Tengo varios temas que quiero tratar, en distintos lenguajes y tecnologĂas. Hoy quiero comentar dos charlas que se vienen, que puedo dar gracias al Microsoft User Group:
Aplicaciones Distribuidas en C#, un modelo de actores
Lugar: Auditorio del MUG, Rivadavia 1479 Primer Piso “A”, Buenos Aires.
Fecha y Horario: MiĂ©rcoles 8 de octubre de 2014 de 18:30 a 20:30 hs.
La idea es presentar conceptos de actores, y actores distribuidos, comentar la principal implementaciĂłn en Java: Akka. Y luego pasar a discutir y mostrar una implementaciĂłn en C#
Lugar: Auditorio del MUG, Rivadavia 1479 Primer Piso “A”, Buenos Aires.
Fecha y Horario: MiĂ©rcoles 29 de octubre de 2014 de 18:30 a 20:30 hs.
Mike Pfeiffer kicked off the afternoon talking about DSC in the AWS cloud. Using DSC to bootstrap new machines and configuration scripts to complete configuration. This works in push mode but pull servers being experimented with.
Second session was Jim Truher, a founder member of the PowerShell team, talking about Testing Frameworks.
Testing frameworks are essential. Pester is a an excellent test framework for Test Driven Development. Pester is extensible as its a script module.
Our third session was Mike Marin speaking about PowerShell, devops and Windows Azure.
The final session was Lee Holmes – What Goes Bump in the Night? â looking at auditing to see what PowerShell is doing on your system
Security boundaries â once attackers get access to your machine its not your machine. Post exploitation.
Compromising administrators â means need just enough admin â donât give unfettered access
Event forwarding great for detecting intrusions.
Forwarding occurs over WSMAN
Two days down and more good stuff to come
There is a laptop in this household which is only used to get onto Facebook and occasionally, it prints online âmoney offâ coupons for use in local grocery stores. Personally, I think that it is a waste of a good machine, but I am not the main user and it is not up to me to decide how it is used. Were it not for the resistance of the user to adapt to on screen keyboards, a cheap tablet could replace the machine.
This is an example of why the traditional PC market is falling away.
The simple fact is that many PC users didnât really need anything as complex as a PC, but there were no simple alternatives. It was a PC or nothing, and generally a desktop PC at that.
Six years ago, all I ever saw for repair were desktop machines. Occasionally a laptop would come my way. In the last two years, the only desktop machines I have seen have been scrappers where data from them was to be transferred to a laptop.
Now I am seeing a move to tablets, but not entirely as replacements yet. Where there may have been two laptops, now there is one laptop and one tablet.
Those who work at home still favour desktops and large laptops. Spreadsheets, inventories, websites, accounts and graphics are much easier to work on when viewed on a large screen, and students like the standard 15.6â laptop when bashing out dissertations.
For the rest, a tablet will do the job nicely thanks..
So what we are seeing is not the total demise of the traditional Windows PC, but a shift in the machine types and of course, operating system.
Itâs strange that the Microsoft operating system which most closely resembles what is seen on tablets is NOT Windows 8. Microsoft pushed it and look to be still pushing it in Windows 9, yet it has pretty much failed on all platforms. It is NOT what traditional Windows users expect to see, whether they be business or home users. I still donât understand why they persist.
I will stay with the desktop for as long as I can because it is easier for me to input and see what I input. Hopefully, the manufacturers who make the bits for gaming desktops will survive and that will keep me in hardware.
If Windows of the future goes to subscription use and I stop supporting Windows and Windows based computers online, produce a website and this blog, I may even get a tablet..
QUOTE: If you patched your Linux-based systems before 1:11 a.m. Eastern Daylight Time yesterday for the major Shellshock vulnerability in the Bash function, your work is not done here yet. New bugs have been reported in Bash, so it’s probably time to patch again, security experts warn.
Johannes Ullrich, director of the SANS Internet Storm Center, says the newly discovered Bash vulnerabilities have not been patched, as of this posting: CVE-2014-7186, – 7187, and -6277. The original Bash Shellshock bugs revealed on September 24 — CVE-2014-6271 and CVE-7169 — have been patched and updated in major distributions, according to Ullrich.
The latest bugs in Bash are not one and the same as Shellshock, however. “They are not exploitable via environment variables as far as I know, so the CGI vector that has been a big problem with Shellshock doesn’t seem to apply,” says Ullrich, who is currently performing more testing on the latest findings.
