Windows Tutorials

Windows Server Pending Reboot Status Won’t Clear

You may have a problem with Windows Server Pending Reboot Status Won’t Clear because you may have installed new windows updates, new drivers or new windows features and windows server is throwing a fit about needing to reboot, even though you have reboot it dozens of times. 

In comprehensive guide on troubleshooting the issue of a pending reboot status that won’t clear on a Windows Server. As a system administrator or IT professional, you might have encountered this frustrating situation where the server continues to show a pending reboot status even after a restart. In this article, we will explore the possible causes behind this issue and provide you with effective solutions to resolve it. So, let’s dive in and get your Windows Server back on track!

Solution 1: Check for Pending Updates

One of the common causes of the pending reboot status is incomplete update installations. To address this … Read the rest

Windows Tutorials

How to clear all event logs with .bat file for CMD

In this tutorial you will be shown how to clear all event logs with a .bat for CMD. This Bat file will come handy to clear stuck events from the logs or if your event viewer is crashing cause by too much data.

Let’s get started. 

  1. Open notepad or notepad++.
  2. Copy the contents blow and paste them into notepad.
  3. Save the file as clearevens.bat
  4. Right click on the newly created clearevens.bat and run it as administrator. 
@echo off

FOR /F "tokens=1,2*" %%V IN ('bcdedit') DO SET adminTest=%%V
IF (%adminTest%)==(Access) goto noAdmin
for /F "tokens=*" %%G in ('wevtutil.exe el') DO (call :do_clear "%%G")
echo.
echo All Event Logs have been cleared!
goto theEnd

:do_clear
echo clearing %1
wevtutil.exe cl %1
goto :eof

:noAdmin
echo Current user permissions to execute this .BAT file are inadequate.
echo This .BAT file must be run with administrative privileges.
echo Exit now, right click on this 
Read the rest

Configure Attack Defense with TP-Link Omada Controller

In this TP-Link Omada tutorial, you will be shown how to configure attack defense security settings with the TP-Link Omada Controller.

Why should we properly configure TP-Link Omada Attack Defense?

Attack Defense provides protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. TP-Links Omada Attack Defense can also prevent malicious software from accessing a computer or network via the internet. 

Let’s get started. 

  1. Log into your cloud controller either using the omada.toplinkcloud.com URL or The IP address assigned to the TP-Link Omada Controller.
  2. Once logged in go ahead and expand the menu by sliding your mouse to the left bar.
  3. Click on Settings down at the bottom.
  4. Next click on the Network Security.
  5. From here click on Attack Defense.
  6. Under Flood Defense. Have the following all checked marked with the default settings the set. 

    Flood Defense

Read the rest

Configure Wireless Network with TP-Link Omada Controller

In this tutorial, you will be shown how to configure a Wireless Network with the TP-Link Omada Controller.

Let’s get started.

Before we start this tutorial is under the impression you already have additional networks created. If you need help with creating new VLAN Networks Click Here. You may want to create a VLAN if it is for a new wireless network.

  1. Log into your cloud controller either using the omada.toplinkcloud.com URL or The IP address assigned to the TP-Link Omada Controller.
  2. Once logged in go ahead and expand the menu by sliding your mouse to the left bar.
  3. Click on Settings down at the bottom.
  4. Afterwards, click on Wireless Networks and then click Create New Wireless Network.
  5. The Create new Wireless Network page should have loaded.
  6. Fill out the name you want for your wireless connection.
  7. If this will be a Guest Network checkmark Enable for Guest Network.
Read the rest

Configure VLAN Network with TP-Link Omada Controller

In this tutorial, you will be shown how to configure a new VLAN network using TP-Link Omada Controller. 

Let’s get started.

  1. Log into your cloud controller either using the omada.toplinkcloud.com URL or The IP address assigned to the TP-Link Omada Controller.
  2. Once logged in go ahead and expand the menu by sliding your mouse to the left bar.
  3. Click on Settings down at the bottom.
  4. Afterwards, click on Wired Networks and then click LAN.
  5. Click the Create New Lan button at the bottom. 
  6. I will be creating a new network for my IOT devices. 
  7. In the Name field I will be calling my network IOT LAN.
  8. Make sure to checkmark LAN.
  9. I like to keep my VLAN ID the same as the subnet address
  10. Here I decided to use VLAN 200 and Subnet 192.168.200.1/24
  11. Click Update DHCP Range.
  12. If you scroll down a few you should see the DHCP Pool,
Read the rest

Configure Network Segmentation with TP-Link Omada Controller

In this tutorial, you will be shown how to configure network segmentation with the TP-Link Omada Controller. Segmentation is an ideal practice to protect your TP-Link Omada network.

