Mis próximas Charlas en Buenos Aires: Actores en C#, Single Page Applications

Tengo varios temas que quiero tratar, en distintos lenguajes y tecnologías. Hoy quiero comentar dos charlas que se vienen, que puedo dar gracias al Microsoft User Group:

Aplicaciones Distribuidas en C#, un modelo de actores

http://www.mug-it.org.ar/Event.aspx?Event=180

Lugar: Auditorio del MUG, Rivadavia 1479 Primer Piso “A”, Buenos Aires.
Fecha y Horario: Miércoles 8 de octubre de 2014 de 18:30 a 20:30 hs.

La idea es presentar conceptos de actores, y actores distribuidos, comentar la principal implementación en Java: Akka. Y luego pasar a discutir y mostrar una implementación en C#

Luego

Desarrollando Single Page Applications con JavaScript

http://www.mug-it.org.ar/Event.aspx?Event=181

Lugar: Auditorio del MUG, Rivadavia 1479 Primer Piso “A”, Buenos Aires.
Fecha y Horario: Miércoles 29 de octubre de 2014 de 18:30 a 20:30 hs.

Veremos las fuerzas que llevan a la aparición de aplicaciones web compuestas de una sola página, con dinámica en JavaScript. Siguiendo “baby steps” y simplicidad, exploraremos cómo podemos armar algún ejemplo con simple JavaScript y JQuery, cómo alimentar los datos desde un servidor con una API expuesta (agnóstico de la tecnología) y luego visitaremos algunas librerías JavaScript del lado cliente que nos ayudan, como Angular y Backbone.

Espero que estas charlas aporten algo a estos temas, entre tantos que son interesantes en estos tiempos. Estoy preparando otras charlas, como Inteligencia Artificial en JavaScript para la JSConf 2014 de Argentina. Y espero que me aceptan alguna más, sobre JavaScript y Ruby, en la RubyConf 2014 de Argentina.

Nos leemos!

Angel “Java” Lopez
http://www.ajlopez.com
http://twitter.com/ajlopez

PowerShell Summit Europe – Tuesday afternoon

Mike Pfeiffer kicked off the afternoon talking about DSC in the AWS cloud.  Using DSC to bootstrap new machines and configuration scripts to complete configuration. This works in push mode but pull servers being experimented with.

 

Second session was Jim Truher, a founder member of the PowerShell team, talking about Testing Frameworks.

Testing frameworks are essential.  Pester is a an excellent test framework for Test Driven Development. Pester is extensible as its a script module.

 

Our third session was Mike Marin speaking about PowerShell, devops and Windows Azure.

 

The final session was Lee Holmes – What Goes Bump in the Night? – looking at auditing to see what PowerShell is doing on your system

Security boundaries – once attackers get access to your machine its not your machine. Post exploitation.

Compromising administrators – means need just enough admin – don’t give unfettered access

Event forwarding great for detecting intrusions.

Forwarding occurs over WSMAN

Two days down and more good stuff to come

The PC scene..

There is a laptop in this household which is only used to get onto Facebook and occasionally, it prints online ‘money off’ coupons for use in local grocery stores. Personally, I think that it is a waste of a good machine, but I am not the main user and it is not up to me to decide how it is used. Were it not for the resistance of the user to adapt to on screen keyboards, a cheap tablet could replace the machine.

This is an example of why the traditional PC market is falling away.

The simple fact is that many PC users didn’t really need anything as complex as a PC, but there were no simple alternatives. It was a PC or nothing, and generally a desktop PC at that.

Six years ago, all I ever saw for repair were desktop machines. Occasionally a laptop would come my way. In the last two years, the only desktop machines I have seen have been scrappers where data from them was to be transferred to a laptop.

Now I am seeing a move to tablets, but not entirely as replacements yet. Where there may have been two laptops, now there is one laptop and one tablet.

Those who work at home still favour desktops and large laptops. Spreadsheets, inventories, websites, accounts and graphics are much easier to work on when viewed on a large screen, and students like the standard 15.6” laptop when bashing out dissertations.

For the rest, a tablet will do the job nicely thanks.. Smile

……………………………

So what we are seeing is not the total demise of the traditional Windows PC, but a shift in the machine types and of course, operating system.

It’s strange that the Microsoft operating system which most closely resembles what is seen on tablets is NOT Windows 8. Microsoft pushed it and look to be still pushing it in Windows 9, yet it has pretty much failed on all platforms. It is NOT what traditional Windows users expect to see, whether they be business or home users. I still don’t understand why they persist.

I will stay with the desktop for as long as I can because it is easier for me to input and see what I input. Hopefully, the manufacturers who make the bits for gaming desktops will survive and that will keep me in hardware.

If Windows of the future goes to subscription use and I stop supporting Windows and Windows based computers online, produce a website and this blog, I may even get a tablet..

