmoil.
  95. NPR estimated consumers who earn 400% of the federal poverty level — $48k for individuals or $98.4k for a family of four — will see their the cost of their plans rise by, on average, 20% nationwide.
  96. Doctors, hospitals, insurers, state insurance commissioners and patient advocates denounced Trump’s move. Trump actions puts pressure on Congress to protect consumers from soaring premiums.
  97. WSJ reported if Congress doesn’t succeed, WH aides said Trump “will claim victory” for ending the Iran deal, cutting billions in payments to health insurers, and deporting hundreds of thousands of immigrants.
  98. On Friday, a coalition of attorneys general from 18 states and DC filed a lawsuit to block Trump’s halt to subsidy payments under Obamacare.
  99. NYT reported as of Friday, Trump has taken 12 actions which could weaken Obamacare and curtail enrollment, including spreading negative news releases and posting infographics criticizing the health law.
  100. On Saturday, Trump boasted on Twitter that health insurance companies’ stocks “plunged yesterday” after his steps to dismantle Obamacare.
  101. A Kaiser Health poll found 71% of Americans say the Trump regime should work to improve Obamacare, while just 21% say make it fail.
  102. On Friday, Trump slammed Iran as a “menace” and called for “decertification” of the nuclear deal, Joint Comprehensive Plan of Action (JCPoA), saying Iran is “not living up to the spirit of the deal.”
  103. Trump sent the deal back to Congress with a 60-day window to address its “many serious flaws” or see it “terminated.”
  104. Top officials on Trump’s national security team, including Mattis and Tillerson, said Iran has technically complied with its restrictions. The International Atomic Energy Association also confirmed compliance.
  105. Daily Beast reported while McMaster also wanted to save the Iran Deal, Trump consulted Fox News’ Sean Hannity and former UN Ambassador John Bolton, two neoconservatives who pushed for decertification.
  106. The leaders of Britain, Germany and France declared their commitment to stand by JCPoA. They deal was the culmination of 16 years of diplomacy.
  107. After being added to Trump’s travel ban, Chad pulled its troops from the fight against Boko Haram in Niger. US officials had warned Trump his decision would have major consequences for the fight against terrorism.
  108. California’s deadliest wildfires charred more than 221,754 acres of land in Northern CA, and left at least 35 dead and hundreds more missing. Trump has yet to publicly comment or tweet about the wildfires.
  109. Nor has Trump publicly commented on the deadliest combat incident since he took office, which took place in Niger last Saturday while Trump was golfing. The ambush by ISIS left four soldiers dead and two wounded.
  110. As the week ended, 24 days after Hurricane Maria, just 64% of Puerto Ricans had access to drinking water, and only 14.6% had electricity.
  111. Trump spent his fourth weekend since Hurricane Maria golfing. On Saturday, he visited Trump National Golf Club in VA, his 72nd day of golf since taking office.
submitted by 1000000students to TheConstitution [link] [comments]

Tools & Info for MSPs #2 - Mega List of Tips, Tools, Books, Blogs & More

(continued from part #1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
Fyi - I've set up a subreddit /itprotuesday, where we feature / encourage posts of some additional tools, tips etc. throughout the week. Pop over and subscribe if you’re interested.
submitted by crispyducks to msp [link] [comments]

IT Pro Tuesday #64 (part 2) - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Captura is a flexible tool for capturing your screen, audio, cursor, mouse clicks and keystrokes. Features include mixing audio recorded from microphone and speaker output, command-line interface, and configurable hotkeys. Thanks to jantari for the recommedation.
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
submitted by crispyducks to ITProTuesday [link] [comments]

Binary Boom Review 2015 - Is Binary Boom SCAM? So How Does Binary Boom Software Work?? Binary Boom By Dennis Anker Review

