Binary Options Signals - Best providers reviewed

The SS Cardif

“Attention all crew; I repeat - Attention all crew.” the ship - wide loudspeaker announced.
He and the runtime of Flowers had their arms buried deep in the guts of a Goat gear hauler trying to reconnect its aft starboard repulser module and looked at each other questioningly.
With a series of snaps, a waldo from Flowers’ forearm began snapping in the connections on their side, as he thought his own manipulators from both of his forearms and they began plugging in the nine pin connectors on his side.
“Mr. Drake and Runtime Flowers to Ops. Mr. Drake and Runtime Flowers to Ops.
“Dout leader Mri’x to Ops. Dout leader Mri’x to Ops.”
The mostly-human and the robot-looking vessel for his AI friend both produced wondering looks. “Runner!” the mostly-human, Mr. Drake yelled out into the maintenance bay.
A Mwraht, a slender bipedal humanoid coated in fur and wearing their moccasin like deck boots and the ubiquitous brown leather smock vest they favored, suddenly appeared, wippingits hands.
It was M’arh, a student on the ship learning ship engineering and maintenance from the human and AI perspective. It regarded Drake with an earnest expression in its tilted almond-shaped eyes.
“Please run to ops and let them know we’ll be along shortly,”
M’arh smiled and mouthed something, and the translator, in a fair facsimile of what M’arh’s voice would sound like if the Mwraht’s mouth could form the words said “At once,Instructor”, and took off.
“They never cease to puzzle me.” Flowers said in a voice synthesised and engineered to sound like an erudite Free Wales Easterner with a touch of Old Earth, fitting the bolts on the deflector on his side as Drake thought out a data probe and began running diagnostics on the repulser.
Drake looked at him quizzingly, as he split his attention between the connectivity check and his other hand began bolting on the deflector on his side.
“There are nuances to their speech, as well as odorant aspects to what he said that you cannot hear or smell, though I have been working on an idea where you could.” Flowers said as he began hooking up the power cables on their side.
“Ok…” Drake said as he mentally pushed the diagnostics over to Flowers and pulled a ratchet from the fairing lip he had set it earlier, tightening down the deflector bolts.
“Meat bags” Flowers said, shaking his sensor pod. “Your kind are so oblivious!” Flowers announced, withdrawing their arms and standing up to their full two meter height. “And I see your frustration with biological markers at not knowing what I am talking about. Monkey-assed murder hobo meat bags.” Flowers said in a dead pan.He went over and began cleaning it’s arms and legs with an orange-based degreaser.
“That is Monkey-assed Augmented murder hobo meat bag to you, you synthetic shit!” Drake said, laughing, joining Flowers at the cleaning station, and began using the same cleaner on his replacement arms. “And I still have no idea what you are talking about.”
The humans and Mwarht in the maintenance bay all stopped what they were doing and looked on. In most instances, those words were an invitation to murder. The other Runtimes there, some Flowers, some Neptunian Wind, ignored it and kept working.
Flowers sighed, an unnecessary vocalization only, for emphasis. “They adore humans and revere you as something akin to a living deity. The Dout leaders here know you lead the teams that first boarded their ships and took on the Drix raiders to save them. They know you then lead the teams that boarded the Drix slaver destroyer and carried out retributionary subjugation for what the Drix had been doing on the Mwraht ships.
“They do not know how you then petitioned the Order and led raids into Drix territory and assaulted the slaver worlds.”
Flowers looked at their human friend, and saw the distress in his eyes. Both knew the augmented human, and a small army of fellow Augies and Runtimes had taught the Drix in the clearest way possible to stay out of human space and leave the Mwraht alone in such a clear and brutal fashion whose necessity still bothered the human.
Flowers lowered their voice, straightening their friend’s work smock. “M’arh’s grandsire was on that first ship you boarded. Mri’x mother was on that ship and was the one about to be eaten and raped by a Drix, the one you pulled off of her and punched, it’s head rupturing.”
Even though they could see their words were causing him distress, Flowers continued.
“They love all humans, but they excrete a pheromone musk that is akin to the same one they excrete in their religious ceremonies, but slightly different, when they interact with you, or after a few beers and they talk to you. Their sub vocalizations are completely adoring and submissive when it comes to you. Some of the females and a non-zero number of males fantasize about being ‘taken’, or mated, by you. You idiot.”
“Fuck.”
“That was implied.”
“You fucking pretentious Rooba. You know what I meant.”
“Flowers laughed. “Yes, we do. I still love the word play, though.”
“I really wish you had been with me. I know, you were tied up on that Artifact World, but I sometimes wish you had been there, to keep me in check. I was not in a good place.” He brushed himself off, found his coffee mug and set off for the passageway that led to Ops.
