Windows xp user auto log off

Zwift

2014.10.01 16:51 nugohs Zwift

The place to tell us how you and your bike are stuck in mid-air or that you saw a bear fall out of a tree. It’s Zwift! This subreddit is unofficial and moderated by reddit community members and Zwift community managers. Say Hi if you see us, we don’t bite. (Scotty may bite.)
[link]


2015.06.01 21:40 baldrad Verified KikPals

This is a subreddit for all the users that are verified on /Kikpals and /DirtyKikPals. If you wish to access this you have to verify yourself on one of the above subreddits and you'll be given access to this one. Only verified users can access /VerifiedKikPals.
[link]


2015.01.29 16:35 reseph Final Fantasy XV Online

/Save3rdPartyApps Our subreddit is currently set to private in protest of reddit's planned API changes, which will kill all 3rd party apps that many users rely on for accessibility and content moderation. For more information, please check the subreddit above or our thread on /ffxivmeta. In the meantime, we encourage anybody who is able to celebrate Pride by [making a donation to the Trevor Project.](https://give.thetrevorproject.org/give/489092/) We hope to see you again soon!
[link]


2024.05.16 23:53 maxcoder88 Is there a GPO to log off idle specific users?

Hi,
I am using Lithnet Idle Logoff. My question is : Is there a way to log off inactive specific profiles?
thanks,
submitted by maxcoder88 to sysadmin [link] [comments]


2024.05.16 23:52 jeanrenefefe How to upgrade a Creative Zen Micro to 128gb (with and without a VM)

I know this is an iPod subreddit, but it's the most active subreddit dedicated to mp3 players (I think). I know there are some fans of these players around here but let me know if you want this gone though.
After a few frustrating weeks of trying to upgrade my Creative Zen Micro to 128gb, I finally succeeded on upgrading it. Here is a step by step.

With a Virtual Machine

Given that the software part can get very frustrating, I suggest that you first focus on creating a working environment based on your stock mp3 player. This will limit the number of things that can go wrong.
This was tested on a Windows 11 machine (called Host from now on).
Download Virtualbox. Use your own Windows XP SP2 image or find one (google: archive + WinXPProSP2ENG). Download the Windows Media Player 10 updater from archive.org Download the Creative Zen Micro drivers and upgraders from archive.org
Install Virtualbox. Install Windows XP on Virtualbox - this can be a big step if you don't have much experience in this field, but there are plenty of tutorials on how to do it - check the references below.
Now that you have your Windows XP VM (called Guest from now on) up and running, go to the Devices tab on the top of your screen and click on "Insert guest additions CD...". This will insert a virtual CD containing some Virtualbox drivers and you'll get a pop up on your Guest machine. Install them and reboot your machine.
Turn off your Guest machine.
Connect the Zen Micro to your Host machine. Your Host machine should recognize the player with no trouble.
In Virtualbox, click on your VM machine and go to settings > USB > USB2.0 > click on the 'plus' sign and add your device there. The name should be "Creative...".
Now, in the same settings menu, go to the tab "shared folders" and click on "add". Now, choose the folder you want to share between the Host and the Guest machines. Give it a name and a mount point. I picked "sharewithxp" for all the fields, including the name of the directory on Host. Check 'auto-mount' and 'make permanent' (if it exists).
On your Host machine, copy the files MP10Setup.exe, ZenMicroPDE_PCFW_LB_1_11_01.exe and JB3MV2_PCWDRV_US_2_01_00.EXE to the shared directory you just created. Also copy MP10Setup.exe.
Turn on your Guest machine and go to "My Computer". You should see your shared folder in there. Copy all the files from there to your Guest's desktop.
Install MP10Setup.exe - this upgrades the Windows Media Player from 9 to 10. By experience, Windows Media Player 11 was problematic and apparently 9 isn't ok either. Stick to WMP 10. This was key for me. It really didn't work without WMP10.
Install JB3MV2_PCWDRV_US_2_01_00.EXE - these are the drivers for the Zen Micro.
Disconnect your Zen Micro from your computer. Connect it again. Go to devices > usb on the top menu and make sure your device is selected.
Execute ZenMicroPDE_PCFW_LB_1_11_01.exe If everything went according to plan you should now see an "Upgrade" button. If you see said button - congratulations because this was the most painful part of the process. I realized that when the device is correctly loaded, the executable won't open right away - It takes a few seconds. If the device wasn't fully recognized, you'll see a message saying "Your player is not connected, please connect your player".
(If you got the dreadful second message and no "upgrade" button, try to reboot your Guest machine. Disconnect and connect your player again. Make sure it appears on the devices menu.)
Now that you have a working environment, let's move to the fun part.
Format your micro sd card (fat32 if I'm not mistaken) - I used a Sandisk Extreme 128gb (the golden ones) and it worked fine. Insert the micro sd on your CF-to-SD adapter. I got the the only adapter I could find (red one).
Disassemble your Zen Micro - there are tutorials and videos around that show you how to do it better than I possible could - check the references below.
Remove the CF card from the mp3 player and insert the adapter. Pay attention to the position of the old CF card. CF cards don’t have a big distinguishable difference on one side like sd cards do. It's really easy to get mistaken and connect it on the wrong side. The only differences are the slots/openings on both sides of the CF card/adapter - one is larger than the other. When the adapter is connected and in place, its label should be visible (pointing upwards). Take a picture of the original CF card if needed or check the video in the references below.
Assemble everything back but do not insert the battery right away.
Toggle the power button to the left and hold it that position. Insert the battery. You should now be in recovery mode. Navigate to "format all" and click ok. Navigate to "reboot" and click ok.
Connect your player to the computer and, in the Guest machine, make sure it is selected on the devices > usb menu.
Open ZenMicroPDE_PCFW_LB_1_11_01.exe If everything went according to plan, the upgrade button should now be visible. Click. Wait. Enjoy.
PS: Inside the Creative Zen Micro link, there is also an upgrader for the most recent version - 2.21. I haven't tried it because I don't think it brings anything that interesting to the player. There are also 2 older drivers in there - also untested.
References: https://www.reddit.com/ipod/comments/18e1698/creative_zen_micro_upgraded_from_5gb_hdd_to_a/ https://www.instructables.com/Upgrade-the-Zen-Micro-5gb-to-8gb-on-the-Cheap/ www.youtube.com/watch?v=VERkcCTJFyI https://www.intowindows.com/how-to-boot-and-install-from-iso-in-virtualbox/

Without a VM (natively)

Soon.
submitted by jeanrenefefe to ipod [link] [comments]


2024.05.16 23:49 HarryPudding careldindiabloleague

Cisco Router Security
What are the two access privilege modes of the Cisco router?
User EXEC Mode: This is the initial access mode for a router. In this mode, the user can access only a limited set of basic monitoring commands.
Privileged EXEC Mode: This mode provides access to all router commands, such as debugging and configuration commands. It requires a password for access to ensure security.
What is the approach for password for the privileged mode of the router?
enable secret [password]
uses hashing algorithm so that the password is not in plain text but encrypted
How to ensure that all passwords in the router are stored in the encrypted form?
service password-encryption
What is the difference between the Cisco router’s startup and running configurations?
How to save the running configuration into start up configuration?
Startup Configuration: Stored in the NVRAM, this configuration is used to boot the router. It remains unchanged until an administrator explicitly saves the running configuration to it.
Running Configuration: Held in the router’s RAM, this configuration is active on the router. Changes to the router’s configuration are made here and are effective immediately.
Know and be able to configure all aspects of the Cisco router covered in class. For example,
configuring the router interfaces, setting the router OSPF ID, etc.
enable
configure terminal
hostname MyRouter
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.0
no shutdown
exit
interface Serial0/0/0
ip address 10.0.0.1 255.255.255.252
clock rate 64000
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.1.0 0.0.0.255 area 0
exit
enable secret mysecretpassword
line console 0
password myconsolepassword
login
exit
line vty 0 4
password myvtypassword
login
exit
crypto key generate rsa
ip ssh version 2
ip ssh time-out 60
ip ssh authentication-retries 2
ip route 0.0.0.0 0.0.0.0 192.168.1.254
access-list 10 permit 192.168.1.0 0.0.0.255
access-list 10 deny any
Practical Routing, OSPF, and Security
What is the difference between static and dynamic routing?
Static Routing: Involves manually setting up routes in the router's routing table through configuration commands. These routes do not change unless manually updated or removed. Static routing is simple, secure, and uses less bandwidth but lacks scalability and flexibility.
Dynamic Routing: Automatically adjusts routes in the routing table based on current network conditions using routing protocols. This approach allows for more flexibility, scalability, and fault tolerance, but consumes more resources and can be complex to configure.
What is the difference between link state and distance vector routing?
Distance Vector Routing: Routers using distance vector protocols calculate the best path to a destination based on the distance and direction (vector) to nodes. Updates are shared with neighboring routers at regular intervals or when changes occur. This approach can lead to slower convergence and issues like routing loops.
Link State Routing: Each router learns the entire network topology by exchanging link-state information. Routers then independently calculate the shortest path to every node using algorithms like Dijkstra’s. This results in quicker convergence and fewer routing loops.
Distance Vector Routing: Each router computes distance from itself to its next immediate neighbors. (RIP, EIGRP, & BGP)
-Does not build a full map of the network
-Focuses more on the next hop towards the destination
Link State Routing: Each router shares knowledge of its neighbors with every other router in the network. (OSPF and IS-IS)
-Builds a full map of the network
-Each router shares information
-Maintains a database of the entire network.
Give an example of the distance vector and link state algorithms.
Distance = RIPLink State = OSPF
What type of protocol is Routing Information Protocol (RIP)? Be able to understand
examples and solve problems.
Example of a distance vector protocol
dynamic protocol
-shares routing info with neighboring routers
-an interior gateway protocol that operates within autonomous system
-oldest of all dynamic protocol; RIPv1
-widely used open standard developed by IETF
-a distance vector routing protocol
-limited to maximum 15 hops;
 how rip works -rip sends regular update message (advertisements to neighboring routers) 
-every 30 seconds that resets after each successful ack
-route becomes invalid if it has not received a message for 180 seconds
-RIPv1 (obsolete) uses broadcast, while RIPv2 uses a multicast address -Update message only travel to a single hop
downside : limitations, each router in its table can only have one entry per destination. Have to wait for advertisement for an alternative path, cannot reach hops 15 paths away, little to no security.
What type of protocol is Open Shortest Paths First (OSPF) protocol? Be able to under-
stand examples and solve problems.
-a link state routing protocol
 intra as routing with RIP 
What is the Link State Advertisement (LSA) in OSPF? What is the Link State Database
(LSDB)?
-LSA contains data about a router, its subnets, and some other network information.-OSPF puts all the LSAs from different routers into a Link-State Database (LSDB)
The goal of OSPF is to be able to determine a complete map of the interior routing path to be able to create the best route possible.
The way this is done is that OSPF finds all the routers and subnets that can be reached within the entire network. The result is that each router will have the same information about the network by sending out LSA.
How does each router in OSPF create a map of the entire network?
Step 1 : Acquire neighbor relationship to exchange network information.
Step 2: Exchange database information, neighboring routers swap LSDB information with each other
Step 3: Choosing the best routes, each router chooses the best routes to add to its routing table based on the learned LSDB information.
What is the process for two OSPF routers to become neighbors?
A. a neighbor sends out a Hello packet including the router ID along with subnets that it routes to the given multicast address to a given OSPF area ID.
this is also a way for routers to tell neighbors that they are still on and good to go. 
B. Once other routers receive this packet, they run some checks. The neighboring routers must match the following requirements:
-area id needs to be the same (also used when scaling up OSPF)
-the shared or connecting link should be on the same subnet.
-The Hello and dead timer must be the same.
-the dead timer is having enogh time before the sending router assumes that the neighbor is down.
-this timer is typically 10 secs for point-to-point and broadcast networks.
C. If all is fine, the receiving router will go into Init stage and sends a hello message of its own. This Hello packet list its own network info along with the known neighbor R1. This puts R1 into a 2-way communication status.
D. R1 sends another Hello message to R2 with the information as a known neighbor. This allows the R2 now with a 2-way communication status as well.E. We now have a 2-way neighboring routers
What is the difference between point-to-point and multi-access networks? How does OSPF
handle each case?
Point-to-Point: A network setup where each connection is between two specific nodes or devices. OSPF treats these links with straightforward neighbor relationships since there are only two routers on each segment. 
Multi-Access Networks: Networks where multiple routers can connect on the same segment, such as Ethernet. OSPF uses a Designated Router (DR) and a Backup Designated Router (BDR) on these types of networks to reduce the amount of OSPF traffic and the size of the topological database.
DR selected by the highest OSPF prio.
Be able to configure OSPF routing given a topology.

