How To Shrink SQL Server LDF Log File

In this article, we will cover how to shrink SQL Server .LDF log file, with some simple operations overview and examples covering everything you need to know.

  1. Locate  your Microsoft SQL Server Management Studio software. You can download it from here if you do not have it installed.



  2. Once you have access to SSMS you have have to expand Databases. 
  3. Find the database in question , Right Click > Properties .



  4. Once the following window is open click on Options and then find the Recovery model drop down and select (Simple) and then click OK.




  5. Now lets move forward and run the process to shrink the SQL Server LDF log file.

  6. Find the database in question and right click it > Tasks > Shrink > Files.



  7. Change the File type to Log and leave everything else the same and click OK.



  8. It shouldn’t take too long to shrink the log
Read the rest

Social Media Website Logins Can Compromise Your Account

Many websites are offering alternative login methods but they could potentially compromise your social media account if your not careful.

Our attention to internet security has been 110% focus these days. Why use them? Google, Facebook, LinkedIn and Microsoft all offer multi-factor authentication meaning that if someone guesses, steals or cracks your password then they still can’t get in to your account without the second piece of authentication (e.g. SMS). But this means you have to enable the available multi-factor authentication which is not enabled by default and the majority of end users do not use this useful security option.

The internet is full of interesting websites and many of them allow us to interact with them as long as we provide some sort of login information. Some of these websites could have these social media plugins that allow you to use your social media login to gain access to … Read the rest

SonicWall Tutorials

Sonicwall Global VPN 5.0 Client Download

Fix slow internet and connection issues with remote computers and users by using the Sonicwall Global VPN 5.0 Client Download.

What is SonicWALL Global VPN Client?

For secure vpn access to your SonicWALL product, you will need to download and install the GVC client locally on your system. When you configure the vpn on the SonicWALL. The Global VPN Client software is recommended to securely connect computers to the SonicWALL through public WAN. 

Overview

SonicWALL Global VPN Client is a program developed by SonicWALL. It adds a background controller service that is set to automatically run. Delaying the start of this service is possible through the service manager. The software is designed to connect to the Internet and adds a Windows Firewall exception in order to do so without being interfered with.

If you have questions regarding downloads please contact me or contact SonicWALL support line or you can go … Read the rest


Your vCIO Should Achieve These 10 Technology Priorities For 2020

There are 10 priorities that your vCIO should accomplish for 2020. But if your not sure what a vCIO is or does the term “vCIO” stands for “virtual Chief Information Officer” – basically an outsourced IT department or department head. The idea of outsourced IT is becoming more viable throughout the business world. After all, if one can virtualize an entire administration crew, why not outsource C-level employees in the same way if it is more efficient?

Many companies do not have the need for a full-time CIO, yet almost every company benefits from the expertise of a digital information specialist. The vCIO is the perfect compromise. Here are a few reasons that your business should be looking to invest in one.

What Is A VCIO?

The vCIO collaborates with and advises clients’ IT departments and performs the same functions as a conventional CIO. Those duties include formulating strategic IT … Read the rest


Identity Thieves Pushing New Chase Phishing Scams

Identity thieves continually develop new ways to obtain your personal information. I personally have gotten the latest Phishing email scam these thieves are using. Looks like these Hackers didnt stop at just hacking Chase but now also taking advantage of the Chase breach to do more harm to people. This email is not legitimate. If you get any emails like these, don’t respond to them. 

Some common tip-offs that an email is phony are typos, grammatical mistakes, awkward language, missing words, extra spaces, and other signs that the email was written unprofessionally. Such emails might also ask you to look at an attachment or click a link and then give your personal information on a Web page or in a form. Or the sender’s email address might look suspicious. If you hover over the links you can even see that it would not direct you to legit URL. Here Are Read the rest


Millions of Qualcomm based Android Smartphones Vulnerable

Security researchers from Tencent’s Blade Team released a notice that the Qualcomm chipset exposes millions of android smartphones to hackers.

Any user with a tablet or phone that uses this cpu is effected by the flaw called QualPwn. The bug allows attackers to take control of the phones remotely by crafting special packets that are sent over the air.