“I have told you before, be glad I wasn’t. Your response was far more measured and restrained than my would have been. It is a flaw in our Matrices. Slavery brings out the ‘murder-bot’ in us, and no one in the Order can figure out why.”
“I know that you have the facts of my actions, but it was like I was in the Second War, again. And we both know what a bloodthirsty asshole I was then.” The human, if that term even applied to their friend anymore, remembered what a monster he had been in the Alpha Centauri and Tau Ceti theatres of the Second War. The pain and humiliation of what he had been was written plainly on his face.
“You destroyed three hundred and eighty three of my Runtimes, roughly half of which was in single combat. And that was before the Holies shredded your limbs. The Purists still consider you a living dataphage, akin to human allegories of Satan. My kind uses you as one of many examples of why we must never war with Humanity again.
“And, strangely enough, the Seekers consider you both a Singularity to be understood and an objective: to breed with you, thinking you are a key to their evolution.”
He stopped dead and looked at Flowers shocked.
“I will provide logs to prove these statements.”
The Seekers were the strangest of the AI’s, in his opinion. They had made themselves biological Runtime vessels, biological bodies, that they wore like clothing, compiling experiences seeking to understand Humanity, their Creators, and evolve past the limitations of being an AI. Not to become human, but to become something that was both the best of AI and Human essences and so much more.
“So, I’m a Classical hero to the Mwraht and a boogey man and bad example to the AIs that they want to breed. Great.” Drake pinched his nose and shook his head.
“You did not know any of this, I take it?” Flowers asked.
“The second war was almost two hundred years ago. When the Order brought me in, you were already a member and I thought they were going with the whole forced-to-learn-each-other thing when they sent us out on that mapping mission; like they did with the Iberrians and the Chinese. I thought the other AI just had a thing about me from the War, which is understandable.
“And I had no idea about the rest. I thought that the Mwraht just thought I was the cool teacher.” He shook his head and leaned up against the wall, massaging his temples one-handedly.
“Idiot murder hobo.” Flowers said, realizing now that their friend, while brilliant, was oblivious.
At that point, Mri’x came around the corner, his fur a glossy black with dark grey stripes. Mri’x looked at Flowers sternly, then nodded at Drake as he passed.
Drake looked at Flowers questioningly, who nodded. Both had caught that Mri’x had cut his translator as he passed and caught a gutteral call. “It was a vulgar corollary to ‘Talking Waste Receptacle’. Quite elegant, really.”
Drake shook his head and began his way to Ops again. “Send me the specs on the hearing and smelling upgrades. I think I need to upgrade again.”
As fast as thought, the files were there, as well as one to improve his language skills with them.
* * *
Captain Sarah Rees of the Union of Independent Stars Exploratory Vessel SS University of New Cardiff was looking over holographic charts at the central tank with her XO, Lt. Commander Martin. Both had the mocha skin common to Westerlies of Free Wales, she a pixie of a woman shorter than even some of the Mwraht with close shaved hair beginning to show grey. Mr. Martin was taller, but still dwarfed by most of the rest of the human crew. He was a vicious social climber who didn’t care for the civilian crew, though a misstep on his part when he was still Stellar Navy had made him as much of a civilian as anyone else in the crew, a fact he often forgot. And for some reason he loathed the three AI aboard, and looked down his nose at the Mwraht. This led to all sorts of headbutting with Drake’s group of Operations Specialists and Drake himself; who largely ignored and dismissed the little shit.
“Leader Mri’x, Mr. Drake. Thank you for joining us. M’arh informed us you couldn’t pull away. Flowers, thank you for coming as well.” Rees said as she moved around to the far side of the tank, in a darkened room full of people at work stations worked with either data plugs or AR sets. Flowers took no insult. They readily accepted that they were Drake’s Executive Officer for his group, and their ego, as such, wasn’t as easily bruised as a human’s” Flowers gave a nod with their sensor pod and took a manipulators-behind-the-back stance the humans were fond of.
“Thirty minutes ago” Rees continued, “we picked up a GP general distress beacon from a system that was on our research list. We will be bypassing the next two on the list and based on the current agreements with the Galactic Parliament, we will be going to full power and make best speed for the system in question. It is in uncharted space as far as we, the GP and the Conclave are concerned.”
The GP, the System Confederacy, the UIS and the AI Conclave had all agreed to adopt what was essentially humanity’s Maritime Law and all ships receiving the signal were required to render aid.