Example:
Consider a topology with three routers R1, R2, and R3. The routers
are connected R1 =⇒R2 =⇒R3 =⇒R1.
R1 has interface f0/0 connected to the
interface f0/0 of R2. R2 has interface f0/1 connecting to the interface f0/0 of R3.
Finally R3 has interface 1/0 connecting to the interface 1/0 of R3. Assuming all
routers are Cisco 7200 routers, configure them to use OSPF to dynamically route in
this topology (you will be given the Cisco router manual for such questions).

R1enable
configure terminal
hostname R1
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
no shutdown
exit
interface FastEthernet1/0
ip address 192.168.31.1 255.255.255.0
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.12.0 0.0.0.255 area 0
network 192.168.31.0 0.0.0.255 area 0
exit
end
write memory
R2enable
configure terminal
hostname R2
interface FastEthernet0/0
ip address 192.168.12.2 255.255.255.0
no shutdown
exit
interface FastEthernet0/1
ip address 192.168.23.1 255.255.255.0
no shutdown
exit
router ospf 1
router-id 2.2.2.2
network 192.168.12.0 0.0.0.255 area 0
network 192.168.23.0 0.0.0.255 area 0
exit
end
write memory
R3enable
configure terminal
hostname R3
interface FastEthernet0/0
ip address 192.168.23.2 255.255.255.0
no shutdown
exit
interface FastEthernet1/0
ip address 192.168.31.2 255.255.255.0
no shutdown
exit
router ospf 1
router-id 3.3.3.3
network 192.168.23.0 0.0.0.255 area 0
network 192.168.31.0 0.0.0.255 area 0
exit
end
write memory
How does OSPF authenticate packets to protect against packet spoofing and tempering?
Be able to enable it a Cisco router.
OSPF (Open Shortest Path First) can authenticate packets to protect against packet spoofing and tampering using several methods. The two main types of authentication are:
Plain Text Authentication: This is simple and provides minimal security. It sends the password in clear text.
Message Digest 5 (MD5) Authentication: This provides stronger security by using cryptographic hash functions to authenticate OSPF packets.
Plain textenable
configure terminal
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
ip ospf authentication
ip ospf authentication-key cisco123
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.12.0 0.0.0.255 area 0
area 0 authentication
exit
write memory
MD5enable
configure terminal
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 securepassword
no shutdown
exit
router ospf 1
router-id 1.1.1.1
network 192.168.12.0 0.0.0.255 area 0
area 0 authentication message-digest
exit
write memory
Network Defense Fundamentals

What is IP spoofing? Explain.
-The ip packet contains the source and destination Ip addresses.-Is it straightforward to modify the ip address of the packet.
-IP Spoofing: sender chagrin his source address to something other than his real address.
How can IP spoofing be used in security attacks?
-If the attacker sends an Ip packet with a spoofed IP, they will not receive a response form the destination: the machine with the IP matching the spoofed IP will receive the response.Ip spoofing operation - the sender spoofs the source IP address to point to another target. The receiver system replies to the spoofed IP.

What are the countermeasures to IP spoofing?
Ingress and Egress Filtering: Network operators should implement filtering rules on routers and firewalls to block packets with source IP addresses that should not originate from those networks. Ingress filtering blocks incoming packets with a source IP address that is not valid for the network, while egress filtering blocks outgoing packets with an invalid source IP address.
Reverse Path Forwarding (RPF): This technique ensures that the incoming packets are received on the same interface that the router would use to send traffic back to the source. If the path does not match, the packet is discarded, preventing spoofed packets from passing through.
IPsec (Internet Protocol Security): IPsec can be used to authenticate and encrypt IP packets, ensuring that they come from legitimate sources and have not been tampered with. This makes spoofing attacks significantly more difficult.
How can IP spoofing be used to perform DoS attacks?
IP spoofing is often used in Denial of Service (DoS) attacks to obscure the attacker's identity and to overwhelm the target with traffic from what appears to be multiple sources. One common type of DoS attack that utilizes IP spoofing is a Smurf Attack. In a Smurf Attack, the attacker sends ICMP (Internet Control Message Protocol) echo requests to broadcast addresses of networks, with the source IP address spoofed to that of the victim. The devices on the network respond to the echo requests, sending replies back to the victim's IP address. This amplifies the traffic directed at the victim, potentially overwhelming their network and causing a DoS condition.

Know how to use
hping3
for performing ping floods.
Using hping3 to perform ping floods involves sending a high volume of ICMP Echo Request packets to a target to overwhelm it.basic ping floodsudo hping3 -1 --flood [target_IP]
Using spoofed source ipsudo hping3 -1 --flood -a [spoofed_IP] [target_IP]
Controlling the Packet Sending Rateo hping3 -1 --flood -i u1000 [target_IP]Combining sudo hping3 -1 --flood -a 10.0.0.1 -i u1000 192.168.1.1
Firewalling
What is a firewall?
a filtering device on a network that enforces network security policy and protects the network against external attacks.
According to NIST SP 800-41, what are the characteristics of a firewall?
NIST standard defines the possible characteristics that a firewall can use to filter traffic.
-(IP Address and Protocol type) filtering based on source/destination IP address/ports, traffic direction and other transport layer characteristics.
-(Application Protocols)controls access based on application protocol data
-(User identity) controls access based on user identity
-(Network activity)
What are the limitations of the firewall?
Firewall capabilities: -Define a traffic chokepoint in the network and protects against IP spoofing and routing attacks
-Provide a location for monitoring the security events -Provide non-security functions: loggin internet usage, network address translation-Serve as platform for VPN/IPSec
Firewall limitations:-protect against attacks bypassing the firewall, connections from inside the organization to the outside that do not go through the firewall.-protect against internal threats such as disgruntled employees.
What is a packet filter firewall? Be able to write and interpret rules and to spot configu-
rationflaws.
Packet filtering firewall : applies a set of rules to each packet based on the packet headers.Filters based on: source/destination IP, source/destination port numbers, IP Protocol Field:defines the transport protocol, Interface : for firewalls with 3+ network interfaces, the interface from which the packet came from/going to

What is the difference between the default and allow and default deny policies? Which
one is the more secure one?
-when no rules apply to a packet, a default rule is applied: default deny : what is not explicitly permitted is denied default forward : what is not explicitly denied is allowed
default deny is more secure, you dont have to identify all of the cases that needs to be blocked, if one is missed, default deny will deny it.
Port 0-1023 reserved
1024-2**17 ephemeral
source port used by the system initialiatizng a connection is always chosen from the ephemeral ports
Be able to configure the packet filtering functions of iptables.

Example:
Write iptables rules to block all ICMP traffic to and from the system.
iptables -A INPUT -p icmp -j DROP
iptables -A OUTPUT -p icmp -j DROP
Example:
Write iptables rules to block all traffic on port 22
iptables -A INPUT -p tcp --sport 22 -j DROP
iptables -A OUTPUT -p tcp --dport 22 -j DROP

Example:
Write iptables rules to block traffic to host 192.168.2.2
iptables -A OUTPUT -p tcp --dest 192.168.2.2 -j DROP
iptables -A INPUT -p tcp --src 192.168.2.2 -j DROP
What are the limitations of the packet filter firewall?
-does not examine upper layer data : cannot prevent attacks that employ application specfic vulnerabilities or functions.cannot block application specific commands.

What is the stateful firewall and how does it compare to a packet filter?
A stateful firewall is a network security device that monitors and tracks the state of active connections, making decisions based on the context of the traffic. Unlike a simple packet filter, which examines individual packets in isolation based on predetermined rules, a stateful firewall keeps track of connections over time, distinguishing between legitimate packets that are part of an established session and potentially malicious ones. This contextual awareness allows it to block unauthorized connection attempts and prevent attacks such as spoofing and session hijacking. While packet filters, or stateless firewalls, operate faster and consume fewer resources by applying static rules to each packet independently, they lack the sophisticated traffic pattern handling and enhanced security provided by stateful firewalls.