QUOTE: I just published an updated YouTube presentation (about 15 min in length) with some of the shell shock related news from the last couple days:
No not a typo. We, at PowerShell.org, will be repeating the European Summit next year. Location hasnât been finalised but will be Northern Europe. The Summit will occur at about the same time of year. Look to PowerShell.org later in the year for more information. We are hoping to be able to put on a larger event though that has yet to be confirmed.
Your support is critical to determining the size of the event, and ensuring the future of the event.
Look forward to seeing you next year
After a very successful DSC hackathon on Monday evening we reconvened on Tuesday morning with Steve Murawski delivering his second session on DSC.
A brief discussion on devops lead into looking at DSC configurations:
- Configuration names canât be hyphenated
- Circular dependencies are detected
- Partial named configurations allow multiple configurations working against same machine
The morningâs second session was me talking about creating cmdlets from the CIM StdRegProv class using a CDXML approach. The talk started with using a single method and demonstrated how to add validation, simplify parameter input by the use of enumerations and how CDXML modules are used within PowerShell.
Dan Harman closed the morning session by talking about classes written in PowerShell â this functionality was introduced in the September preview of WMF 5
You can already define a class and load it with Add-Type but you have to write the class in C# or another .NET language. Now you can write the class in PowerShell
Classes can have overloaded constructors and methods. All class members are public by default.
Enums are possible. Scoping is lexical not dynamic as in PowerShell
This tutorial will show you how to turn on or off to have the On-Screen Keyboard make an audible click sound when a key is pressed in Vista, Windows 7, and Windows 8.
Mike Pfeiffer started the Monday afternoon session with a demonstration of using PowerShell to manage Amazon Web Services.
Dan Harman, from the PowerShell team, followed with PowerShell Repositories Unleashed. Oneget is a software package manager
Oneget has PowerShell cmdlets; a C# API and a WMI provider may follow. Originally released against a Chocolately provider â others will follow. Dan showed a nuget provider being installed
PowerShellGet is overlays OneGet and provides the ability t0 install and manage PowerShell modules
Package providers arenât trusted by default. You can configure repositories to be trusetd â especially useful if you create your own
The third session of the afternoon was supplied by Tobias Weltner on Sophisticated Techniques of Plain Text Parsing.
PowerShell is based on text but often need to work with unstructured text data. He started with using âsplit and lead into using regular expressions.
Can force into CSV format by supplying headers
Experience based learning enables more sophisticated processing
Select-string can also be used to parse textual data
The final Monday session was Do custom objects dream about ETS? by Bartosz Bielawski
Bartek showed how to create custom objects and set its type. Once you have that done you can create formatting and type data to control how the data is displayed.
The Summit started with a walk through the Monad Manifesto by Jeffrey Snover. This covered the history of PowerShell, where it came from, why it came about and the features introduced with the subsequent versions.
A few highlights:
- DSC is a huge area and will expand
- ISE will be able to edit files on remote machines
- DSC resource kit now at wave 7 and more are in the pipeline
- Classes can be created in PowerShell
The futures section included the intriguing possibility that eventually there may be an open source version of PowerShell. Please note this is a possibility not a guarantee.
Second up was Steve Murawski talking about the creation of DSC resources ahead of our evening DSC resource hackathon.
Steve showed the structure of a resource and some of the gotchas such as versioning and the need to match parameter sets across the get/test/set-resource functions.
Infrastructure as code â ignore individual machines. Destroy & rebuild if there are problems
Final session of the morning was Jeff Wouters speaking on Speedy PowerShell
After explaining the pipeline Jeff started showed the impact of filtering on performance including how the new where and foreach syntax introduced in PowerShell v4 works.
He also covered how loops and workflows can impact performance
QUOTE: If youâre dreaming big, then the size of your vision will surpass your present abilities. Not only that, but your dream will even dwarf your potential abilities. No matter how much you grow and develop, you wonât ever be able to accomplish the dream alone. One is too small a number to achieve greatness. Every dream needs a team in order to come true. The questions are who to include on the team and how to convince them to join.
Who should I include on my dream team?Â Life is especially hard on dreams, and when challenges arise we can be tempted to delay the dream indefinitely or to abandon it altogether. Thatâs why every dream team has inspirers. These people keep hope alive by providing continual encouragement. They believe in the dream even when you start to doubt it.
Thereâs a fine line between a dream and a fantasy, and it can be easy to cross. Every dreamer needs honest critics to keep from wandering into make-believe. These constructive critics are not skeptics or cynics; they believe in the dream just as much as you do. However, theyâre attuned to reality, and they know that a dreamer who avoids facts and evidence will inevitably lose credibility.