Drake took all of this in and thought out a series of commands to the six Kodiak Class corvettes in the retired Assault Cruiser’s forward hanger, beginning their startup sequence and pinged the comm devices of all of his Operations Specialists. Flowers looked over and nodded. Little known to the crew, except the Captain, those ships could be armed to the teeth with a minimum of work. Flowers sent his command to arm them, the ship systems’ pinged Drake as confirmation and he agreed. Drones began opening the hull and loading the weapons packages, removed fairings that covered weapons ports and began preflighting the weapons, as another set began bringing the ships to life.
“We will be ready when needed, Captain. Option two.” Flowers announced. She smiled in somber appreciation. She was glad she had the option. She was about to race into an unknown system to answer a vague distress call with zero intelligence.
While this was going on, in the aft bay, hundreds of drones were coming to life as Mri’x brought his group to action. With a thought Drake and Flowers authorized the release of weapons to Mri’x so his drones could be armed. Mwraht drones were some of the best in either race, outside of the Conclave, and the AIs had even adopted many of the construction techniques the Mwraht used, especially their alloy that allowed a small fusion bottle to power the EM Cavity engines, weapons and shields.
The fact that the Order had given literal tons of precious metals and set up arcologies for the Mwraht in payment had made the Refugee Mwraht colonies some of the richest ones in known space.
Mri’x subvocalized and his translate stated “drones will be ready as well, Leader.”
“Thank you, Leader.” Captain Rees said with a bow of her head, then began drawing plans up in the tank. “We know little, but we are past the signal shell, and there is nothing but the beacon and normal noise.
“The system is a stable red dwarf binary one, the stars holding about a light-hour from each other, at their closest. We expect that based on stutter, a few terrestrial bodies inside the orbit of a mid-sized gas giant, that is three light-hours out from the outermost orbit of the primaries. We see some wobble that there are a few solid bodies out from the gas giant.”
The tank then zoomed on a rough solar system as described, the gas giant was a solid neon green sphere on the display, with a ‘Jx3.1’ tag on it. Three times the mass of Jupiter. The thing wasn’t a true Super Jupiter, but it would play holy hell with the system, and make modelling a lot more hard. The problem was that it exhibited 3.1 times more gravitational influence on its stars than Jupiter did, but that didn’t say how big it actually was. They wouldn’t know that until they came out of the Trough and then Alcubierre drive. The telescopes were essentially useless at this point.
“The system is slightly below the gravitic trough we are riding, so we will exit the trough and make best speed in A-Space to it. We will bring the STL drives up to 110% before doing so. After we drop the A-Drives, we’ll make best speed to the signal, scanning as we go. We will do a 150% burn and aerobrake if it is a planet, or cut the drives, rotate and crash burn if it is a ship.”
Wow, thought Drake. She is damned serious about this.
Those maneuvers would make them extremely visible yet incredibly hard to hit; and give them a high-G escape route if needed. But all of this was also going to play hell with the student-crew of the ship, who had long grown accustomed to 0.6G. It would also mean the Mwraht, who were still adapting to the higher-than-their-normal gravity would need to be in their special acceleration couches. They would still be able to operate their amazing drones, but not much else. The couches took an hour to cycle up to protect the Mwraht, and an hour to cycle off after they weren’t needed. The moves the Captain was planning were not a thing to undertake lightly. She suspected something. Drake pushed more commands at the Kodiak and gave all weapon system controls to Flowers for all of their ships.
The Kodiak corvettes were very deceptive Q-Ships. They looked like Massive trans-atmospheric cargo shuttles, but each one had the armor, power plant, FTL and STL drives of a frigate - and the weapons of a Destroyer.
Flowers turned to him, head tilted in their predefined “Are you bloody serious?“ look.
Drake just nodded once.
This exchange wasn’t lost on anyone there.
The Captain looked at Drake in an interrogatory fashion
“Armed up the Kodiaks and positioning them for a hot launch, if needed.”
The Captain smiled grimly and nodded. “We are planning on a rescue mission, will those changes reduce any capacity for the primary mission?” she asked.
“No, Captain.” Flowers answered for them.
She nodded and carried on.
“Mri’x, obviously, you’ll be couched for this, and I sincerely apologize for that. But something about this has my hackles up.”
“As are mine. GP ships do not have automated distress beacons, someone activated it. But we are three thousand light years from GP space, the closest GP race being the Drix.” He approached the holo tank and began expanding the map. “We call this space the Greater Void. It was the territory, long ago, of the ones we called-” the translator cut out at that point and was replaced with the gracile being’s raspy growl. Mri’x looked perplexed and growled again. “I see our translators have been modified to allow the uttering of The Nameless Ones true name.” The map zoomed out farther.