What is the application-level firewall? What are its advantages and limitations?
An application-level firewall, also known as an application firewall or proxy firewall, operates at the application layer of the OSI model. It inspects and filters traffic based on the specific application protocols (e.g., HTTP, FTP, DNS) rather than just IP addresses and port numbers. limitations : increased communications overhead due to two separate TCP connections
 and not transparent to the client 
Application-level gateways are also known as application-level proxies.
-act as a relay for the application-level traffic.
-runs at the application layer, and examines application-layer data
Supported ProtocolsFTPSTMPHTTP
What is a circuit-level firewall? What are its advantages and limitations?
-Similar to the application-level gateway, but only tracks the state of the TCP/UDP sessions.
-Does not examine application data , simply relays TCP segments
-Allow/deny decisions based on whether a packet belongs to an established and trusted connection
Advantage of circuit-level firewall -do not filter individual packets(simplifies rules)
-fast and efficient 
Disadvantages:
-do not filter individual packets -require frequent updates: traffic is filtered with rules and policies that need regular updates for new threats and risks -the vendor needs to modify the TCP/IP implementation for thor applications to use the circuit-level proxy. 
What are the different approaches to basing the firewall?
-stand-alone machines -software modules in roosters, switches, or servers, or pre-configured security appliances. 
What are the host-based firewalls?
Host-based firewalls: a firewall software module used to secure a single host.
What are the network device firewalls?
Network device firewall = routers and switches often have firewall functions, like packet filtering and stateful inspection, to check and filter packets
What are the virtual firewalls?
-in a virtualized environment, servers, switches, and routers can be virtualized and share physical hardware. The hypervisor that manages the virtual machines can also have firewall capabilities.
What is the DMZ? How is it used for securing networks?
A Demilitarized Zone (DMZ) in network security is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, typically the internet. The primary purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN). By isolating these externally accessible services, the DMZ ensures that if an attacker gains access to the public-facing systems, they do not have direct access to the rest of the network.
How the DMZ Secures Networks
Isolation of Public Services: Services that need to be accessible from the outside, such as web servers, mail servers, FTP servers, and DNS servers, are placed in the DMZ. These services are isolated from the internal network, which helps protect the internal systems from attacks that may exploit vulnerabilities in the public-facing services.
Controlled Access: Firewalls are used to create boundaries between the internet, the DMZ, and the internal network. The firewall rules are configured to allow only specific types of traffic to and from the DMZ. For example, incoming web traffic might be allowed to reach a web server in the DMZ, but not to access internal systems directly.
Minimal Exposure: Only the necessary services are exposed to the internet. This minimizes the attack surface, reducing the number of entry points that an attacker can exploit. Internal systems and data remain protected behind the additional layer of the firewall.
Layered Security: The DMZ provides an additional layer of defense (defense-in-depth). Even if an attacker manages to compromise a server in the DMZ, the internal network is still protected by another firewall, making it harder for the attacker to penetrate further.
Monitoring and Logging: Activities within the DMZ can be closely monitored and logged. Any suspicious behavior can be detected early, and appropriate actions can be taken to mitigate potential threats before they impact the internal network.
Traffic Filtering: The firewalls between the internet and the DMZ, as well as between the DMZ and the internal network, can filter traffic based on IP addresses, ports, and protocols. This filtering ensures that only legitimate traffic is allowed and that malicious traffic is blocked.
-if attacker compromises a server on the network, they will be able to pivot to other systems on the network.
What are the advantages and disadvantages of having the two DMZ firewalls be from
different vendors?
Using different firewall manufacturers for the two firewalls maybe a good idea, avoids possibility of both having the same vulnerability but introduces more complexity and management overhead.
Be able to write pfSense firewall rules
Penetration Testing

What is penetration testing?
-legal and suthorzied attempt to locate and exploit vulnerable systems for the purpose of making those systems more secure.
pen testing, pt, hacking, ethical hacking, whitehate hacking, offensive security, red teaming 
What is the objective of the penetration testing?
Use tools and techniques used by the attackers in order to discover security vulnerabilities before the attackers do. 
What is the BAD pyramid?
The purpose of a red team is to find ways to improve the blue team, so purple teams should not be needed in an organization where the red/blue teams interaction is healthy and functioning properly. 
red attack
purple defender changes based off attack knowledge
blue defend
green builder changes based on defender knowledge
yellow build
orange builder changes based on attacker knowledge
Why are the penetration tests conducted?
-a company may want to have a stronger understanding of their security footprint.
-system policy shortcomings -network protocol weaknesses -network/software misconfigurations -software vulnerabilities 
What is the difference between penetration testing and vulnerability assessment?
-two terms often incorrectly ,interchangeably used in practice.
-vulnerability assessment : review of systems services to find potential vulnerabilities-penetration testing: finding an exploiting system vulnerabilities as proof-of-concept
What is the difference between black-box, white-box, and grey-box testing.
Black-Box Testing
Tester Knowledge: The tester has no knowledge of the internal structure, code, or implementation details of the system.
-lack knowledge of system
White-Box Testing
Tester Knowledge: The tester has full knowledge of the internal structure, code, and implementation details of the system.
-very thorough , but not completely realistic
Grey-Box Testing
Tester Knowledge: The tester has partial knowledge of the internal structure, code, or implementation details of the system.
What is the difference between ethical and unethical hackers?
-penetration testers, with proper authorization of the company, help improve the security of the company.
-unethical hackers, personal gain through extortion or other devious methods, profit, revenge, fame, etc. No authorization to conduct the attacks
•Ethical vs unethical hacking, penetration testers: obtain the authorization from the organization whose systems they plan to attack unethical hackers: attack without authorization.
Know the stages of penetration testing and the importance of following a structured ap-
proach.

Planning and Reconnaissance:
Planning: Define the scope and goals of the test, including the systems to be tested and the testing methods.
Reconnaissance: Gather information about the target, such as IP addresses, domain names, and network infrastructure, to understand how to approach the test.
Scanning:
Purpose: Identify potential entry points and vulnerabilities in the target system.
Methods: Use tools to scan for open ports, services running on those ports, and known vulnerabilities.
Gaining Access:
Purpose: Attempt to exploit identified vulnerabilities to gain unauthorized access to the system.
Techniques: Use techniques like password cracking, SQL injection, or exploiting software vulnerabilities.
Maintaining Access:
Planning and Reconnaissance:
Purpose: Ensure continued access to the compromised system to understand the potential impact of a prolonged attack.
Methods: Install backdoors or use other methods to maintain control over the system.
Analysis and Reporting:
Scanning
Purpose: Document the findings, including vulnerabilities discovered, methods used, and the level of access achieved.
Report: Provide a detailed report to the organization, highlighting the risks and recommending steps to mitigate the vulnerabilities.
Remediation:
Gaining Access
Purpose: Address and fix the identified vulnerabilities to improve the security of the system.
Action: Implement the recommended security measures from the report to protect against future attacks.
Retesting:
Maintaining Access
Purpose: Verify that the vulnerabilities have been successfully remediated.
Process: Conduct a follow-up test to ensure that the fixes are effective and no new issues have been introduced.
Importance of Following a Structured Approach
Consistency: A structured approach ensures that each stage is systematically followed, making the testing thorough and reliable.
Comprehensiveness: Following each stage helps identify and address all potential vulnerabilities, leaving no gaps in the security assessment.
Documentation: A structured method produces detailed documentation, which is crucial for understanding the security posture and for future reference.
Effectiveness: It ensures that the penetration test effectively mimics real-world attack scenarios, providing valuable insights into how an actual attacker might exploit vulnerabilities.
Risk Management: By identifying and addressing vulnerabilities, organizations can proactively manage security risks and protect their assets from potential attacks.
Example:
What is the difference between the passive and active reconnaissance?

Passive Reconnaissance
Definition: Gathering information about the target without directly interacting with the target system or network. The aim is to collect data without alerting the target.
Methods:
Publicly Available Information: Searching for information that is freely available on the internet, such as social media profiles, company websites, and news articles.
DNS Queries: Looking up domain registration information (WHOIS data), DNS records, and IP address ranges.
Network Traffic Analysis: Capturing and analyzing network traffic without sending packets to the target (e.g., using tools like Wireshark in a non-intrusive manner).
Search Engines: Using search engines to find information about the target, such as employee names, email addresses, and technical details.
Advantages:
Low Risk: Minimizes the chance of detection by the target because no direct interaction occurs.
Stealth: Suitable for the early stages of reconnaissance when the goal is to remain undetected.
Disadvantages:
Limited Information: May not provide as much detailed or specific information about vulnerabilities or configurations as active reconnaissance.
Active Reconnaissance
Definition: Actively engaging with the target system or network to gather information. This involves direct interaction, such as sending packets or probing the target.
Methods:
Network Scanning: Using tools like Nmap to scan for open ports, running services, and network topology.
Vulnerability Scanning: Running vulnerability scanners (e.g., Nessus, OpenVAS) to identify known weaknesses in the target systems.
Social Engineering: Directly interacting with individuals (e.g., phishing attacks) to gather information.
Probing and Enumerating: Sending specific queries or packets to the target to elicit responses that reveal information about the system (e.g., banner grabbing).
Advantages:
Detailed Information: Provides more detailed and specific information about the target's vulnerabilities, configurations, and active services.
Identification of Weaknesses: More effective in identifying exploitable vulnerabilities that can be used in subsequent attack phases.
Disadvantages:
Higher Risk: Increases the risk of detection by the target, which could alert them to the reconnaissance activity.
Potential Legal Issues: Unauthorized active reconnaissance can lead to legal repercussions if done without permission.
Summary
Passive Reconnaissance: Involves gathering information without direct interaction with the target, resulting in lower risk of detection but potentially less detailed information.
Active Reconnaissance: Involves direct interaction with the target to gather detailed information, but carries a higher risk of detection and potential legal consequences.
Both types of reconnaissance are essential in penetration testing to understand the target's environment and identify potential vulnerabilities while balancing the need for stealth and detailed information.
Be able to use the penetration testing tools discussed in class
nmap 192.168.1.1
nmap -sS -sV -O -A 192.168.1.1-sS: Perform a stealth SYN scan.
-sV: Detect service versions.
-O: Detect operating system.
-A: Perform aggressive scan (includes OS detection, version detection, script scanning, and traceroute).
submitted by HarryPudding to u/HarryPudding [link] [comments]


2024.05.16 23:42 longdistamce Here is a way to get your Credit Karma transactions in a CSV file. Tutorial retrieving transactions from Credit Karma based on Month using Javascript code (No coding experience)