What is network segmentation?

Network segmentation is, to put it as simply as possible, the practice of dividing a larger computer network into several small subnetworks that are each isolated from one another. Network segmentation is also a key part of HIPAA and PCI compliance. The benefits of segmenting your network can massively outweigh the challenges of configuration. Some key benefits of network segmentation include:

  • Slowing Down Attackers.
  • Increasing Overall Data Security.
  • Enabling Implementation of a Policy of Least Privilege.
  • Reducing Damage from Successful Attacks. 

Let’s get started with network segmentation 

Before we start this tutorial is under the impression you already have additional networks created. If you need help with creating new VLAN Networks Click Here.

  1. Log into your cloud
Read the rest

Lost your iPhone? Someone can use Checkm8 and Checkra1n to jailbreak it.

If you lost your iPhone you should be worried. Someone can hack into it with free software called Checkm8 and Checkra1n to jailbreak it. Essentially they would be able to hack into your phone and by pass any security you have in place. 

Why should we care about Checkm8?

The Checkm8 vulnerability works on 11 generations of iPhones, from the 4S to the X. While it doesn’t work on newer devices, Checkm8 can jailbreak hundreds of millions of devices in use today. And because the bootrom can’t be updated after the device is manufactured, Checkm8 will be able to jailbreak in perpetuity.

  • Checkm8 requires physical access to the phone. It can’t be remotely executed, even if combined with other exploits
  • The exploit allows only tethered jailbreaks, meaning it lacks persistence. The exploit must be run each time an iDevice boots.
  • Checkm8 doesn’t bypass the protections offered by the Secure Enclave
Read the rest

Jetty Vulnerability using Invalid Large TLS Frame causes 100% CPU Usage

This Jetty vulnerability is to be considered as a service availability issue. When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing CPU resources to eventually reach 100% usage. 

The following packages have been upgraded to a later upstream version: rh-eclipse-jetty (9.4.40).

Security Fixes:

  • jetty: Symlink directory exposes webapp directory contents (CVE-2021-28163)
  • jetty: Ambiguous paths can access WEB-INF (CVE-2021-28164)
  • jetty: Resource exhaustion when receiving an invalid large TLS frame (CVE-2021-28165)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Type/Severity

Security Advisory: Moderate

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Developer Tools (for RHEL Workstation) 1
Read the rest
UniFi Tutorials

Install SSL Certificate Onto A FQDN UniFi Controller

In this tutorial you will be shown how to install SSL Certificate onto a FQDN (fully qualified domain name) UniFi Controller installed on Ubuntu 20.04. 

Lets Get Started 

  1. SSH onto your Ubuntu Linux Server
  2. Make sure your server is fully up to date with patches.
  3. Check and see what type of pre-existing firewall your using. In my case I am sticking with ufw firewall. We will be opening up the ports for SSL configuration and enabling auto start for my ufw firewall.
sudo ufw allow 80
sudo ufw allow 443
sudo systemctl enable ufw
sudo ufw enable

This Is A Must: Since you have an existing UniFi Controller already running make sure to set an A record for your domain and point it to the IP address of the UniFi Controller server. Lets move forward with configuring SSL certificate for your domain!

Install SSL Certificate For Your Domain To Access

Read the rest
UniFi Tutorials

Install UniFi Controller On Ubuntu 20.04 Linode

In this tutorial you will be shown how to install the UniFi Controller software with SSL on Ubuntu 20.04 using a Linode VPS.

The current version of UniFi SDN Controller that we will be installing is 6.2.23 Of course new packages will be released and they can be found on there UniFi Software Download Page. The script we will be using will install the latest version.

Lets Get Started!

Prerequisites

  • Create a VPS server on Linode. The $10 plan meats minimum specifications and should be just fine up to 250 devices. You can even enable the option to create VPS backups witch is ideal.
  • To access the UniFi controller with a domain you will need to create an A record pointing to VPS server’s public IP address.

 

Getting Started With Linode

  1. Sign Up and Log into your Linode account and click the blue [Create Linode] button.
  2. The
Read the rest

Stay Informed

Receive instant notifications when new content is released.