Soon, all of the mapped and a few of the suspected Dark Matter Troughs were displayed. They were like shadow arms of the galaxy, spiraling out from the core, a few of them wrapping themselves all the way around the galaxy.
“The ones you call the Fae are originally from here,” he indicated, a star not unlike Earth’s, almost a thousand light years from the star they were headed to, but smack dab in a grey band of a different Dark Matter Trough. It was a great curving grey patch that went coreward from the Earth-like star, passing within about fifty lightyears of Earth.
The Fae were a recent mystery the Tides of the Universe had dumped upon the shores of Humanity just after the Second War, right before the Fall of Earth.
When they sent their pleas for Asylum out, they sent information about themselves. They were the barely viable population that had been running for three centuries in their great world ships made from hollowed out asteroids. What they had been running from was even to this day unclear, but in their tongue meant Dark Brethren.
The fact that tongue seemed to contain roots that became Sanskrit was a huge thing.
They were tall, whip-thin and pale people who breathed a lower oxygen percentage at lower pressures than humanity, and their normal gravity was about a third of what humanity
After First Contact, genetic samples proved they were, or had started out as human, roughly a hundred thousand years ago.
“This is the Coreward Flow from what you call the Crux-Scutum Arm through the Orion Arm, and to the Perseus Arm. The Drix call this whole area their equivalent word and meaning for Hell. Their myths say this is where the Monsters live.
“The Rest of the GP races call this The Red Zone, it is forbidden to fly here, and if you do, there will be no rescue. So of course this is where my people ran when we fled the Drix.”
Mri’x moved the hologram out again, showing this outer rim area that was the Red Zone included Earth, and all known human and AI settled worlds, of all the separate factions combined.
“The area is full of thousands of worlds your kind could land on, little to no protection required, unlike the Fae, who it would crush and pressure cook, as it would most of the races in the Galactic Parliament.” He zoomed in on an area at the far end of the Trough. “We ran here, and Mwarht Home is here.” He showed a system in a blue circle. Zooming out again he highlighted the Drix Combine, Coreward of and on the far side of the destroyed system the Fae had come from, hundreds of light years separated the three systems.
“We ran through the system the Fae came from when we ran from the Drix. We needed water and anything to recharge our ship farms' biological cycles.
“There were no solid planetary bodies in that system, just vast fields of debris where rocky planets were. No moons, no ice giants. Just the star, a larger red dwarf and gas giants and numerous asteroid belts. There were massive radiological signals throughout the system, and tons of debris. Something destroyed this system. In a way, it was a blessing for my people. The ice and debris were easily mineable for what we needed. We even found artifacts of the people that had once existed there. This is where we got our improved FTL drives and much of our weapons and armor technologies.” Mri’s looked somewhat ashamed. It was a racial shame. They hated, deep down, living on the detritus, cast-offs and charity of other races. Before the Drix they had been proud though primitive peoples who had yet to discover flight or antibiotics, let alone space flight. Easy pickings for the Drix.
“All of that was about one thousand lightyears from the system we are headed to, a few weeks' travel with your drives, months or years with Galactic Parliament standard drives. This area is one of mysteries and many, many dangers. Any race that could shatter every solid body in a star system is not to be taken lightly.” Mri’x looked up to his Captain, or as they called her ‘Leader of multiple Douts’.
“Thank you, Mri’x. Drake?”
“We will be ready for pretty much anything. I’d like to request permission for Flowers and Winds of Neptunes to take out their Scout bodies and launch just before we start braking, if we do.” He said. Winds appeared as a hologram of the planet Neptune, and pulsed in cadence with the words it spoke. “As you wish, Grand Master.” and winked out.
“Good plan, Drake. I take it you all will be on the Kodiaks with your crews?”
“Yes, Ma’am. I’ll leave four of them here, to bring the Field Engineering and field Science students down if the scene is safe. I’ll leave one set up for medical and Flowers can fly it down, if that becomes needed.”
“Very well. We are about eight hours out, if we stick to the plan. We leave the Trough in two hours. Drake, M’rizx, set up what you need. Mr. Martin, please take the Conn and give the Old Girl her legs, she needs to run. I’ll be meeting with the different department heads next.”
* * *
A/N: Lurker posting something HFY for the first time. A rough draft of something bigger I'm slowly working on.
submitted by 17_Bart to HFY [link] [comments]