Since I have been getting messages randomly, I figured this might be helpful. This is created off another users post from here https://www.reddit.com/mintuit/comments/197g5nz/use_a_script_to_extract_transactions_from_credit/
Anyways I will try to make this beginner friendly with step by step instructions. It isnt very hard, you just might do somethings on the browser you haven't done before. High level, all were doing is running some code that will help us download what is on the screen of Credit Karma transactions
Steps:
  1. Go to https://www.creditkarma.com/networth/transactions
  2. Go to Dev Tools Console, you can use any of these methods
    1. Right click anywhere on screen, select "Inspect", go to the "Console" tab
    2. If using Chrome on Mac, shortcut keys to open the console is Command + option + J
      • Screen should look something like this (keep in mind you want to be on the Console tab highlighted in red):
https://preview.redd.it/fevrs155yu0d1.png?width=2130&format=png&auto=webp&s=50fdec232261f3fd4a126140908aef1cbb869a51
  1. Copy and paste this code into the console:
    function convertDateFormat(inputDate) { // Parse the input date string var parsedDate = new Date(inputDate);
    // Extract day, month, and year var day = ("0" + parsedDate.getDate()).slice(-2); var month = ("0" + (parsedDate.getMonth() + 1)).slice(-2); var year = parsedDate.getFullYear(); // Construct the new date format var newDateFormat = month + "/" + day + "/" + year; return newDateFormat; 
    }
    function extractNumber(inputString) { // Use regular expression to match the number with parentheses, dollar sign, and commas var match = inputString.match(/\$(([)]+))/);
    // If there's a match, extract the number, remove commas, and convert it to a float if (match && match[1]) { var numberWithCommas = match[1]; var numberWithoutCommas = numberWithCommas.replace(/,/g, ''); return inputString.startsWith('-') ? -parseFloat(numberWithoutCommas) : parseFloat(numberWithoutCommas); } // If no match, return NaN or handle it according to your requirement return NaN; 
    }
    function extractNumber(inputString) { // Use regular expression to match the number with or without a dollar sign and optional minus sign var match = inputString.match(/-?\$?(\d{1,3}(,\d{3})*(.\d+)?.\d+)$/);
    // If there's a match, extract the number, remove commas, and convert it to a float if (match) { var numberString = match[1].replace(/,/g, ''); var extractedNumber = parseFloat(numberString); return inputString.startsWith('-') ? -extractedNumber : extractedNumber; } // If no match, return NaN or handle it according to your requirement return NaN; 
    }
    function extractAmount(element) { const selector1 = '.row-value div:nth-child(1)'; const selector2 = '.f4.fw5.kpl-color-palette-green-50 div:nth-child(1)';
    let amountElement = element.querySelector(selector1); let temp = ''; if (amountElement) { temp = amountElement.textContent.trim(); } else { amountElement = element.querySelector(selector2); temp = amountElement ? amountElement.textContent.trim() : ''; } return extractNumber(temp); // return temp; 
    }
    function extractTransactionInfo(element) { const transactionInfo = { dataIndex: '', description: '', category: '', amount: '', date: '' };
    // Extracting dataIndex transactionInfo.dataIndex = element.getAttribute('data-index'); // Extracting description const descriptionElement = element.querySelector('.row-title div:nth-child(1)'); transactionInfo.description = descriptionElement ? descriptionElement.textContent.trim() : ''; // Extracting category const categoryElement = element.querySelector('.row-title div:nth-child(2)'); transactionInfo.category = categoryElement ? categoryElement.textContent.trim() : ''; // Extracting amount // const amountElement = element.querySelector('.row-value div:nth-child(1), .f4.fw5.kpl-color-palette-green-50 div:nth-child(1)'); // temp = amountElement ? amountElement.textContent.trim() : ''; // transactionInfo.amount = extractNumber(temp); transactionInfo.amount = extractAmount(element) transactionInfo.transactionType = transactionInfo.amount >= 0 ? 'credit' : 'debit'; transactionInfo.amount = Math.abs(transactionInfo.amount) // Extracting date const dateElement = element.querySelector('.row-value div:nth-child(2), .f4.fw5.kpl-color-palette-green-50 div:nth-child(2)'); transactionInfo.date = dateElement ? dateElement.textContent.trim() : ''; return transactionInfo; 
    }
    function extractAllTransactions() { // Select all transaction elements in the current window const transactionElements = document.querySelectorAll('[data-index]');
    // Iterate through each transaction element and extract information return Array.from(transactionElements, element => extractTransactionInfo(element)); 
    }
    function combineTransactions(existingTransactions, newTransactions) { // Check for duplicates and add only unique transactions const uniqueNewTransactions = newTransactions.filter(newTransaction => !existingTransactions.some(existingTransaction => existingTransaction.dataIndex === newTransaction.dataIndex) );
    return [...existingTransactions, ...uniqueNewTransactions]; 
    }
    function filterEmptyTransactions(transactions) { // Filter out transactions with all information empty // return transactions.filter(transaction => // Object.values(transaction).some(value => value.trim() !== '') return transactions.filter(transaction => transaction.amount !== null && transaction.amount !== undefined && transaction.date !== '' ); }
    function convertToCSV(transactions) { const header = 'Date,Description,Original Description, Amount, Transaction Type, Category, Account Name, Labels, Notes\n'; const rows = transactions.map(transaction => "${convertDateFormat(transaction.date)}","${transaction.description}","${transaction.description}","${transaction.amount}","${transaction.transactionType}","${transaction.category}",,,\n ); return header + rows.join(''); }
    function saveCSVToFile(csvData, fileName) { const blob = new Blob([csvData], { type: 'text/csv' }); const link = document.createElement('a'); link.href = window.URL.createObjectURL(blob); link.download = fileName; link.click(); }
    function logResults(allTransactions, filteredTransactions, csvData) { // console.log('All Transactions:', allTransactions); console.log('Filtered Transactions:', filteredTransactions); console.log('CSV Data:', csvData); }
    // Function to scroll down the page function scrollDown() { window.scrollTo(0, window.scrollY + window.innerHeight); }
    // Use this function to capture transactions and scroll down with a limit of 3 scrolls async function captureAndScroll(scrollLimit) { let allTransactions = [];
    // Capture transactions in the current window and scroll down until the scroll limit is reached for (let scrolls = 0; scrolls < scrollLimit; scrolls++) { const newTransactions = extractAllTransactions(); allTransactions = combineTransactions(allTransactions, newTransactions); scrollDown(); await new Promise(resolve => setTimeout(resolve, 1000)); // Wait for content to load (adjust the delay if needed) } // Filter out transactions with all information empty const filteredTransactions = filterEmptyTransactions(allTransactions); // Convert transactions to CSV const csvData = convertToCSV(filteredTransactions); // Save CSV data to a CSV file saveCSVToFile(csvData, 'transactions.csv'); // Log the final results logResults(allTransactions, filteredTransactions, csvData); 
    } async function captureTransactionsInMonth(targetMonth) { let allTransactions = [];
    while (true) { // Capture transactions in the current window const newTransactions = extractAllTransactions(); // Combine newly captured transactions with existing ones allTransactions = combineTransactions(allTransactions, newTransactions); // Check if any transaction is in a month prior to the target month const priorMonthTransaction = newTransactions.find(transaction => { const transactionDate = new Date(transaction.date); return transactionDate < new Date(targetMonth.getFullYear(), targetMonth.getMonth(), 1); }); // If a transaction in a prior month is found, stop scrolling if (priorMonthTransaction) { break; } // If no new transactions are loaded, stop scrolling if (newTransactions.length === 0) { break; } // Scroll down scrollDown(); await new Promise(resolve => setTimeout(resolve, 1000)); // Wait for content to load (adjust the delay if needed) } // Filter transactions for the target month const currentMonthTransactions = allTransactions.filter(transaction => new Date(transaction.date).getMonth() === targetMonth.getMonth() && new Date(transaction.date).getFullYear() === targetMonth.getFullYear() ); // Convert transactions to CSV const csvData = convertToCSV(currentMonthTransactions); // Save CSV data to a CSV file saveCSVToFile(csvData, `transactions_${targetMonth.getMonth() + 1}_${targetMonth.getFullYear()}.csv`); // Log the final results logResults(allTransactions, currentMonthTransactions, csvData); 
    }
    // Usage example: Capture transactions for March 2024 const targetMonth = new Date(2024, 2); // March is 2 (zero-based index) captureTransactionsInMonth(targetMonth);
  2. Press Enter, you should see your screen scroll and continue till it reaches the end of the month (this might take a minute or two depending on how many transactions you have). For example, in the code it specifies new Date(2024, 2); // March is 2 (zero-based index) so the screen will scroll until it reaches February 2024 and then downloads the file for March 2024 transactions. Depending on your browser settings, the file should download once the code is done scrolling and running
If you would like to specify a different month, you can change the "2" to whatever month you need accordingly, example: May would be "4"
Let me know if you have any questions or any other requests and I'll try to make it
submitted by longdistamce to mintuit [link] [comments]


2024.05.16 23:41 TyrannicalDuncery Fun new way to steal SSN (jk, security suggestion for Equifax)

As you can see from the reaction to this post, it is bad practice to allow a user to view their full SSN on a website, especially if 2FA is not present.
I can log in to Equifax.com, go to file a dispute, and then view my full SSN. I can do this using only my email address and password. Maybe the other credit bureaus do as well, now I'm intrigued.
UPDATE:
I suggest that Equifax change this setup in one or more of the following ways:
  1. Add app-based 2FA as a login option.
  2. Do not allow the user to view their full SSN. Instead, allow them to type in their SSN and compare it to Equifax's records, returning a "yes/no." Limit the number of SSNs that can be entered for comparison within a given time period. Or allow the user to optionally add this requirement (and make it hard to switch back off).
  3. Require the user to do some extra security checks in order to view SSN. Or allow the user to optionally add this requirement (and make it hard to switch back off).
I like #2. For the purpose of starting a dispute, it seem to me that it would be sufficient to know the number of distinct SSNs that don't match the SSN provided by the user, and the same thing for ITINs or other buckets of numbers. If I understand correctly, you can only have one SSN or ITIN at a time, so a security setup like this would at least make sense for current SSN even if there were reasons to make it easier to view Equifax's picture of your historical SSNs/ITINs.
Maybe I'm missing a special case, but it seems like that would be enough to get started and then Equifax could provide the full non-matching SSNs if necessary as part of the dispute process. Maybe I'm missing a case where it would be critical to know the full non-matching SSNs before disputing. Thoughts?
Equifax is not unique in doing this; ChexSystems does it as well. However, Equifax is much less bad than ChexSystems for the following reasons:
submitted by TyrannicalDuncery to personalfinance [link] [comments]


2024.05.16 23:38 V0000M Minecraft crashes when using Chunky

Minecraft crashes when using Chunky
So I'm running a modded server for me and my friends to use, and every time I go to generate new chunks with chunky, after I want to say 5-10 minutes, spark will say "timed out waiting for world statistics" and basically thinks the server crashed? So it just halts the server until i manually stop and start it again. Chunky is the only chunk generating mod I have installed, and I also set the max tick time to -1. Is there anything else to prevent the server from auto stopping when using chunky? I would show the logs but all it does is just post the same "timed out waiting for world statistics", so theres nothing much to go off of.
https://preview.redd.it/yebzfh71yu0d1.png?width=719&format=png&auto=webp&s=6da73b923e791d2dae4a19a1420d78e562c3ba60
https://preview.redd.it/l65z7h71yu0d1.png?width=688&format=png&auto=webp&s=1a2810dbfc9759ef73bad32dfc3422547375c800
https://preview.redd.it/kpj3xh71yu0d1.png?width=770&format=png&auto=webp&s=9c1bfbfb72a913e63a30982231a4ed7b15a68576
https://preview.redd.it/pru0rk71yu0d1.png?width=743&format=png&auto=webp&s=ff905071f84408518be72af78179434d4b7a81e6
https://preview.redd.it/ewrx0h71yu0d1.png?width=726&format=png&auto=webp&s=25341c296f36e9de80debf656a224e102103e4b0
https://preview.redd.it/xm8i2h71yu0d1.png?width=737&format=png&auto=webp&s=9ac9335e668debe90999cd6a62423f066f4aef1c
https://preview.redd.it/c67omh71yu0d1.png?width=771&format=png&auto=webp&s=b30d2b1a79a174a0653e590d9c9dec62b5072f56
https://preview.redd.it/76v7ri71yu0d1.png?width=542&format=png&auto=webp&s=cb6ee9a06f98a9a1c45b36fbd02c4f5ab007bb83
submitted by V0000M to Minecraft [link] [comments]