Three bugs make up QualPwn (CVE-2019-10539, CVE-2019-10540 and CVE-2019-10538). The prerequisite for the attack is that both the attacker and targeted Android device must be active on the same shared Wi-Fi network.

“One of the vulnerabilities allows attackers to compromise the WLAN and modem, over-the-air. The other allows attackers to compromise the Android kernel from the WLAN chip. The full exploit chain allows attackers to compromise the Android kernel over-the-air in some circumstances,” wrote researchers.

 

Blade.tencent.com stated “QualPwn is a series of vulnerabilities discovered in Qualcomm chips. One of the

Read the rest

Windows Actively Exploited Privilege-Escalation Bugs

The software giant recently released important-level patches for two of the privilege-escalation vulnerabilities in Win32k and splwow64, which are being actively exploited in the wild. Qualys said that the patches, though labeled as important, should be quickly deployed as they could be chained with other vulnerabilities to provide the hacker with complete system access. In other words, once they have elevated their privilege level, attackers could exploit another vulnerability to allow them to execute code like ransomware.

The Win32 flaw (CVE-2019-1132) affects Windows 7, Server 2008 and Server 2008 R2.

“While an attacker would have to gain log on access to the system to execute the exploit, the vulnerability if exploited would allow the attacker to take full control of the system,” said Chris Goettl, director of product management for security at Ivanti, via email.

Meanwhile, the bug in splwow64 (CVE-2019-0880), which is the print driver … Read the rest


Mac Users Affected by Zero-Day Webcam Hijacking

The Mac Zoom Client allows any malicious website to enable your camera without your permission. The flaw potentially exposes up to 4 million workers that use the Zoom for Mac web-and videoconferencing service.

 According to a researcher Jonathan Leitschuh (he noted that Mac users make up about 10 percent of Zoom’s customer base of 4+ million). An outside adversary would need only to convince a user to visit a malicious website with a specially crafted iFrame embedded, which would automatically launch a Mac user into a Zoom web conference while turning on their camera.

Leitschuh disclosed “I was very easily able to spot and describe bypasses in their planned fix,” he said. “Ultimately, Zoom failed at quickly confirming that the reported vulnerability actually existed and they failed at having a fix to the issue delivered to customers in a timely manner. An organization of this profile and with such

Read the rest

Dell SupportAssist Software Is Vulnerable To Remote Hacker

Millions of Dell PCs that have the SupportAssist software installed are vulnerable to a remote hacker to completely taking over your computer.

The high-severity vulnerability (CVE-2019-12280) is defective coding in a component in SupportAssist. This software is Dell’s monitoring software which is pre-installed on all PCs. The software can automatic detect failure and notify you of issues. The Dell SupportAssit component is made by a company called PC-Doctor, which develops hardware-diagnostic software for many other brands.

“As long as the software is not patched, this vulnerability probably affects many Dell users,” Peleg Hadar, security researcher with SafeBreach Labs – who discovered the breach – said in a Friday analysis.

“Our first priority is product security and helping our customers ensure the security of their data and systems,” the spokesperson said. “The vulnerability discovered by SafeBreach is a PC Doctor vulnerability, a third-party component that ships with Dell SupportAssist for

Read the rest

Linux servers under worm attacks via latest Exim flaw

It didn’t take very long for Hackers to start exploiting this flaw, the recently revealed Exim vulnerability (CVE-2019-10149).

 

An initial wave of attacks on this vulnerability – which involved attackers pushing out exploits from a malicious command-and-control (C2) server – was first discovered June 9 by researcher Freddie Leeman.

“Just detected the first attempts to exploit recent #exim remote command execution (RCE) security flaw (CVE-2019-10149),” he said in a tweet. “Tries to downloads a script located at http://173.212.214.137/s (careful). If you run Exim, make sure it’s up-to-date.”

Amit Serper, Cybereason’s head of security research, “The campaign uses a private authentication key that is installed on the target machine

Read the rest

Stay Informed

Receive instant notifications when new content is released.