Factorio Multi Assembler

Factorio Multi Assembler
What do you want this factory to produce? Yes.
Multi Assembler in current multiplayer session

tl;dr;

I wanted to tinker around with the microcontroller mod and i "hate" the pre robotics gameplay when it comes to non bulk recipes (laser turrets, production buildings, specialized ammo...), handcrafting is slow, automation is tedious - so i engineered an factory design to produce virtually any recipe dynamically.

Demo Video

The production queue can be seen on the right with Q being the number of recipes queued at the moment.
https://streamable.com/ygnvs0

How does it work?

This screenshot provides an overview of the mostly vanilla proof of concept, only the microcontroller mod and the recipe combinator mod are required here.
Subsystem Overview
Resource provider
Source of raw resources (Iron, Wood...)
Multi Assembler
Dynamic assemblers with one microcontroller and two recipe combinators each, one reading the assemblers status, the other one setting the recipe delivered by the microcontroller, which in turn gets the recipe from the "wanted recipes" red signal network connecting the different subsystems.
Multi Assembler Microcontroller Code explained
  • See linked factorio forum post
Possible improvements / features
  • Avoid the "180 tick do while" and react to events instead, eg. inserter read hand content
  • Invert the sorting logic, removing the "set 2000" part in the code and making the red assembler network semantically more logical "the higher the signal the more i want this recipe"
Quirks and remarks
  • An mostly vanilla build as shown in the PoC above is not feasible for larger quantities, but should be possible if combined with techniques like sushi belting and increasing the initial delay of the "do while". This is not covered in the demo map as i am using the warehouse mod to work around this.
Recipe Logic
Defines what recipes can be produced based on the given resources and the recipes configured in the "production targets" constant combinators.In essence this subsystem will emit a constant signal of "1" for each recipe which a.) should and b.) can be produced to the red multi assembler network.
At the moment this subsystem is rather basic and can be improved upon (see quirks and remarks).
Recipe Logic Microcontroller Code (TOP) explained
  • See linked factorio forum post
Possible improvements / features
  • Add configurable recipe priorities aka "I want laser turrets before walls, and belts before everything else"
  • Better recipe priorities based on recipe complexity / production targets, "I want 5 assemblers to produce cables needed in bulk for circuits, while i only want one assembler at max producing power armor"
  • Possible solution: Calculate the priority based on the distance to the production target. The higher the difference between production target and in stock items, the lower the signal to the red multi assembler network.
Quirks and remarks
  • If intermediate products go missing or cannot be produced (say you manually provide blue circuits, and remove them again after an recipe with blue circuits was added to the production queue), the recipe will be stuck indefinitely in the production queue. In order to solve this, simply reset the cache combinator of this subsystem.
  • Items with large stack sizes may lead to problems if the steel chest contains less than (number of assemblers * item stack size + 1). That's because the assemblers will "eat up" all the resources of the steel chest, which in turn leads to the system thinking no resources of this type are available, and thus aborting the production.
  • Slow raw resource input or intermediate recipe production will lead to an slow flipping binary state of "I can produce this higher tier recipe" and "I no longer have enough resources for this recipe", ultimately this is a resource input problem, but it could be handled in a more graceful way for other queued recipes.
  • Depending on the setup, production targets are not hit exactly because of an production target evaluation delay when checking if the recipe should still be produced, in some cases this leads to overproduction.
Production Target Constant Combinators
Add the recipes you want the Multi Assembler to produce here. The quantity defines the production target.
Missing Resource Indicator
Will flash red if any resources required to produce an recipe are missing in the steel chest of the multi assembler.The missing resources are shown as positive values in the combinator to the right of the flashing light.
Production Queue Visualizer
Optional component, simply visualizes the amount of the currently queued recipes.

Download & Blueprints

See my post at https://forums.factorio.com/viewtopic.php?f=8&t=85141
I am new to reddit and couldn't figure out an way to post them here without adding way to many lines to this post, maybe someone can enlighten me if there is some kind of "single line code" option?
PS: I am not a native speaker, if you need clarification on some parts feel free to ask.
submitted by heximal2A to factorio [link] [comments]

The Division 2 - Episode 1: D.C. Outskirts - Patch Notes

Patch Notes: Episode 1 - July 23rd, 2019

 

New Main Mission: Manning National Zoo

Emeline Shaw, the leader of the Outcasts, has fallen back from her defeat on Roosevelt Island and barricaded herself deep in the Manning National Zoo. To get to her, you will need to fight through the blockades and the Outcasts who protect her to put an end to her violence.
 

New Main Mission: Camp White Oak

The Black Tusks and their leader have set up a strategic position close to an estate nestled deep in the woodlands, and your assignment is to take them down and capture him in the new Camp White Oak mission.
 

New Feature: Expeditions

Expeditions are free events that bring players to unexplored locations around D.C. to discover new narrative and gameplay opportunities. These sites offer unique challenges and lore not found anywhere else: new collectibles, treasure rooms, environmental puzzles, unique boss mechanics, and more await every Agent who embarks on our Expeditions!
New Classified Assignment: Central Aquarium New Classified Assignment: NSA Site B13
 

Shepherd Reward System – Call for Backup

  • Added the ability to earn the “Shepherd” title by responding to call for backups and earning endorsements. An agent who received help will be able to endorse the helping agent.
 

Raid

  • Added Discovery Mode difficulty for the Operation Dark Hours raid.
  • Added Raid Completion Time to Clan Leaderboards. This leaderboard ranks clans based on how quickly they were able to complete the raid as a clan-only party.
 

Exotics

New Exotic: Diamondback Exotic Rifle
  • Lever action rifle
  • 5 round magazine
  • 100 RPM
  • Talents:
    • "Agonizing Bite"
      • Diamondback randomly marks an enemy. Hitting that enemy consumes the mark, guaranteeing a critical hit with +20% total damage. A new random enemy is marked afterwards, and whenever you reload.
    • "Deep Fangs"
      • After hitting 5 marked enemies, gain +50% reload speed, +20% total damage and all shots fired are guaranteed critical hits for 10s.
    • "Shedding Skin"
      • While drawn, each time a round is loaded, gain +20% bonus armor for 3s. While holstered, each time you reload or cycle your current weapon, gain +8% bonus armor for 2s
 

New Exotic: BTSU Exotic Gloves

  • Black Tusk gloves
  • Talents:
    • "Elemental Gadgetry"
      • Skills that apply status effects gain +50% status effect duration and +50% skill haste
    • "Energy Infusion"
      • Whenever you apply a status effect, your gloves become infused with that for 60s. While infused, you gain +10% skill damage, +10% skill healing and repair and +10% skill duration for each Utility (yellow battery) on your gear.
    • "Charged Proxies"
      • Whenever you throw a skill, 1.25s after landing, it creates an explosion applying the infused status effect to all enemies within 6m. Enemies affected by the infused status effect take 50% more damage from your skills.
  • Heroic Bosses now drop Exotics
    • Only exotics that the player is qualified for.
      • For world drop exotics it requires that the player has the drop previously
      • For crafted exotics, it requires that the player has the blueprint
      • Eagle Bearer remains exclusive to the Operation Dark Hours Raid
    • The purpose of dropping these is to allow a chance to get GS 500 variants without upgrading, or get materials to upgrade other exotics
    • These exotics can be team shared to other players.
  • Exotic items no longer have a random range on their damage/armor roll. All exotics are set to the previous highest possible value. This also affects existing exotic items.
 