2024.05.16 23:25 Baby_Dahl28 Still not completely sold just yet

Played the new season for maybe 12ish hours, but item rework is an improvement andwhere it should have been at launch. However, still has some glaring issues that need work. And some other things that would be great additions. Honestly feels like this last year was Blizzards way of beta testing the game prior to their new expansion.
Game updates are overall good. Brought it back to where it should have been at launch. Will it keep me entertained the entire season? Not a chance. Im 2 days in and getting bored of the repetition. Helltides to WT4, then NM dungeon until glyphs at least lvl 15, then to the 100 stuff, if not there already. But ive also already made each character and leveled to 100 in previous seasons. So i guess the desire to make alts isnt there now, but may be for newer people playing. If you bought the game, then there's no reason why you shouldn't give it a run for a day or two, but I wouldn't buy the game just because of this patch.
Not a fan of making us pay 4 additional times just to fight the lords of hell though. What's a Diablo game without Diablo!!
submitted by Baby_Dahl28 to diablo4 [link] [comments]


2024.05.16 23:23 face_eater_5000 I think this qualifies as a bad suggestion

I think this qualifies as a bad suggestion submitted by face_eater_5000 to facepalm [link] [comments]


2024.05.16 23:16 GelatoGuam Best 140 hours I’ve spent

Best 140 hours I’ve spent submitted by GelatoGuam to ironscape [link] [comments]


2024.05.16 23:15 Adventurous-Age-8043 Web sign-in on Windows 11 Pro device not working with Google federated MS 365 credentials

Hi all,
I am new to IT administration with no prior experience in the field. My organization has tasked me with enrolling all of our Windows devices into an endpoint management solution and configuring them. I am experimenting with one Windows device so before configuring all the computers at my org.
I have added "enable web sign in" and "configure web sign in allowed urls" configuration policies in the Microsoft Intune Admin Console and pushed the changes to the device I am experimenting with. Web sign-in is now an option on the device.
When a user attempts to log-in with their federated credentials on the Microsoft log-in screen, they are then re-directed to Google for sign-in. No problems so far. The issue is that after they are authenticated by Google, they are re-directed to an "Action Required" Microsoft page. Pressing the next button then produces an error that says: "We can't open that page right now. For security reasons you'll need to visit the page from a browser or a different device. If you think you've reached this page because of an error, tell you organization's IT support that you can't access https://mysignins.microsoft.com/api/post/registrationinterrupt".
I tried adding the previous URL to the "configure web sign in allowed urls" compliance policy on Intune. I previously resolved that same error with a different URL by adding it to the Intune policy. I suspect that what Microsoft is trying to do is get the user signing in to register into Microsoft Authenticator for MFA but the Intune policy has not set permissions to allow the visiting of whatever web page in web sign-in. Logging-into any MS site via a browser with the same credentials immediately works after Google authentication.
Wondering if anyone that has ever configured web-sign in on Windows for their organization with federated Google credentials has encountered this issue before. Thank you for your help.
submitted by Adventurous-Age-8043 to sysadmin [link] [comments]


2024.05.16 23:14 Adventurous-Age-8043 Web sign-in on Windows 11 Pro device not working with Google federated MS 365 credentials

Hi all,
I am new to IT administration with no prior experience in the field. My organization has tasked me with enrolling all of our Windows devices into an endpoint management solution and configuring them. I am experimenting with one Windows device so before configuring all the computers at my org.
I have added "enable web sign in" and "configure web sign in allowed urls" configuration policies in the Microsoft Intune Admin Console and pushed the changes to the device I am experimenting with. Web sign-in is now an option on the device.
When a user attempts to log-in with their federated credentials on the Microsoft log-in screen, they are then re-directed to Google for sign-in. No problems so far. The issue is that after they are authenticated by Google, they are re-directed to an "Action Required" Microsoft page. Pressing the next button then produces an error that says: "We can't open that page right now. For security reasons you'll need to visit the page from a browser or a different device. If you think you've reached this page because of an error, tell you organization's IT support that you can't access https://mysignins.microsoft.com/api/post/registrationinterrupt".
I tried adding the previous URL to the "configure web sign in allowed urls" compliance policy on Intune. I previously resolved that same error with a different URL by adding it to the Intune policy. I suspect that what Microsoft is trying to do is get the user signing in to register into Microsoft Authenticator for MFA but the Intune policy has not set permissions to allow the visiting of whatever web page in web sign-in. Logging-into any MS site via a browser with the same credentials immediately works after Google authentication.
Wondering if anyone that has ever configured web-sign in on Windows for their organization with federated Google credentials has encountered this issue before. Thank you for your help.
submitted by Adventurous-Age-8043 to Intune [link] [comments]


2024.05.16 23:10 Artistic-Buy1062 [FNV] I keep getting random crashes and don't know what to do