Binary Boom Review 2015 - WHAT THE HECK IS A BOOM? Learn the Insider Details about Binary Boom in this Binary Boom review! So What is Binary Boom Software all about? So Does Binary Boom Actually Work? Is Binary Boom Software scam or does it really work?
To find answers to these concerns continue reading my in depth and honest Binary Boom Review below.
Binary Boom Description:
Name: Binary Boom
Niche: Binary Options.
Official Web site: Activate The NEW Binary Boom Software!! CLICK HERE NOW!!!
What is Binary Boom?
Binary Boom is basically a binary options trading software application that is developed to assistance traders win and predict the market trends with binary options. The software likewise offers evaluations of the market conditions so that traders can know exactly what should be your next step. It provides different secret techniques that ultimately assists. traders without using any complicated trading indicators or follow graphs.
Binary Boom Binary Options Trading Strategy
Base the Binary Boom trading technique. After you see it working, you can start to execute your method with regular sized lots. This technique will pay off with time. Every Forex binary options trader should select an account type that is in accordance with their needs and expectations. A bigger account does not imply a bigger profit potential so it is a great concept to begin little and slowly add to your account as your returns increase based on the trading selections you make.
Binary Options Trading
To assist you trade binary options effectively, it is very important to have an understanding behind the principles of Binary Options Trading. Currency Trading, or foreign exchange, is based upon the perceived value of. 2 currencies relative to one another, and is affected by the political stability of the country, inflation and interest rates to name a few things. Keep this in mind as you trade and discover more about binary options to optimize your learning experience.
Are the trades on the Binary Boom website actually live and occurring today this very second"? Is exactly what I'm seeing the REAL live price of the currency pairs?
Yes, trades are genuine. And yes, you see the REAL TIME rate of each currency pair traded.
Exactly what you're seeing are genuine trades that Binary Boom is placing right now in my Binary Options brokerage account, as they're being traded.
The entry and expiry prices and times are all accurate and precise.
The only thing they delay on the site is whether the trade is a CALL or a PUT ... and I do that for only 20 seconds.
Click Here And Watch This Video And Learn Why The Trades Are LIVE
Why does binary boom delay this information?
So People can not copy trades straight from the Binary Boom website, and because a 20 second delay is fair: on the one hand, They as much better results due to the fact that these are 60 second Binary options trades and rate can still change throughout the last 40 seconds.
On the other hand, anyone attempting to copy trades straight from the Binary Boom website won't get the real outcomes of Binary Boom as they'll be copying trades that are 20 seconds old.
Why are they delaying whether a trade is a CALL or a PUT by 20 seconds?
So people can't copy trades straight from the Binary Boom website. So dennis anker decided that a 20 second delay was fair because it prevents manually copying the trades, but it doesn't enable enough time to falsify the results you see with any degree of consistency. That's a win win situation - I can be sure that no one is copying trades from the Binary Boom site and you can be sure that the outcomes are genuine.
Is it possible for you to control the published outcomes by concealing the CALL/ PUT status for 20 seconds?
No, it's IMPOSSIBLE. Here's why:
BinaryBoom places 60 second Binary options trades. This is very important because when binary boom spots a trend it will place multiple trades for maximum profits!
If you're streaming existing market prices, it's difficult to know which rate will be 60 seconds from now. It's likewise impossible to understand which rate will certainly be 40 seconds from now.
Simply puts, the preliminary 20 seconds of each trade offers dennis anker NO benefit in knowing where rate will certainly be when a 60 second Binary Options trade expires.
Do not believe me? try it yourself!
Do the following:
Go to ANY broker, select any currency pair, then try speculating if cost will be above or below the existing market price after 40 seconds.
Wait 40 seconds.
Do that 10 times.
I ENSURE you will not be right more than 3 4 times!
The ONLY reason dennis postpone revealing the CALL/ PUT condition of a trade is merely to prevent people copying trades straight from the web site.
Is it safe to download the BinaryBoom software?
Yes, downloading is 100% safe for 2 factors.
First, binary boom is a Microsoft Verified Publisher.