Smile

LINUX/UNIX Admins – PATCH AGAIN as new BASH Shellshock exploits are emerging

While these brand new vulnerabilities have emerged, they appear to be less “exploitable” from directly tailored environment variables than the original BASH Shellshock exploit.  Still, there is a need for open source administrators to be vigilant and in a “patch now” mode as further developments warrant    

http://www.darkreading.com/vulnerabilities—threats/new-bash-bugs-surface/d/d-id/1316161

QUOTE: If you patched your Linux-based systems before 1:11 a.m. Eastern Daylight Time yesterday for the major Shellshock vulnerability in the Bash function, your work is not done here yet. New bugs have been reported in Bash, so it’s probably time to patch again, security experts warn.

Johannes Ullrich, director of the SANS Internet Storm Center, says the newly discovered Bash vulnerabilities have not been patched, as of this posting: CVE-2014-7186, – 7187, and -6277. The original Bash Shellshock bugs revealed on September 24 — CVE-2014-6271 and CVE-7169 — have been patched and updated in major distributions, according to Ullrich.

The latest bugs in Bash are not one and the same as Shellshock, however. “They are not exploitable via environment variables as far as I know, so the CGI vector that has been a big problem with Shellshock doesn’t seem to apply,” says Ullrich, who is currently performing more testing on the latest findings.

https://isc.sans.edu/forums/diary/Shellshock+A+Collection+of+Exploits+seen+in+the+wild/18725

QUOTE: I just published an updated YouTube presentation (about 15 min in length) with some of the shell shock related news from the last couple days:

YouTube: https://www.youtube.com/watch?v=b2HKgkH4LrQ
​PDF: https://isc.sans.edu/presentations/ShellShockV2.pdf
PPT: https://isc.sans.edu/presentations/ShellShockV2.pptx

PowerShell Summit Europe 2015

No not a typo. We, at PowerShell.org, will be repeating the European Summit next year. Location hasn’t been finalised but will be Northern Europe.  The Summit will occur at about the same time of year.  Look to PowerShell.org later in the year for more information. We are hoping to be able to put on a larger event though that has yet to be confirmed.

 

Your support is critical to determining the size of the event, and ensuring the future of the event.

 

Look forward to seeing you next year

PowerShell Summit Europe – Tuesday morning

After a very successful DSC hackathon on Monday evening we reconvened on Tuesday morning with Steve Murawski delivering his second session on DSC.

A brief discussion on devops lead into looking at DSC configurations:

  • Configuration names can’t be hyphenated
  • Circular dependencies are detected
  • Partial named configurations allow multiple configurations working against same machine

The morning’s second session was me talking about creating cmdlets from the CIM StdRegProv class using a CDXML approach.  The talk started with using a single method and demonstrated how to add validation, simplify parameter input by the use of enumerations and how CDXML modules are used within PowerShell.

 

Dan Harman closed the morning session by talking about classes written in PowerShell – this functionality was introduced in the September preview of WMF 5

You can already define a class and load it with Add-Type but you have to write the class in C# or another .NET language. Now you can write the class in PowerShell

Classes can have overloaded constructors and methods.  All class members are public by default.

Enums are possible. Scoping is lexical not dynamic as in PowerShell

How to Turn On or Off On-Screen Keyboard Click Sound in Windows

Instead of relying on the physical keyboard to type and enter data, you can use On-Screen Keyboard. On-Screen Keyboard displays a visual keyboard with all the standard keys. You can select keys using the mouse or another pointing device, or you can use a single key or group of keys to cycle through the keys on the screen.

This tutorial will show you how to turn on or off to have the On-Screen Keyboard make an audible click sound when a key is pressed in Vista, Windows 7, and Windows 8.

Read more…

PowerShell Summit Europe 2014–Monday afternoon

 

Mike Pfeiffer started the Monday afternoon session with a demonstration of using PowerShell to manage Amazon Web Services.

 

Dan Harman, from the PowerShell team, followed with PowerShell Repositories Unleashed. Oneget is a software package manager

Oneget has PowerShell cmdlets; a C# API and a WMI provider may follow. Originally released against a Chocolately provider – others will follow.  Dan showed a nuget provider being installed

PowerShellGet is overlays OneGet and provides the ability t0 install and manage PowerShell modules

Package providers aren’t trusted by default. You can configure repositories to be trusetd – especially useful if you create your own

 

The third session of the afternoon was supplied by Tobias Weltner on Sophisticated Techniques of Plain Text Parsing.

PowerShell is based on text but often need to work with unstructured text data.  He started with using –split and lead into using regular expressions.

Can force into CSV format by supplying headers

Experience based learning enables more sophisticated processing

Select-string can also be used to parse textual data

 

The final Monday session was Do custom objects dream about ETS? by  Bartosz Bielawski

Bartek showed how to create custom objects and set its type.  Once you have that done you can create formatting and type data to control how the data is displayed.