As the title says, I keep getting random crashes with "Exception C0000005 caught!" in the crashlog. I tried uninstalling NVHR and it solved the problem for a while, I already downloaded the last JIP beta in the xNVSE discord but it keeps happening and it appears to be random, because sometimes I can play like for an hour or longer but other times it crashes after five minutes or so, the last one happened fifteen minutes after I opened the game. Here is my loadorder:
  1. FalloutNV.esm
  2. DeadMoney.esm
  3. HonestHearts.esm
  4. OldWorldBlues.esm
  5. LonesomeRoad.esm
  6. GunRunnersArsenal.esm
  7. Fallout3.esm
  8. Anchorage.esm
  9. ThePitt.esm
  10. BrokenSteel.esm
  11. PointLookout.esm
  12. Zeta.esm
  13. CaravanPack.esm
  14. ClassicPack.esm
  15. MercenaryPack.esm
  16. TribalPack.esm
  17. TaleOfTwoWastelands.esm
  18. YUPTTW.esm
  19. NavmeshOverhaul.esm
  20. TTW Ultimate Invisible Wall Remover.esm
  21. FO3_Optimization.esm
  22. Main And Pause Menus Overhaul.esm
  23. TweaksTTW.esm
  24. Tale of Bi Wastelands.esm
  25. TTW Reputations.esm
  26. Tale of Bi Wastelands + TTW Reputations Patch.esm
  27. TTW New Vegas Speech Checks.esm
  28. TTW New Vegas Speech Checks - TTW Reputations Patch.esm
  29. Tale of Bi Wastelands + TTW NV Speech Checks Patch.esm
  30. Functional Post Game Ending.esm
  31. Functional Post Game Ending - TTW Patch.esm
  32. TLD_Travelers.esm
  33. A Trail of Crumbs.esm
  34. Regulators.esm
  35. Uncut Wasteland.esp
  36. Uncut Extra Collection.esp
  37. Functional Post Game Ending - Uncut Wasteland And Extra Collection Patch.esm
  38. AWorldOfPainFO3.esm
  39. Sweet Pain.esm
  40. A World of Pain Revised.esm
  41. Sweet Pain NV.esm
  42. MoreMojave.esm
  43. Home and Safehouse Tweaks.esm
  44. Home and Safehouse Tweaks - TTW Addon.esm
  45. Lootable Statics.esm
  46. zl_Armaments_Remastered.esm
  47. Tammer's NIF-Bashed Weapons Mega-Pack.esm
  48. [RWM]-Complete.esm
  49. mil.esp
  50. mil-TTWPlacements.esp
  51. mil_Add-On.esp
  52. Tactapack.esp
  53. SD_Transporters.esp
  54. Pl DOCTORS.esp
  55. CFEE.esp
  56. CFEE - TTW.esp
  57. drgNV - Melissa Companion.esm
  58. IFoundThoseWhoCare.esp
  59. The Mod Configuration Menu.esp
  60. TLD LVLI Total Overhaul.esp
  61. TTW FaceGen Fix.esp
  62. Vanilla UI Plus.esp
  63. Power Armor Holo Panel.esp
  64. PAHP_Edits.esp
  65. PipBoyUITweaks.esp
  66. ExRB-TTW.esp
  67. FOVSlider.esp
  68. ItemCards.esp
  69. 3DGrenadeIndicator.esp
  70. QuickSelect.esp
  71. SimpleNightVision.esp
  72. Immersive Minigames.esp
  73. NVCollectiblesMerged.esp
  74. TTWCollectiblesMerged.esp
  75. [RWM]-Complete Added.esp
  76. Casino Exchange All.esp
  77. DelayDLCRedux.esp
  78. Root 'n Loot.esp
  79. JIP Companions Command & Control.esp
  80. JustAssortedMods.esp
  81. JBTImproved.esp
  82. ImmersiveRecoil.esp
  83. Reload Reloaded.esp
  84. DynamicDetectionSystem.esp
  85. TTWZetaRewards.esp
  86. TTWTransportalponderEx.esp
  87. Supplemental Ammo Crafting.esp
  88. Benny Humbles You and Steals Your Stuff.esp
  89. GRA Scavenger Hunt Unbalanced.esp
  90. GUWR - TTW Patch.esp
  91. DelayDLCReduxPOPP.esp
  92. SP TTW Patch.esp
  93. MoreMojave - FPGE Patch.esp
  94. TTW No PipBoy Glove Equipping or Race Changes.esp
  95. MigArmorDegen.esp
  96. MigCrippled.esp
  97. New Blood.esp
  98. S6S Base Game Perks Redux.esp
  99. S6S Base Game Perks Redux TTW Side.esp
  100. S6S Perks.esp
  101. Friends With Benefits Perk Pack.esp
  102. Vegas Elysium.esp
  103. ImmersiveSleepEncounters.esp
  104. Unmissable Casino Rewards.esp
  105. RAD.esp
  106. New Blood TTW Patch.esp
  107. Classic Fallout Weapons Remastered v1.2.esp
  108. FNV+LR Flare Gun to 12Ga Flare Conversion.esp
  109. Tammer's KNVSE Mega Patch.esp
  110. Sweet Consumables.esp
  111. Aid Addon.esp
  112. Healing Systems.esp
  113. Unfound Loot.esp
  114. WeaponRequirementSystem.esp
  115. B42Inertia.esp
  116. PurchaseDisplay.esp
  117. Quickthrow.esp
  118. QuickthrowTweaks.esp
  119. Simple Explosive Entry.esp
  120. Simple Explosive Entry Tweaks (Easy Pete).esp
  121. Forced Entry.esp
  122. TTW Dialogue and Interactions Expansion Overhaul.esp
  123. DIEO - Tale of Bi Wastelands Patch.esp
  124. DIEO - AWOPFO3 Patch.esp
  125. TTW A Tribe of Two.esp
  126. DLC Followers All-In-One.esp
  127. TiesThatBind.esp
  128. CFEE - TTW Both ED-E Perks.esp
  129. CFEE - No Companion Limit.esp
  130. CFEE - DLC Companions AIO.esp
  131. CCO - Ulysses Companion.esp
  132. CFEE - Amanda TTW.esp
  133. CFEE - Ties That Bind - Dad Expansion.esp
  134. BennyReturns.esp
  135. drgNV - Marcus Companion.esp
  136. TheAIMerge.esp
  137. IRNPC.esp
  138. AintThatAScarInTheHead.esp
  139. TTW Pitt Rot.esp
  140. RadiationVisuals.esp
  141. Impostors and LOD Flicker Fix.esp
  142. NVMIM.esp
  143. Enhanced Movement.esp
  144. ArmedToTheTeethNV-Redux.esp
  145. Titans of The New West.esp
  146. STAR TTW 2.esp
  147. More Perks v3.esp
  148. Dead Money - Elijah's Rambling Last Words.esp
  149. Dynamic Terrifying Presence.esp
  150. Atmospheric Lighting Tweaks TTW.esp
  151. Natural Interior.esp
  152. DNWeathers.esp
  153. Interior Rain.esp
  154. Interior Rain - TTW.esp
  155. CC - Rain.esp
  156. CC - 3D Rain.esp
  157. LOD additions and improvements - TTW Patch.esp
  158. Viva New Vegas - LOD.esp
  159. Diagonal movement.esp
  160. S6S Big Guns Implementation.esp
  161. SimpleHairs.esp
  162. SimpleHairs - Color.esp
  163. Mutant Eyes.esp
Here's the modlist:
+Character Kit Remake - Teeth
+Uncut Wasteland Extra Collection CKR Patch
+Uncut Wasteland CKR Patch
+Sweet Pain DC CKR Patch
+TTW A World of Pain for Fallout 3 CKR patch
+Transporters - Immersive Fast Travel CKR Patch
+The Living Desert CKR patch
+Sweet Pain NV CKR Patch
+AWOPR CKR Patch
+MoreMojave CKR Patch
+FPGE CKR Patch
+Character Kit Remake TTW Facegen
+Character Kit Remake
+JIP_LN_NVSE_Plugin
+Wasteland Eyes - Mutant Eyes Lite
+Mutant Eyes
+Female eyes clipping FIX
+Shotgun Buffs
+Dynamic Terrifying Presence NVSE
+NV Collectibles - Merged
+Dead Money - Elijah's Rambling Last Words
+Pre-War Money Retexture
+Natural eyes by zzjay
+Hair Patcher Two ESPLess
+Simple Hairs - New Vegas
+S6S Perks Patches
+S6S Perks and Tammer Weapon Pack Compatiblity Patch
+dree74 More Perks Upscaled (and Regular-ified Art pack)
+More Perks Reimagined
+S6S Big Guns Implementation
+TTW Extra Special Love Tester
+(Unbalanced - Overpowered) Sweet Perk Overhaul
+FO4-style SPECIAL plus Infinite Intense Training - ESPless
+NV Compatibility Skeleton
+Diagonal movement
+TTW LOD
+TTW Ain't That A Scar In The Head
+TTW Pitt Rot
+I Found Those Who Care - New Ending for Veronica (TTW)
+A Tiny Perk Styled Pack (an add on for JIP - CCC)
+JIP CCC Perk Styled Collection
+Perk Style CCC Icons Modded Companions
+Perk Styled CCC Icons
+Marcus Patch
+Ulysses Patch
+Benny Returns Patch
+Melissa Patch
+DLC Companions AIO Patch
+Ties That Bind - Dad Expansion
+Ties That Bind Patch
+No Companion Limit
+ED-E Both Perks
+CFEE - A Complete Companion Overhaul
+Marcus Companion
+Ulysses Companion Mod
+Benny Returns
+Melissa Lewis Companion
+DLC Companions - All-In-One
+Ties that Bind - TTW Conversion
+Ties that Bind - a narrative companion mod
+A Tribe of Two
+Armed to the Teeth - Redux
+STARS TOTNW Patch
+PAVE TOTNW PatchTitans of Steel Version
+Tesla Armor Mods x consistent pip-boy icons - Classic Tesla Armor Icons
+TTW Goodies
+Consistent Pip-Boy Icons v5 - Dynamicon
+Consistent Pip-Boy Icons v5 - Stats (and Some Perks)
+Consistent Pip-Boy Icons v5 - Reputation
+Consistent Pip-Boy Icons v5 - Addendumb
+Consistent Pip-Boy Icons v5 - Vault Girl Extension
+Consistent Pip-Boy Icons v5 - Extension
+Consistent Pip-Boy Icons v5 - DLC's Items
+Consistent Pip-Boy Icons v5 - Apparel
+Consistent Pip-Boy Icons v5 - Weapons
+Consistent Pip-Boy Icons v5 - Items
+3. CPI - Mod Patches
+1. Consistent Pip-boy Icons
+Map Marker Icons
+Pop-Up Message Icons
+Consistent Pip-Boy Icons v5 - Framework Plugin
+PipBoyOn Node Fixes
+STARS TTW - Sweet's Total Armor Rework System
+Classic Lightweight Leather Armor Replacer
+Classic Leather Armor Replacer for Leather Armor
+Salvaged Armor
+Modern Gunslinger Armor
+Bone Harvester - Tribal Cannibal
+Wasteland Stealth Armor NV
+The Road Warrior Armor
+Psycho Armor and Mask
+Metal Armor MkI
+WW2 M1 Helmets
+AKIRAMORI Tactical Gloves
+Altyn Helmet - Retro Tactical Headgear
+Wasteland Seeker Armor
+Geonox Riot Armor - Female Version -
+Geonox Riot Armor
+KORs Pistol Harness
+Fallout Tactics Brotherhood Metal Armor Integration
+Classic Tesla Armor
+Mercenary Wanderer
+Searchlight Firefighter Outfit
+Fallout Revelation Blues Mega Armor Pack
+Fallout The Odyssey Mega Armor Pack
+Arsthetiu's Armoire - A Nif-Bashed Armour Collection
+Classic Fallout Tesla armor
+DVA - Distributed Variety Armors - Hats Headgears Accessories
+Petal Gasmask
+Canvas Backpacks - FNV - TTW
+Waster Gear - TTW - FNV
+The Lone Wanderer - TTW and NV
+NCR Commando
+GP-5 Gasmask
+Courier Duster Replacer
+Ballistic Skull Mask
+Tribal Power Helmet - Definitive Edition
+Classic Combat Armor Replacer Combined (TTW)
+Classic Replacers for TTW
+Classic Combat Armor Replacer Redux
+Classic Fallout 2 combat armor Mark 2 (remastered)
+Classic Fallout 2 Metal armor Mk II
+Classic Fallout Metal Armor
+Veronica Outfit Replacer
+Unique Troublemaker Outfit-Nightstalker Set
+DogTooth Enclave Officer
+The BLACKJACK pack - Tons of armors for VANILLA bodys
+Power Armor Visual Enhancement (PAVE)
+Deus Specs
+Spice of Life
+Tammer's NIF-Bashed Armor Mega-Pack v4.2
+Book of Steel - Compatibility Edition
+nov 2011 book of steel
+Wasteland Soldier Redux NV
+Wasteland Soldier - NV Edition
+No PipBoy in Power Armor
+Simple Headshots
+SIDE - Simple Items Distributed Everywhere
+Immersive Recoil NPC
+Simple Explosive Entry Tweaks
+Simple Explosive Entry
+Immersive Sleeping Encounters
+Forced Entry
+Sweet Keywords
+Camping - ESPless
+Bottle the Water
+Unmissable Casino Rewards
+TTW Collectibles - Merged
+SMAC - Simple Melee Attack Canceling
+Simply Less Junk. esp-less
+Purchase Items on Display (xNVSE)
+Point Lookout Doctors TTW
+Movable Statics replaced with Lootable versions - ESPless
+Lootable Statics Compatibility Edition - Base Object Swapper
+Base Object Swapper
+Hardcore Forever
+Cookable Grenades
+Benny Fighting Chance
+B42 Quickthrow Perks
+B42 Quickthrow - an alternative grenade hotkey mod
+B42 Optics TTW Patches
+B42 Optics NV Patches
+Tactapack - B42 Optics Patch
+Classic Fallout Weapons Remastered B42 Optics Patch
+Another Millenia and Addon - B42 Optics Patch
+B42 Optics - ESPless
+Desert Natural Weathers - NV - TTW
+Climate Control - 3D Rain
+Climate Control - Rain
+3D Rain
+Interior Rain - TTW
+Interior Rain
+Longer Weather Transitions ESPless
+Natural Interiors
+Atmospheric Lighting Tweaks (Interior Lighting for FNV and TTW)
+Iron Sights Aligned - Mod Support
+Iron Sights Aligned
+Wasteland Warrior - A Melee Animation Overhaul
+Butcher Pete Complete - A Melee Animation Overhaul
+New Vegas Animation Overhaul Guns
+Anniversary Anim Pack
+B42 Weapon Inertia
+ISControl
+3rd Person Animation Fixpack
+VNV - LOD Patches
+LOD additions and improvements - TTW Patch
+Wasted LOD - Cliffs of DC
+LODIFY FNV Wall_SoGB Editon
+LODIFY - Level of detail improvement for your Fallout (TTW And NV Lods)
+Different LOD mods little tweaks and additions
+Wasted LOD - Cliffs of Mojave
+More LODs Additions and fixes
+TCM's LOD Overhaul
+Optional Overpasses
+FNV LOD Supplementation
+LOD additions and improvements
+Much Needed LOD fixed rocks color
+Much Needed LOD
+LOD Fixes and Improvements - NVSE
+Impostors and LOD Flicker Fix
+Mobile Pip-Boy Light - NVSE
+Mainframes Litter Flickering Fix
+Fallout 3 TTW Interior Optimization Project
+ExRB - Extended Roombounds
+Items Transformed - Enhanced Meshes (ITEM)
+Meshes and Collision - Totally Enhanced Nifs (MAC-TEN)
+New Vegas Mesh Improvement Mod - NVMIM
+Collision Meshes FNV
+Collision Meshes FO3
+TTW Ultimate Invisible Wall Remover
+Improved AI (Navmesh Overhaul Mod)
+Sweet Healing Systems
+Sweet Consumables
+ySI - Sorting Icons - S6S Aid Addon patch
+Aid Addon
+New Blood
+More Rads No Irradiated Lonesome Road
+RAD - Radiation (is) Actually Dangerous - Overhaul
+Unfound Loot - Harder core settings ini
+Unfound Loot
+Harder Barter Faster Stronger
+TOTNW One Hand Animations For Another Millenia plus Addon
+Titans of The New West
+Tactapack
+ZL Armaments Remastered
+KNVSE Animation Mega Patch for Tammer's Weapons
+Tammer's NIF-Bashed Weapons Mega-Pack v6.0
+SDS CFWR Patch
+Classic Fallout Weapons Remastered
+Another Millenia Gun Add-on
+Another Millenia - TTW Unique Placements
+Another Millenia
+DIEO - AWOPFO3 Patch
+DIEO - Tale of Bi Wastelands Patch
+TTW (D.I.E.O.) Dialogue and Interactions Expansion Overhaul
+GRA Unique Weapons Relocated - TTW Patch
+GRA Unique Weapons Relocated
+TTW The Regulators
+TTW A Trail of Crumbs
+Functional Post Game Ending - Uncut Wasteland And Extra Collection Patch
+Uncut Extra Collection
+Uncut Wasteland
+MoreMojave - FPGE Patch
+MoreMojave Terrain LOD
+MoreMojave
+Sweet Pain TTW
+Sweet Pain NV
+A World of (Less) Pain - A Lore Friendly AWOP Revision
+Sweet Pain DC
+TTW A World of Pain for Fallout 3
+The Living Desert Leveled List Overhaul
+The Living Desert - Travelers Patrols Consequences Increased Population and more
+Functional Post Game Ending
+B42 True Leaning - Custom INI
+B42 True Leaning - Contextual - ESPless
+Immersive Minigames
+Vegas Elysium Perk Pack
+Levelup Traits
+Friends With Benefits Perk Pack
+Sweet 6 Shooter Perks - TTW - NV
+Sweet Perk Overhaul
+NPCs Sprint kNVSE - ESPless
+Enhanced Movement INI
+Enhanced Movement
+Supplemental Ammo Crafting
+Sweet Dynamic Detection System
+Simple AI Merge
+Sweet's Configuration
+Weapon Jamming Tweaks - ESPless
+Reload Reloaded
+Immersive Recoil 2.0
+B42 FireMode - Selective Fire and First Shot Precision - ESPless
+Weapon Requirements System
+Real Weapon Mods 2 Rebalanced
+Real Weapon Mods 2
+Armor Damage Overhaul - Custom INI
+ADO - Armor Damage Overhaul
+Better Damage Multipliers
+Crippled Limb Reaction Enforcer
+Transporters - Fast Travel Alternative
+TTW Transportalponder Extended
+Home and Safehouse Tweaks INI File
+Home and Safehouse Tweaks
+JIP CCC HD icons
+JIP Companions Command and Control
+JAM - Custom INI
+Bullet Time Improved - a JAM addon
+Clean Just Assorted Mods (JAM)
+JAM - Just Assorted Mods
+Nail Gun Semi Auto Rework
+BHYSYS Custom INI
+(Benny Humbles You) and Steals Your Stuff
+Delay DLC Redux
+TTW - Mothership Zeta Rewards
+Charisma Tweaks (NVSE)
+Tale of Bi Wastelands TTW Patches for TTW Reputations and TTW New Vegas Speech Checks
+Tale of Bi Wastelands TTW
+TTW New Vegas Speech Checks - TTW Reputations Patch
+TTW New Vegas Speech Checks
+TTW Reputations
+TTW Merchant Supply Expansion
+Hardcore Perk Every Level
+Casino Exchange All
+Better Caravan
+Root 'n Loot TTW
+Tweaks for TTW Custom INI
+Tweaks for TTW
+ESP-less Tutorial Killer
+Simple Night Vision
+Radiation Visuals
+Drowning Visuals - ESPless
+Quick Select - A Zelda BOTW Style Quick Menu
+3D Grenade Indicator
+Item Cards Custom INI
+Item Cards
+Instant and Faster Pipboy (No Stutter)
+Pip-Boy UI Tweaks
+High Res Local Maps
+Simple Maps - TTW
+Clean Companion Wheel
+Vault Boy Paper Doll
+High Resolution Screens
+Vanilla Fonts Revisited
+MAPMO WSG Preset
+Extras - Stewie's Tweaks Sorting Icons Replacer
+Extras - Hi-Res Logos
+MAPMO - Main and Pause Menus Overhaul
+Recent Loot Log - ESPless
+B42 Notify - Corner Messages Overhaul - ESPless
+Clean Vanilla Hud
+Alternate Holographic Panel - No PipBoy in Power Armor
+Simple Power Armor HUD
+FOV Slider
+ySI Vanilla MiscQuest Items Patch
+ySI Sorting - Extended NV-TTW
+Sleep Wait Hardcore Needs
+Radiation Loadwheel
+Scum's Considerably Cute Corner Load Wheel
+Main Menu Redone - TTW
+ySI - Pick Up Prompts
+ySI - Colorful Icons Fix
+Colorful Inventory Ycons
+ySI - Sorting Ycons
+yUI - User Ynterface
+Vanilla UI Plus (New Vegas)
+The Mod Configuration Menu
+Vanilla Animations Weapon Scale Fix
+TTW Combat Shotgun HQ Reload Sounds
+TTW 32 Pistol Projectile Clipping Fix
+Tranquility Lane Pipboy Glove and Custom Race Fix
+Ranger Combat Helmets Clipping Fix
+NPCa - NPC Prevention of Chem addiction - ESPless
+MZ Holding Cells Fog Clip Distance Fix
+Money Fixer - ESPless
+Melee VATS Animation Restoration
+Laser Pistol 3rd Person Latch animation fix
+Gun Runners Kiosk Glass Fix
+Gauss Impact Fix - ESPless
+Freeside Neon Sign Fix
+Female Pipboy Aligned
+Viewmodel Shading Fix - NVSE
+MoonlightNVSE
+zlib Updated - NVSE
+Weapon Mod Description Fix (TTW)
+Viewmodel Shake Fix - NVSE
+Vent Lighting Fix
+Swimming Creatures Fix - ESPless
+Smooth True Iron Sights Camera
+Pip-Boy Shading Fix NVSE
+Muzzle Flash Light Fix - NVSE
+Mostly Fixed FaceGen Tints (NV or TTW)
+JIP Localized Damage Fix
+Improved Lighting Shaders
+High Resolution Water Fog - Water Aliasing Fix
+High Resolution Bloom NVSE
+Fog-based Object Culling
+Fallout Alpha Rendering Tweaks - NVSE
+External Emittance Fix - NVSE
+Equip and Movement Speed Fix - ESPless
+Depth of Field Fix - NVSE
+Consistent Spread - Firearms Accuracy and Wobble Fix
+Aqua Performa - Strip Performance Fix
+Cloud Upgrade NVSE
+Climate Control NVSE
+SUP NVSE
+AnhNVSE
+KEYWORDS
+UIO - User Interface Organizer
+ShowOff xNVSE Plugin
+Basic Console Autocomplete
+Console Paste Support
+Improved Console (NVSE)
+kNVSE Animation Plugin
+FNV Mod Limit Fix
+ActorCause Save Bloat Fix
+VATS Lag Fix
+Combat Lag Fix (NVSE)
+lStewieAl's Engine Optimizations
+Stewie Tweaks Custom INI
+Stewie Tweaks Essentials INI
+lStewieAl's Tweaks and Engine Fixes
+NVTF - INI Presets
+NVTF - New Vegas Tick Fix
+Yvile's Crash Logger
+JohnnyGuitar NVSE - INI Presets
+JohnnyGuitar NVSE
+JIP LN Custom INI
+JIP LN NVSE Plugin
+ROOGNVSE Plugin
+Tales of Two Wastelands
submitted by Artistic-Buy1062 to FalloutMods [link] [comments]


