Miralinux Blog

  • Home
  • Linux
    • Scripts
    • CentOS
  • Apple
  • Microsoft
    • Features
    • Office
    • Windows
  • Learning
  • Games
  • Multimedia
    • XBMC
  • Other
    • About WordPress
  • Links
    • General
    • Software
      • Autocad
    • Hardware
      • BIOS
    • Linux
    • WiKieS

Monthly Archives: November 2013

Hardware bump

Posted on 2013/11/28 by arno Posted in Uncategorized

X-|

Cisco SRW2016 – reset password cisco switches via serial console port

1. Connect to the console port using terminal emulation parameters (typically 38400, 8, 0, 1, None)
2. Reboot switch (Remove power)
3. Hold down Ctrl U while rebooting
–  Menu will be displayed
4. Select>  [D] Delete file
5. Type startup-config (be sure that this is the ONLY file that you delete – if you delete other files, you will have to reload the firmware)
6. Now, you have erased the configuration file and you should be able to reboot and login with the default username and password.

Software Malware

Posted on 2013/11/21 by arno Posted in Uncategorized

CryptoLocker

forums: Bleepingcomputer
software: shadowexplorer

How to block this infection from running on other computers on your computer.

You can use Software Restriction Policies to block executables from running when they are located in the %AppData% folder, or any other folder, which this thing launches from. See these articles from MS: http://support.microsoft.com/kb/310791 | http://technet.microsoft.com/en-us/library/cc786941(v=ws.10).aspx
This can also be setup in group policy
File paths of the infection are:

C:\Users\User\AppData\Roaming\{213D7F33-4942-1C20-3D56=8-1A0B31CDFFF3}.exe (Vista/7/8)
C:\Documents and Settings\User\Application Data\{213D7F33-4942-1C20-3D56=8-1A0B31CDFFF3}.exe

So the path rule you want to setup is:

Path: %AppData%\*.exe
Security Level: Disallowed
Description: Don’t allow executables from AppData.

With the bundling of Zbot with Cryptolocker, it is now also recommend that you create a rule to block executables running from a subfolder of %AppData%. This can be done with this path rule:

Path: %AppData%\*\*.exe
Security Level: Disallowed
Description: Don’t allow executables from immediate subfolders of AppData.

Software Google Chrome

Posted on 2013/11/03 by arno Posted in Software

Chrome hidden configuration pages

source: www.blogsdna.com/828/seven-hidden-configuration-pages-of-google-chrome-browser.htm

about:flags
about:network
about:stats
about:cache
about:histograms
about:plugins
about:dns
about:version
about:memory
about:crash

  • Login
  • Mother of all Portals
  • .Handy .Handig
  • Links – wikis – wikies

Archives

  • June 2022
  • October 2021
  • June 2021
  • September 2016
  • April 2016
  • March 2016
  • November 2014
  • September 2014
  • August 2014
  • July 2014
  • April 2014
  • March 2014
  • November 2013
  • October 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • February 2013
  • December 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
CyberChimps ©2025