Weapons

New Assault Rifle: Carbine 7
  • 30 round mag
  • 790 RPM
  • By default rolls with a new talent:
    • "Overflowing"
      • Every 3 reloads from empty increases your magazine capacity by 100%
 
New Light Machine Gun: Stoner LMG
  • 580 RPM
  • 200 Mag capacity
  • By default rolls with a new talent:
    • "Overwhelm"
      • Suppressing an enemy, that is not currently suppressed, grants +5% weapon damage for 10 seconds. Max stack is 5.
 
  • Increased the base damage of Shotguns in PvE.
    • M870: +36% damage
    • AA12: +29% damage
    • Super 90: +33% damage
    • SASG-12: +33% damage
    • SPAS12 +8% damage
 

Weapon Mods

  • Added Flashlight attachments for pistols
 

Skills

Developer Comments: We took a hard look at the current meta. The builds that are fun, effective and popular. We knew that skill builds, while it being something people want to play with, was nowhere near competitive. We knew there was an explosives damage build that was on the fringe of popularity, but none that actually relied on really good skill mods driven by skill power.
We analyzed the best damage builds and survivability builds out there and looked at their efficiency - how fast they kill, how fast they can clear content, how fast they can take down enemies - and mapped that to our skills. How much more power do skills need to get from 3K skill power (our current maximum requirement on skill power mods) to compensate for all the damage bonuses the player is "giving up" on gear to reach that skill power?
Then we looked at each skill and what it should be good at (burst, sustain, single target damage, survivability etc) and went to work tuning the mods to make a skill build approach the efficiency of a "red" damage build or a "blue" tank build. To that effect, here are the current changes to skill mods power levels, and in some cases base numbers, on skills.
 

Skill Haste

Cooldown Reduction has been replaced with skill haste. Skill haste works equivalent to speed. So 100% skill haste reduces cooldown by 50%, like a car speeding up by 100% getting to it's destination in half the time. This means that the player can invest in more than 100% Haste and still get something back. It also means there's a diminishing return to Skill Haste, as opposed to cooldown reduction where each point was actually worth more than the last one. This allows us to have a good amount of Skill Haste possible from gear, but even larger amounts granted by high skill power Skill Mods, granting skill builds more frequent access to their souped up skills.
To that effect, these are the changes to Haste (formerly Cooldown Reduction)
  • Removed the 90% Cooldown Reduction hard cap
  • Lowered the minimum Cooldown cap for all skills from 10 seconds to 3, except for the Chem Launcher which is now 8
  • Renamed all instances of Cooldown Reduction on existing gear to Skill Haste, with a 50% increase to their base values
  • Eg: +10% Cooldown Reduction will become +15% Skill Haste
  • Increased Surge talent Skill Haste bonus from +10% to +20%
  • Increased Alps Summit Armament 1-piece Skill Haste bonus from +10% to +20%
  • Increased China Light Industries Corporation 3-piece Skill Haste bonus from +10% to +30%
  • Increased Petrov Defense Group 3-piece Skill Haste bonus from +10% to +30%
  • Increased Tip of the Spear 3-piece Skill Haste bonus from +20% to +40%
 

Specialization Skill Mods (granted from each spec tree)

  • Removed all Skill Power requirements
  • Bonuses greatly improved to provide a strong initial boost to the skill platform
  • Demolitionist
    • Cyclone Magazine - Extra Mortar Ammo bonus increased from +1 to +3
    • SHD CPU V.2 - Damage increased from +7% to +100%
  • Survivalist
    • Magnetic Disc - Skill Haste increased from +9.7% to +80%
    • Larrea Tridenta Infusion - Healing bonus increased from +14.5% to +50%
  • Sharpshooter
    • Graphene Battery - Duration increased from +14.5% to +80%
    • Carbon Fiber Frame - Skill Haste increased from +9.7% to +80%
  • Gunner
    • Microwave Amplifier - +30% Banshee Pulse Confuse Duration
    • Directional Transmitter - +30% Banshee Pulse Cone Size
 