2024.05.16 23:08 vane1978 RDP + SSO + MFA - No VPN - Your thoughts

I came across this Microsoft link below, and it says you can RDP into a remote Azure AD Join computer.
Use the Remote Desktop Connection app to connect to a remote PC using single sign-on with Microsoft Entra authentication
I gave it a try and seems to work great without the need of VPN, and I did NOT have to open an RDP port on my router.
Here's what I've learned enabling this feature.
  1. Add my Azure AD credentials on the Azure AD Joined remote computer
  2. Add my user account to the "Remote Desktop Users" group
  3. Enable RDP
  4. Enabled NLA
  5. Created a Conditional Access policy to require MFA and Session Control whenever I need to RDP into the Azure AD Joined Computer. See link.
Log on to the local Hybrid AD joined computer using the same Azure AD Credentials, launch the RDP client, go to the Advanced Tab, and check the box Use a web account to sign in to the remote computer. Click "Connect", and a mini web browser appears, requesting me to enter my MFA Number Matching code. After entering the code, I'm remoted into my Azure AD Joined computer.
My question is, how secure is this? I did not supply a password. I basically SSO with MFA enabled into the remote computer. Also, the RDP traffic is encrypted with TLS 1.2.
I can't ping the remote computer by IP address nor by computer name.
I know that in the past and still to this day, in best practice, VPN should be used, but in this case, it doesn't seem necessary. What are everyone's thoughts on this?
submitted by vane1978 to sysadmin [link] [comments]


2024.05.16 23:06 Real-Slim-Katie Wallowing in self pity

I'm sure there's nothing I can do at this point...but to make a short story long, here we go... Last July and for 18 years leading up to that, I had been an avid iTunes user, starting with gen 1 iPod. At some point mid-july 2023, I got logged out of my account. No big deal, I thought, because this happened periodically and I figured it was some glitch Apple had. I tried to log back in and it didn't let me. I tried to reset the password, wouldn't let me. I kept getting the message saying my apple ID was inactive. I waited a few weeks because I thought maybe I locked myself out or something, and then I called support. They put a request to reactive my account. I received an email later the next day saying I was ineligible for reactivation.
I called support and spoke with a lady who couldn't give me any information as to why I wasn't eligible, she just said I must have broken the TOS and to go read them and figure it out. So I read through that, (first time ever reading a whole TOS btw) and there was nothing I couldn't tell that I had done. I've never even shared my password.
Anyways, I'm super bummed, I tried again unsuccessfully in Oct, and another time today (5/16/24) to no avail. She told me I can't just be asking for reactivation over and over. And said I'm welcome to make a new ID. I asked her if apple thinks I committed fraud and closed down my account, why are they ok with me making a new account? Sounds sketch like they're just trying to boast new subscriber numbers to shareholders. She couldn't answer, and said she didn't know but it made sense that they shouldn't be ok with it if they really did think I was a fraud.
I guess my question is, is there anything else I can do to get my account back? I had that account so long and had so much purchased music on it, it's like theft because I can't get the music off my account. I'm lucky I store my pictures elsewhere or I'd be out those pictures too. I'm sure I'm SOL, but if there are any suggestions, please share.
Thanks
submitted by Real-Slim-Katie to applehelp [link] [comments]


2024.05.16 23:05 Adventurous-Age-8043 Web sign-in on Windows 11 Pro device not working with Google federated MS 365 credentials

Hi all,
I am new to IT administration with no prior experience in the field. My organization has tasked me with enrolling all of our Windows devices into an endpoint management solution and configuring them. I am experimenting with one Windows device so before configuring all the computers at my org.
I have added "enable web sign in" and "configure web sign in allowed urls" configuration policies in the Microsoft Intune Admin Console and pushed the changes to the device I am experimenting with. Web sign-in is now an option on the device.
When a user attempts to log-in with their federated credentials on the Microsoft log-in screen, they are then re-directed to Google for sign-in. No problems so far. The issue is that after they are authenticated by Google, they are re-directed to an "Action Required" Microsoft page. Pressing the next button then produces an error that says: "We can't open that page right now. For security reasons you'll need to visit the page from a browser or a different device. If you think you've reached this page because of an error, tell you organization's IT support that you can't access https://mysignins.microsoft.com/api/post/registrationinterrupt".
I tried adding the previous URL to the "configure web sign in allowed urls" compliance policy on Intune. I previously resolved that same error with a different URL by adding it to the Intune policy. I suspect that what Microsoft is trying to do is get the user signing in to register into Microsoft Authenticator for MFA but the Intune policy has not set permissions to allow the visiting of whatever web page in web sign-in. Logging-into any MS site via a browser with the same credentials immediately works after Google authentication.
Wondering if anyone that has ever configured web-sign in on Windows for their organization with federated Google credentials has encountered this issue before. Thank you for your help.
submitted by Adventurous-Age-8043 to Office365 [link] [comments]


2024.05.16 22:58 No_Contribution2629 Randomly started a cycle of on and off, trying to start in safe mode.