PowerShell Summit Europe 2014–Monday morrning

The Summit started with a walk through the Monad Manifesto by Jeffrey Snover. This covered the history of PowerShell, where it came from, why it came about and the features introduced with the subsequent versions.

 

A few highlights:

  • DSC is a huge area and will expand
  • ISE will be able to edit files on remote machines
  • DSC resource kit now at wave 7 and more are in the pipeline
  • Classes can be created in PowerShell

The futures section included the intriguing possibility that eventually there may be an open source version of PowerShell.  Please note this is a possibility not a guarantee.

 

Second up was Steve Murawski talking about the creation of DSC resources ahead of our evening DSC resource hackathon.

Steve showed the structure of a resource and some of the gotchas such as versioning and the need to match parameter sets across the get/test/set-resource functions.

Infrastructure as code – ignore individual machines. Destroy & rebuild if there are problems

 

Final session of the morning was Jeff Wouters speaking on Speedy PowerShell

After explaining the pipeline Jeff started showed the impact of filtering on performance including how the new where and foreach syntax introduced in PowerShell v4 works.

He also covered how loops and workflows can impact performance

Leadership – Inspiring project team with Vision

John Maxwell’s Leadership blog has excellent advice that is applicable for IT projects

http://www.johnmaxwell.com/blog/give-your-dream-a-team

QUOTE: If you’re dreaming big, then the size of your vision will surpass your present abilities. Not only that, but your dream will even dwarf your potential abilities. No matter how much you grow and develop, you won’t ever be able to accomplish the dream alone. One is too small a number to achieve greatness. Every dream needs a team in order to come true. The questions are who to include on the team and how to convince them to join.

Who should I include on my dream team?  Life is especially hard on dreams, and when challenges arise we can be tempted to delay the dream indefinitely or to abandon it altogether. That’s why every dream team has inspirers. These people keep hope alive by providing continual encouragement. They believe in the dream even when you start to doubt it.

There’s a fine line between a dream and a fantasy, and it can be easy to cross. Every dreamer needs honest critics to keep from wandering into make-believe. These constructive critics are not skeptics or cynics; they believe in the dream just as much as you do. However, they’re attuned to reality, and they know that a dreamer who avoids facts and evidence will inevitably lose credibility.

Windows 8.1 Credential Manager – how to access and use

An informative article regarding Windows 8.1 Credential Manager from Tech Republic

http://www.techrepublic.com/article/working-with-windows-8-1s-credential-manager/

 
Whenever you respond to a prompt that essentially asks if you want Windows or Internet Explorer to remember your password, the operating system will then store your user credentials in an encrypted file scheme known as the Windows Vault. Having your credentials stored in this vault allows you to be able to automatically log on to a server/site without first being prompted to provide a username and password. For example, the vault can store credentials and then use them to automatically log you into online services such as Hotmail and OneDrive, Microsoft Office services such as Outlook Web Access for Exchange Server, plus Windows servers and Remote Desktop connections. The GUI front end for this vault is called Credential Manager, and it’s designed to allow you to easily view and manage your network-based logon credentials (i.e., usernames and passwords). In this article, I’ll introduce you to the Windows 8.1’s Credential Manager and explain how it works.

And the Summit begins

The PowerShell Summit Europe 2014 began unofficially this eveing with an informal gathering for drinks and converstation – no prizes for guessing the main topic of conversation!!

 

One of the greatest things about these Summits is the ability to talk to other people about what they are doing with PowerShell and to discover new ways to do things and new things to do with PowerShell.

 

The conversations continued over dinner and will no doubt continue through the next 3 days.  

Removal instructions for videos+Media+Player

What is videos+Media+Players?

The Malwarebytes research team has determined that videos+Media+Players is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements.

https://forums.malwarebytes.org/index.php?%2Ftopic%2F157907-removal-instructions-for-videosmediaplayer%2F

How to Uninstall a Device in Windows 7 and Windows 8

After a device is installed, it might be necessary to uninstall a device or a driver package. For example, you might decide to replace or update the device.

This tutorial will show you different ways for how to uninstall hardware devices in Windows 7 and Windows 8.

Read more…

Apple iPhone 6 – over 60 pounds of force to bend

Interesting tests by Consumer Reports that document new iPhone 6 casing holds up with other similar smartphones.

http://www.pcmag.com/article2/0,2817,2469381,00.asp

QUOTE: Apple’s iPhone 6 required less force to ruin than Apple’s iPhone 6 Plus, but more force than what Apple itself has been claiming the iPhones can tolerate. According to those who attended a recent press tour of the company’s “torture lab” for its iPhones, an iPhone 6 can handle at least 25 kilograms of weight—around 55 pounds—in a similar three-point flexural test. Apple maintains the iPhone 6 can actually handle more weight than that, but didn’t specify how much.