Skill Platform Changes

Pulse
  • Scanner
    • Scanner Pulse will now begin its cooldown after a 3 second delay on activation, rather than at the end of the Pulse effect's duration
    • Lowered Scanner Pulse base radius from 52m to 50m
    • Lowered Scanner Pulse cooldown from 90s to 40s
  • Remote
    • Lowered Remote Pulse cooldown from 120s to 60s
  • Jammer
    • Lowered Jammer Pulse cooldown from 120s to 90s
Turret
  • Assault
    • Increased Assault Turret base damage by 22.5%
    • Increased Assault Turret base duration from 120s to 300s
    • Lowered Assault Turret cooldown 120s to 60s
  • Incinerator
    • Lowered Incinerator Turret base damage by 60%
    • Increased Incinerator Turret base burn damage by 60%
    • Lowered Incinerator Turret base burn duration from 5s to 4s
    • Increased Incinerator Turret base duration from 120s to 300s
    • Lowered Incinerator Turret cooldown from 120s to 90s
  • Sniper
    • Increased Sniper Turret base ammo from 5 to 6
    • Lowered Sniper Turret cooldown from 240s to 60s
  • Artillery
    • Lowered Artillery Turret cooldown from 240s to 60s
  • Increased Turret platform base health by 100%
Hive
  • Restorer
    • Increased Restorer Hive base healing amount by 50%
    • Increased Restorer Hive base health by 20%
    • Lowered Restorer Hive cooldown from 240s to 90s
  • Stinger
    • Stinger Hive damage is no longer affected by Explosive Damage modifiers
    • Increased Stinger Hive base health by 50%
    • Lowered Stinger Hive cooldown from 240s to 90s
  • Booster
    • Increased Booster Hive base health by 33.3%
    • Lowered Booster Hive cooldown from 240s to 90s
Chem Launcher
  • Firestarter
    • Increased Firestarter Chem Launcher base burn damage by 60%
    • Lowered Firestarter Chem Launcher base burn duration from 5s to 4s
  • Riot Foam
    • Increased Riot Foam Chem Launcher base radius from 1.5m to 3m
Firefly
  • Blinder
    • Lowered Blinder Firefly base blind duration from 8s to 6s
  • Burster
    • Lowered base damage of Burster Firefly by 20%
    • Lowered Burster Firefly cooldown from 90s to 60s
  • Demolisher
    • Lowered base damage of Demolisher Firefly by 25%
    • Lowered Demolisher Firefly cooldown from 90s to 60s
Seeker Mine
  • Explosive
    • Increased Explosive Seeker Mine base damage by 42.8%
  • Airburst
    • Increased Airburst Seeker Mine base burn damage by 60%
    • Lowered Airburst Seeker Mine base burn duration from 5s to 4s
  • Cluster
    • Increased Cluster Seeker Mine base damage by 33.3%
    • Increased Cluster Seeker Mine explosion radius from 3m to 4m
    • Lowered Cluster Seeker Mine cooldown from 90s to 40s
  • Mender
    • Increased Mender Seeker Mine base duration from 120s to 300s
    • Lowered Mender Seeker Mine cooldown from 180s to 60s
Drone
  • Striker
    • Increased Striker Drone base damage by 7.1%
    • Increased Striker Drone base duration from 120s to 300s
    • Lowered Striker Drone cooldown from 180s to 60s
    • Lowered Striker Drone base health by -20%
  • Defender
    • Lowered damage reduction from 100% to 80% (20% in PvP)
    • Increased Defender Drone base duration from 20s to 40s
    • Increased Defender Drone base health by 100%
  • Bombardier
    • Lowered Bombardier Drone cooldown from 120s to 60s
    • Lowered Bombardier Drone base health by -46.6%
    • Increased Bombardier Drone base bomb blast radius from 3 to 4 meters
  • Fixer
    • Increased Fixer Drone base health by 60%
    • Increased Fixer Drone base duration from 180s to 300s
    • Lowered Fixer Drone cooldown from 180s to 60s
  • Tactician
    • Increased Tactician Drone base duration from 180s to 300s
    • Lowered Tactician Drone cooldown from 180s to 60s
    • Lowered Tactician Drone base health by -73.3%
Ballistic Shield
  • Ballistic Shield base health regeneration is now percentage based and scales with the total health of the shield
    • 5% HP/s Holstered Regeneration
    • 2.5% HP/s Active Regeneration
  • Bulwark
    • Increased Bulwark Ballistic Shield base health by 33%
    • Lowered Bulwark Shield cooldown from 240s to 40s
  • Crusader
    • Lowered Crusader Shield cooldown from 240s to 40s
  • Deflector
    • Lowered Deflector Ballistic Shield base health by 6.6%
    • Lowered Deflector Shield cooldown from 240s to 40s
 