I was playing satisfactory on a private dedicated server hosted on the same PC. I was playing for about 4 hours and suddenly the computer turned off, then turned back on. Then turned back off, then back on and started up in safe mode. I flipped the switch on the black of the PSU off and waited a few minutes and flipped it back on. It started up normal, I ran heaven benchmark and watched temps, nothing out of the norm, ran cinebench, still nothing out of the norm. Shrugged it off and continued playing. About two hours in, it happened again. I haven't tried it since. I'm worried something may need replacing but I don't know where to begin.
Specs: Amd Ryzen 5900 Asus ROG 470f motherboard 32gb (4x8gb)Ddr4 Corsair ram 3200mhz EVGA p1000 PSU Samsung 980evo m.2 SSD 2tb Evga 3090 ftw3 Windows 11 home
CPU and GPU are liquid cooled with GPU having an active water cooled backplate and 10 fans, three on the front, three on the outer side, and one on the rear all pulling in, and three on the top for exhaust.
If anyone could give me an idea of a log to look at or what to check, It'd be greatly appreciated.
submitted by No_Contribution2629 to pchelp [link] [comments]


2024.05.16 22:48 Webber-414 A different error message that leads to crashing on launch

A different error message that leads to crashing on launch submitted by Webber-414 to thefinals [link] [comments]


2024.05.16 22:46 Mr-Crusoe Downloading RetroArch cores takes forever?

I am just reinstalling ewmudeck on my windows PC and somehow the download of the RetroaAtch cores takes forever (over an hour right now, no end in sight). Any ideas?
The log gives me this for all the different cores so far (sorry for the german windows); Remove-Item : Der Pfad "C:\Users\Crusoe\EmuDeck\EmulationStation-DE\Emulators\RetroArch\cores\bluemsx_libretro.dll.zip"
kann nicht gefunden werden, da er nicht vorhanden ist.
In C:\Users\Crusoe\AppData\Roaming\EmuDeck\backend\functions\downloadCore.ps1:12 Zeichen:4
ItemNotFoundException
Remove-Item : Der Pfad
"C:\Users\Crusoe\EmuDeck\EmulationStation-DE\Emulators\RetroArch\cores\bluemsx_libretro.dll.zip" kann nicht gefunden
werden, da er nicht vorhanden ist.
In C:\Users\Crusoe\AppData\Roaming\EmuDeck\backend\functions\downloadCore.ps1:12 Zeichen:4
submitted by Mr-Crusoe to EmuDeck [link] [comments]


2024.05.16 22:34 just-hussain Remote Access and switching between two networks

Here's my current dumb setup: Plex Media Server running 24/7 on a Windows 10 laptop. I have two networks, from two routers. First: Building's network, Remote Access works on it with no issues, can auto setup without having to manually forward a port and my device's IP is static and doesn't change. I have no control over this router. Second: my mobile router with my own 5G network, this one I take with me when I go out. I have control over it and have enabled UPnP on it and reserved a static IP for my device.
My network's upload speed is faster than the building's, so when I'm home I wanted connected to it. When I leave, it switches back to the building's network.
The IP I reserved for my device on my router is the same static IP the building's router assigns to me. I don't know if this is a dumb idea, but felt like a simple solution. I know I can figure out DDNS but was putting it off for a simpler solution for now.
The issue: when I connect the device to my network, Remote Access showes as accessable for about 10 seonds then fails. I tried to manually forward the port and test, same issue.
Honestly not sure if I screwed something up by the IP reservation. It connected find on my network before this change.
I appreciate your thoughts on this! or should I just own it up and setup DDNS ? just wanted to at least know why this doesn't work.
submitted by just-hussain to PleX [link] [comments]


2024.05.16 22:34 mangosteen16 Got my MBA M2 (30 characters)

Hi guys, I got my MBA M2 8/256 13.6 inches from a friend. She bought it last week of Feb 2024 and pinapang Netflix lang, so she sold it instead.
Cycle Count: 8 Battery: 100%
So parang bumili na din me ng Bnew, super steal kasi with accessories pa. So I don’t need to buy na parang complete na din sya eh, haha.
I am almost done sa set up like add ng mga Google acc, install ng mga apps, and all. I am iPhone user naman kaya okay d ganon kahirap. Pero yung mga keys talaga 😭 Ewan sanay lang ako sa windows.
Guys pano po yung notes ni macbook. Kagaya ng sticky notes sa Windows. Yung auto-save, floating lang, since I need it always sa work. Also, aside from Krisp. Meron ba kayong cheap na noise cancellation na app for Mac?
Addition, Pano ba to? Dapat ba shut down or sleep lang? Any tips please 😭 I have clear na cover case. Recommended ba sya or no?
Yan talaga struggle ko bukod sa screen nya kala ko mejo malaki. I have an extra monitor naman.
I’m still wondering if this is worth it or if I should have stayed sa plan ko na nag HUAWEI D16 2024. LOL, OR BAKA BENTA KO SYA IF D TALAGA HAYS
For reference. I posted about choosing between Mac or Windows months back and most answer is go to Mac. https://www.reddit.com/buhaydigital/s/9KRITqLHqT
SEND HELP.
submitted by mangosteen16 to buhaydigital [link] [comments]


2024.05.16 22:10 wickedilluminations I'm losing my insanity!

first let me start by saying I'm not tech savvy but I need opinions and suggestions on what to do! I apologize in advance but I'm under an extreme amount of stress and don't want to leave any detail out.
I have been using my MacBook pro m1 for a couple of years without issue. my MacBook started acting up about a month ago. I could not purchase apps in the store so I called apple support. We spent 3 hours on the phone working with it. first they had me update, which i was hesitant (eventually agreed) but that didn't solve the issue. then they concluded family share was the problem. after fixing the family share everything worked and I thought my problem was solved; unfortunately that was the last time it operated properly.
over the next several weeks my Mac seemed slow and I had problems with things, I figured it was user error since I had updated to macos 14.1.1. then "mo" from a large trusted legal firm emailed me a pdf, I downloaded it and attempted to open but pdf expert wouldn't open it and said it was "corrupt". one of "mo's" colleague "jo" emailed me a link to download Corp documents. the link directed me to the firm's website where I had to put my email address and name in order to login. after I logged in I clicked select all and downloaded them. they download in a .zip format but my Mac couldn't/ wouldn't unzip of open them so I downloaded them individually. after this I emailed "mo" to inform her the pdf was corrupt but she didn't seem concerned so I didn't worry.
2 days ago "jo" and I had discussed scheduling a call at 4, I confirmed I would be available and waited for her to call but it never came. the next morning i sent an email asking if she forgot about me but she denied that I had confirmed my appointment. I knew I had confirmed but figured I responded to the wrong person. I set with my Mac in front of me and my email open awaiting her reply but 2 hours later i hadn't received email from anyone so I refreshed my the mail app. when I done this i saw the only email I had received was from "mo" so I open and read it. after reading it I closed it and once I did "Jo" email arrived suggesting a call at 12 but it was 12:51 when i received it. this was my first indication something was majorly wrong.. I called apple support for help
Well here is the start to my nightmare. first apple's automated system couldn't verify my account but when I got to a representative he went ahead a began a screenshare and started working on my issues. we started checking the settings and my settings were changed. I never backup to a cloud (I know it's risk but I'm too scared of identity theft) but my mac was backing somethings up anyways. then he instructed that I sync my mail (I hadn't received over 3k emails) and change my password. I changed my password an was able to start making purchases again. next I noticed my notes were missing bit he couldn't resolve this problem and transfered me to a senior advisor. the senior advisor wanted to start screenshare. as he attempted to screenshare he reminded me that the sharing would be paused on sensitive information. next he informed me that we couldn't share screens that there were issues in his system. as we walked through the process of removing my notes alarm bells began to go off in my head. the previous rep had me change passwords but didn't pause screen share, which I informed my advisor but he didn't seem concerned. then i was put on a brief hold. as I was on hold I took that opportunity to change my password again. when he came back on the line I asked if he would attempt a screenshare again and it worked. he helped me check out various settings and we found they had been changed, at this point I began to worry I had a virus. he suggested I download a virus software outside of the app store. this made me uncomfortable so i requested to schedule/scheduled with the genius bar for this evening. I closed my Mac and went on about my evening.
this morning I found out about the newest apple security breach,, which kicked my anxiety into over drive. from what I read my computer had similar issues and the list was growing so I contacted support again. today once again I couldn't be verified and I wasn't receiving notifications from Apple again. the automated system automatically transferred me to a senior advisor. I thought this was weird but they assured me this was normal! anyhow I explained what was going on and she wanted to go over my settings again. we began to screen share and checked my settings, again they were different. then she said I need to see if you are completely logged in and had me open the privacy and security tab. next she instructed me to click on 2 factor authentication; followed by get a verification code. I didn't know any better so I clicked it. the next box showed a code then told me not to share the code with anyone including Apple. we were screensharing she saw it! I was so upset and asked her why she had me click that why we were screensharing...she claimed she didn't see anything it was lagging but I don't believe that! she the stated the code would change each time anyhow! at this point I'm in panic mode so disconnected the call, screenshare and tried to change my password. this time when I went to change my password I put the old and new password in and proceeded to the next step but the pop up looked entirely different. the only thing I knew to do was take my computer completely off line until I can get so help.
submitted by wickedilluminations to cybersecurity_help [link] [comments]


2024.05.16 22:01 NX01ARCHER BoltEV Update and Questions

Hello everyone!
I just got my 2020 Bolt EV Premier a month ago and wanted to give an update on my experience as well as ask some questions now that I have had it for a month.
First off my commute is mostly county routes. So not highways but not city. Speed limits are around 40-50 with some traffic lights and thanks to the 50-80 degree weather I'm seeing about 5.1mi/kwh over the past 800 miles of ownership. I expect this to drop as it gets hotter and A/C is needed as well as with the Chicago winters.
The big risk for me is I do NOT have access to even level 1 charging at my condo currently. That said its been mostly painless. I have a level 3 charger (EVGO) down the street which I have not needed to use yet. I work for a town that does have a small grocery chain with level 2 charging and they don't mind me charging while at work so I simply plug in and ride my scooter to work once every week or so to charge. So not having home charging is doable but definitely not for everyone!
Overall the Bolt is great. Good features, decent ride quality, decent range the perfect around the city go kart!
Onto some questions I had.
We rented at 2022 Bolt EV on a trip recently and I could have sworn that OPD worked in reverse. Is that true or am I wrong?
Is there anyway to not make it chose the radio by default? Everytime I get in the car and when I get home and disconnect android auto it switches back to the radio and blasts it. In my Camaro it wouldn't play anything until I either selected android auto or selected the radio and disconnecting at home didn't default back to the radio.
I have the EcoHitch installed for a bike rack, and some window tint to help with heat. Any other mods/addons people found helpful when they first got the car?
Thanks in advance and happy to be part of the EV community now!
submitted by NX01ARCHER to BoltEV [link] [comments]


http://activeproperty.pl/