That indicates dennis has given a special "certification" that confirms the validity of the binary boom software, that it does not contain a virus, malware, and so on, that it's 100 % clean and hasn't been tampered with in any way.
It's really HARD to get this kind of certification, but means that software publishers who do are the most reliable on the web.
The "certification" is embedded in the binary boom application and recognized by Windows, so you can verify that binary boom is a Microsoft Verified Publisher merely looking for this when installing BinaryBoom:
KEEP IN MIND: NEVER set up software application that doesn't show the name of the business in the Verified Publisher field.
Second, BinaryBoom has close to 7,000 ACTIVE happy users.
What The Heck Is Boom? A boom is when a currency pair has started to trend, That is the reason binary boom is so profitable it place's trades within a trend!
Binary Boom Summary
In summary, there are some obvious concepts that have actually been tested in time, as well as some newer strategies. that you may not have actually thought about. Hopefully, as long as you follow exactly what we suggest in this article you can either get started with trading with Binary Boom or enhance on exactly what you have already done.
Click Here To Claim Your Binary Boom LIFETIME User License!!
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Are You Looking For A Binary Boom Alternative?? CLICK HERE NOW!
Tags: Binary Boom app, Binary Boom information, Binary Boom url, Binary Boom website, Binary Boom trading software, get Binary Boom, article about Binary Boom, Binary Boom computer program Binary Boom support, Binary Boom support email address, Binary Boom help desk, similar than Binary Boom, better than Binary Boom, Binary Boom contact, Binary Boom demo, Binary Boom video tutorial, how does Binary Boom work, is Binary Boom the best online is Binary Boom a scam, does Binary Boom really work, does Binary Boom actually work, Binary Boom members area, Binary Boom login page, Binary Boom verification, Binary Boom software reviews, Binary Boom no fake review, Binary Boom Live Broadcast, is Binary Boom real, Binary Boom forex trading, Binary Boom binary options trading, Binary Boom automated app, the Binary Boom review, Binary Boom signals, Binary Boom mac os x, Binary Boom broker sign up, Binary Boom free download, reviews of Binary Boom, Binary Boom bonus, Binary Boom honest review, Binary Boom 2015, is Binary Boom worth the risk, Binary Boom pc desktop, Binary Boom free trial, Binary Boom testimonial, Binary Boom warrior forum, Binary Boom web version, Binary Boom open a account, Binary Boom laptop, Binary Boom revised Method 2015, Binary Boom discount, Binary Boom youtube, seriously will Binary Boom work, Binary Boom facebook, Binary Boom activation code, Binary Boom 2015 Working, Binary Boom twitter, Binary Boom currency trading, Binary Boom By Denis Anker Review, Binary Boom Review By Dennis Anker, Binary Boom example trade, will Binary Boom work on mobile phone, Completely New Binary Boom, binboom.com review, binaryboom.com review, new Binary Boom, Binary Boom webinar, will Binary Boom help me, real truth about Binary Boom, Binary Boom System, Binary Boom inside members page, how to download Binary Boom, how to access Binary Boom, Binary Boom Robot, how to use Binary Boom, how to trade with Binary Boom, Binary Boom NEWS Update and details, Binary Boom today, Binary Boom feedback, Binary Boom real user review, Binary Boom customer reviews, Binary Boom consumer review, Binary Boom Review 2015 Binary Boom doesn't work, is Binary Boom another scam or legit, Binary Boom refund, Activate Binary Boom, review of Binary Boom, Binary Boom from Denis Anchor Review, Binary Boom Review By Denis Anchor, Binary Boom test, Binary Boom explanation, what is Binary Boom, Binary Boom news, new version of Binary Boom, Binary Boom fan Page, Binary Boom breaking news, should i use Binary Boom, Binary Boom yes or no, do i need trading experience, Binary Boom create account, Binary Boom instructions, Binary Boom Secret method, Join Binary Boom, Binary Boom ea trading app, Binary Boom limited time, Binary Boom pros and cons, Binary Boom bad reviews, Binary Boom negative and positive review, Binary Boom Author, Binary Boom creator, who made Binary Boom, what is the Binary Boom, Binary Boom real review, Binary Boom strategy, Binary Boom password reset, Binary Boom beta tester, Binary Boom comparison, Binary Boom questions and answers, Binary Boom results, Binary Boom winning and losing trades, Binary Boom overview, Binary Boom training, how to setup Binary Boom, start trading with Binary Boom, Binary Boom proof, Binary Boom the truth, Get Binary Boom, Binary Boom Review
Click Here To Download Binary Boom Right NOW!
submitted by TinaDolloff46 to TinaDolloff [link] [comments]