According to Consumer Reports’ tests, the iPhone 6 only started to deform, warp, or otherwise look different than it normally does once the test applied 70 pounds of weight to the smartphone. The iPhone 6 Plus held out for slightly longer, deforming at around 90 pounds.

Two days ago, the Internet erupted with photos of bent iPhone 6s, and a very-viral video of a guy creasing an iPhone 6 Plus with his bare hands. It seemed like a serious concern, yet everything about the uproar was highly unscientific. We don’t like unscientific, so we promised then that we would use our lab equipment to find out just how delicate the iPhone 6 and 6 Plus really are.

Hacked Account – Recovery tips for home users SEP2014

Kim Komando shares 5 page guides to recover stolen email or other accounts.  The key links to recovery resources for Facebook and other sites are helpful resources for home users

http://www.komando.com/tips/11269/easily-recover-a-hacked-account

 
Unlike other online accounts, I wouldn’t use online forms to try to get back a hacked bank account. Call the bank or visit your local bank branch immediately. The bank will work with you to change the password and reverse any fraudulent charges. You may have to open up a new account, though. While you’re there, ask about using additional verification features. Most banks have a system that lets you verify any major charge before it’s made. For any online account, a little preparation beforehand makes your account much harder to crack. Check your online account’s security settings often. Make sure you have a rock-solid password and strong security question to keep hackers out.

Linux and Unix – PATCH NOW for Bash Shellshock vulnerability

Informative links below from Internet Storm Center (Webcast, FAQ, and Patch NIX now)

https://isc.sans.edu/forums/diary/Webcast+Briefing+Bash+Code+Injection+Vulnerability/18709

https://isc.sans.edu/forums/diary/Update+on+CVE-2014-6271+Vulnerability+in+bash+shellshock+/18707

https://isc.sans.edu/forums/diary/Attention+NIX+admins+time+to+patch/18703

 
 The good news is that it’s an easy fix:  Debian (Ubuntu, etc.): apt-get upgrade bash …. RHEL (Fedora, CentOS, etc.): yum update bash

Removal instructions for The weDownloads Manager+

What is The weDownloads Manager+?

The Malwarebytes research team has determined that The weDownloads Manager+ is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements.

https://forums.malwarebytes.org/index.php?%2Ftopic%2F157871-removal-instructions-for-the-wedownloads-manager%2F

How to Uninstall Drivers in Windows 7 and Windows 8

After a device is installed, it might be necessary to uninstall a device or a driver package. For example, you might decide to replace the associated device, or the driver package might have to be uninstalled when a driver is updated.

The driver store is a protected area of the computer that contains device driver packages that have been approved for installation on the computer. After the driver package has been removed from the driver store, it is no longer available to be installed on a device.

This tutorial will show you how to uninstall a driver for a device in Windows 7 and Windows 8.

Read more…

PowerShelling on a OU structure

From Robert – I bet he orders Scotch using a PowerShell Script – Pearman comes this reminder of a script to put back in the SBS OU structure into a raw domain where there is no OU structure.

http://titlerequired.com/2013/12/04/quick-fix-sbs-essentials-ou-structure/
  1. on the AD server, Open PowerShell ISE.  Paste this into the box, hit enter.

 

$domain = (Get-ADDomain)

$DN = $domain.DistinguishedName

New-ADOrganizationalUnit -name “MyBusiness” -path $DN

New-ADOrganizationalUnit -name “Computers” -path “OU=MyBusiness,$DN”

New-ADOrganizationalUnit -name “Distribution Groups” -path “OU=MyBusiness,$DN”

New-ADOrganizationalUnit -name “Security Groups” -path “OU=MyBusiness,$DN”

New-ADOrganizationalUnit -name “Users” -path “OU=MyBusiness,$DN”

New-ADOrganizationalUnit -name “SBSComputers” -path “OU=Computers,OU=MyBusiness,$DN”

New-ADOrganizationalUnit -name “SBSServers” -path “OU=Computers,OU=MyBusiness,$DN”

New-ADOrganizationalUnit -name “SBSUsers” -path “OU=Users,OU=MyBusiness,$DN”

 
  1. Also on the AD server, at an elevated cmd prompt run this so that new users and computers are inserted on creation into the correct OU (instead of default users/computers).

 

(edit the XXXX to match your domain name for your environment)

 

2.1 For redirecting users;

c:WindowsSystem32redirusr.exe ou=SBSusers,ou=users,ou=mybusiness,dc=xxxx,dc=local

 

2.2 For redirecting computers;

c:WindowsSystem32redircmp.exe ou=SBScomputers,ou=computers,ou=mybusiness,dc=xxxx,dc=local

 

 

Recent Comments

Archives