Whenever you respond to a prompt that essentially asks if you want Windows or Internet Explorer to remember your password, the operating system will then store your user credentials in an encrypted file scheme known as the Windows Vault. Having your credentials stored in this vault allows you to be able to automatically log on to a server/site without first being prompted to provide a username and password. For example, the vault can store credentials and then use them to automatically log you into online services such as Hotmail and OneDrive, Microsoft Office services such as Outlook Web Access for Exchange Server, plus Windows servers and Remote Desktop connections. The GUI front end for this vault is called Credential Manager, and it’s designed to allow you to easily view and manage your network-based logon credentials (i.e., usernames and passwords). In this article, I’ll introduce you to the Windows 8.1’s Credential Manager and explain how it works.
The PowerShell Summit Europe 2014 began unofficially this eveing with an informal gathering for drinks and converstation â no prizes for guessing the main topic of conversation!!
One of the greatest things about these Summits is the ability to talk to other people about what they are doing with PowerShell and to discover new ways to do things and new things to do with PowerShell.
The conversations continued over dinner and will no doubt continue through the next 3 days.
The Malwarebytes research team has determined that videos+Media+Players is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements.
This tutorial will show you different ways for how to uninstall hardware devices in Windows 7 and Windows 8.
QUOTE: Apple’s iPhone 6 required less force to ruin than Apple’s iPhone 6 Plus, but more force than what Apple itself has been claiming the iPhones can tolerate. According to those who attended a recent press tour of the company’s “torture lab” for its iPhones, an iPhone 6 can handle at least 25 kilograms of weightâaround 55 poundsâin a similar three-point flexural test. Apple maintains the iPhone 6 can actually handle more weight than that, but didn’t specify how much.
According to Consumer Reports’ tests, the iPhone 6 only started to deform, warp, or otherwise look different than it normally does once the test applied 70 pounds of weight to the smartphone. The iPhone 6 Plus held out for slightly longer, deforming at around 90 pounds.
“Two days ago, the Internet erupted with photos of bent iPhone 6s, and a very-viral video of a guy creasing an iPhone 6 Plus with his bare hands. It seemed like a serious concern, yet everything about the uproar was highly unscientific. We don’t like unscientific, so we promised then that we would use our lab equipment to find out just how delicate the iPhone 6 and 6 Plus really are.
Unlike other online accounts, I wouldn’t use online forms to try to get back a hacked bank account. Call the bank or visit your local bank branch immediately. The bank will work with you to change the password and reverse any fraudulent charges. You may have to open up a new account, though. While you’re there, ask about using additional verification features. Most banks have a system that lets you verify any major charge before it’s made. For any online account, a little preparation beforehand makes your account much harder to crack. Check your online account’s security settings often. Make sure you have a rock-solid password and strong security question to keep hackers out.
Â The good news is that it’s an easy fix:Â Debian (Ubuntu, etc.): apt-get upgrade bash …. RHEL (Fedora, CentOS, etc.): yum update bash
The Malwarebytes research team has determined that The weDownloads Manager+ is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements.
The driver store is a protected area of the computer that contains device driver packages that have been approved for installation on the computer. After the driver package has been removed from the driver store, it is no longer available to be installed on a device.
This tutorial will show you how to uninstall a driver for a device in Windows 7 and Windows 8.
- on the AD server, Open PowerShell ISE.Â Paste this into the box, hit enter.
$domain = (Get-ADDomain)
$DN = $domain.DistinguishedName
New-ADOrganizationalUnit -name “MyBusiness” -path $DN
New-ADOrganizationalUnit -name “Computers” -path “OU=MyBusiness,$DN”
New-ADOrganizationalUnit -name “Distribution Groups” -path “OU=MyBusiness,$DN”
New-ADOrganizationalUnit -name “Security Groups” -path “OU=MyBusiness,$DN”
New-ADOrganizationalUnit -name “Users” -path “OU=MyBusiness,$DN”
New-ADOrganizationalUnit -name “SBSComputers” -path “OU=Computers,OU=MyBusiness,$DN”
New-ADOrganizationalUnit -name “SBSServers” -path “OU=Computers,OU=MyBusiness,$DN”
New-ADOrganizationalUnit -name “SBSUsers” -path “OU=Users,OU=MyBusiness,$DN”
- Also on the AD server, at an elevated cmd prompt run this so that new users and computers are inserted on creation into the correct OU (instead of default users/computers).
(edit the XXXX to match your domain name for your environment)
2.1 For redirecting users;
2.2 For redirecting computers;