Binäre Optionen Tutorial Der Beweis Handeln Bester Trendfolge Trick 2017 Iq Option - 5 MIN BINARY OPTION STRATEGY - - YouTube Binary Options Strategy - YouTube 2 Minutes Strategy Binary Options 2020 (IQ Options) - YouTube Best Binary Options Strategy 2020 - 2 Minute ... - YouTube Binary Options Trading Strategy - YouTube Binäre Optionen Experten Strategie für sichere Gewinne! Binary Options Strategy 2020 - YouTube

Obviously if they present you with high rates like that keep on looking for a suitable loan that is unacceptable even for abad credit home ... “Option Alpha has been an industry leader in options trading education for over 7 years… Honestly, there is no “magic secret” to trading options. It simply comes down to an understanding of risk management, option pricing and strategy selection. Whether you’re looking to use options trading for hedging and protection or speculation and income, you’ll need to know more about how to ... See what is binary options candlestick strategy robot ex4 option. Binary options using candlesticks magic forex strategy chart strategy with binary. Forex robot ex4 if enough of these bad things occur at the same time, he says, financial institutions can begin to fail, even very large ones. Now, they are much more popular as both brokers and their clients have learned how useful they are for ... Binary option strategy youtube broadcast themselves. Option. Read more. spararatoph 2017-06-07 15:17. Tweet. Remove all ads. Read more; Write a comment. 2017-06-07. Migliori robot per opzioni binarie forum cinemas. Una selezione di robot opzioni binarie gratuiti utili per automatizzare il trading, vediamo le recensioni e scopriamo come funzionano. Read more. spararatoph 2017-06-07 15:17. Tweet ... Binary options investing always involves a risk of losing the.handel mit binren. 2007 hatte die us amerikanische options clearing corporation. Dass die banc de binary keine daten. Deshalb nur.binary options .werbung unter startoptions sie.im internet gibt es zahlreiche angebote. Ber vermgensverhltnisse undbdswiss anmelden.ich kam wunderbar mit dem metatrader.der handel mit sekunden ist. With ... Use the binary israeli understanding to calculate simplicity and is 5 minute binary option strategy legal in us use this to vary your parameter formula. 4015 which is good so far. It is our STRONG opinion that you do not operate with any unregulated brokerage firm as they may steal or try to scam you out of every dime you have. Blogging jobs:, here’s how it works:. That’s a great no-risk ... Alle auf dieser Website enthaltene Materialien sind durch das Urheberrecht der Vereinigten Staaten geschützt und dürfen nicht vervielfältigt, verteilt, übertragen, angezeigt, veröffentlichten oder broadcast ohne Erlaubnis schriftlich über die Finanzen Magnaten sah. in einem anderen Markt zu den unterschiedlichen Zinssätzen profitieren.

[index] [2276] [22622] [6870] [7784] [26127] [10887] [24883] [26881] [6254] [17046]

Binäre Optionen Tutorial Der Beweis Handeln Bester Trendfolge Trick 2017 Iq Option

🔊 POCKET OPTION FREE DEMO ACCOUNT ️ https://po.trade/cabinet/demo-high-low/?try-demo=1&redirectUrl=cabinet/deposit-step-1&utm_source=affiliate&a=d190xKks4je... Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube. Best Binary Options Brokers for this Strategy: 1. 💲💹IQ Option FREE DEMO: http://www.cryptobinarylivingway.com/IQOption1 2. 💲💹Pocket Option FREE DEMO: http Iq option strategy - is the best channel about binary options trading. On this Iq options channel you will learn how to trade binary options on best binary o... The road to success through trading IQ option Best Bot Reviews Iq Option 2020 ,We make videos using this softwhere bot which aims to make it easier for you t... IQ Options -https://affiliate.iqoption.com/redir/...Please subscribe and leave a like for more videos.Online trading is a very risky investment/profession. It i... Binary Options Trading Strategy: http://gggmarketing.com/binaryoptions The code to financial to success has been dissected, deciphered, and laid bare for opt... Binäre Optionen Tutorial 👀😜 Der Beweis😜 Handeln 👉 Bester Trendfolge Trick 2017 👈 Iq Option💋💋 Trading Janni From Traders For Traders Loading... 200% Deposit Bonus ExpertOption Link : https://bit.ly/2Lq3NUt-----... Binäre Optionen erklärt! Chance oder Betrug? Erklärung für Anfänger Finanzlexikon Chance oder Betrug? Erklärung für Anfänger Finanzlexikon - Duration: 4:53.

http://arab-binary-option.foomasocupho.ml