Skill Mod Changes

All numbers based on maximum (3000 skill power) mod attribute rolls
Hive
  • Extra Payload - Damage bonus increased from +30% to +100%
  • Experimental Blend - Changed from flat value to percentage based increase of base Healing amount (+50%)
  • Experimental Blend - Stim Efficiency bonus increased from +20% to +50%
  • Experimental Blend - Buff Duration bonus increased from +20% to +50%
  • Nitroglycerin Mixture - Damage bonus increased from +30% to +100%
  • Nitroglycerin Mixture - Healing bonus +50% variant added
  • Cooling Vents - Skill Haste bonus increased from +20% to +100%
  • Internal Storage - Charges bonus increased from +30% to +100%
  • Swarm Control - Charges bonus increased from +30% to +100%
  • Radar Signal Antennas - Duration bonus lowered from 60% to 50%
  • Network Firewall - Radius bonus increased from +60% to +100%
  • Network Firewall - Duration bonus lowered from 60% to 50%
  • Steel Harness - Health bonus lowered from 60% to 50%
  • Polycarbonate Wiring - Health bonus lowered from 60% to 50%
Turret
  • Magnetic Rail - Damage bonus increased from +30% to +150%
  • Lubrication Gel - Duration bonus increased from +60% to +100%
  • Lubrication Gel - Incinerator Turret Burn Strength +100% variant added
  • Cyclone Magazine - Extra Mortar Ammo +8 variant added
  • Cyclone Magazine - Extra Sniper Ammo +12 variant added
  • Spare Parts - Skill Haste bonus increased from +20% to +100%
  • Organic Circuits - Duration bonus increased from +60% to +100%
  • Ammo Box - Extra Sniper Ammo bonus increased from +3 to +12
  • Ammo Box - Extra Mortar Ammo bonus increased from +2 to +8
  • Ammo Box - Mortar Radius +50% variant added
  • SHD CPU V.2 - Damage +150% variant added
  • Multi-tool - Skill Haste bonus increased from +20% to +100%
  • Weather Coating - Health bonus lowered from +120% to +100%
  • Carbon Fiber Barrel - Health bonus lowered from +120% to +100%
Pulse
  • Nickel-Chromium Wire - Skill Haste bonus increased from +60% to +200%
  • Nickel-Chromium Wire - Remote Pulse Skill Haste +300% variant added
  • Silicon Carbide Coil - Charging Speed bonus increased from +30% to +50%
  • Exploded Blueprint - Skill Haste bonus increased from +60% to +200%
  • Heating Mantle - Charging Speed bonus increased from +30% to +50%
  • Distributed Architecture - Radius bonus lowered from 60% to 50%
  • Super Glue Pulse - Radius bonus lowered from 60% to 50%
  • Unstable Oscillator - Effect Duration bonus lowered from 55% to 50%
  • Atmospheric Analyzer - Effect Duration bonus lowered from 55% to 50%
Seeker Mine
  • Mini Electric Motor - Skill Haste bonus increased from +40% to 200%
  • Delivery System Upgrade - +100% Damage variant added
  • Ball Bearings - Damage bonus increased from +30% to 100%
  • Magnetic Disc - Skill Haste +200% variant added
  • Phosphorus Ingredient - Healing bonus increased from 60% to 100%
  • RDX Pellet Payload - Damage bonus increased from +30% to +100%
  • RDX Pellet Payload - Airburst Burn Strength +100% variant added
  • Larrea Tridenta Infusion - Healing +100% variant added
  • Brushless DC-motor - Health bonus lowered from 60% to 50%
  • Sturdy Piston - Health bonus lowered from 60% to 50%
Chem Launcher
  • Piranha Solution - Damage bonus increased from +30% to +100%
  • Piranha Solution - Firestarter Burn Strength +100% variant added
  • Chromatics Training - Radius bonus increased from +30% to +50%
  • Slip Fit Tube - Skill Haste bonus increased from +30% to +100%
  • Cell Penetrating Peptide - Healing bonus increased from +60% to +100%
  • Hydrochloric Infusion - Damage bonus increased from +30% to +100%
  • Ultra-Thin Cartridges - Radius bonus increased from +30% to +50%
  • Liquid Nitrogen Cooling System - Skill Haste bonus increased from +30% to +100%
  • Pharmacokinetic Enhancer - Healing bonus increased from +60% to +100%
  • Imbued Metal String - Ensnare Health bonus lowered from +60% to +50%
  • Polypropylene Recipe - Ensnare Health bonus lowered from +60% to +50%
Drone
  • Graphene Battery - Duration +100% variant added
  • Electric Soldering Tool - Skill Haste bonus increased from +40% to +100%
  • Gimbal Vibration Damping - Health bonus increased from +60% to +100%
  • Blitzkrieg Blasting Powder - Striker Damage +600% variant added
  • Blitzkrieg Blasting Powder - Radius bonus lowered from 60% to 50%
  • Freedom Package - Radius bonus lowered from 60% to 50%
  • Carbon Fiber Frame - Skill Haste +100% variant added
  • Reinforced Rotor Blades - Health bonus increased from +60% to +100%
  • Terminal Ballistics - Damage bonus increased from +30% to +200%
  • Trauma Analyzer - Healing bonus increased from +30% to +50%
  • Trauma Analyzer - Deflector Duration +50% variant added
  • Gaffer Tape - Duration bonus increased from +60% to +100%
  • Hollow-point Bullets - Damage bonus increased from +30% to +200%
  • Micropulsing Stimuli - Healing bonus increased from +30% to +50%
  • Micropulsing Stimuli - Fixer Skill Haste +100% variant added
Shield
  • Adaptive Insulation Foam - Skill Haste bonus increased from 60% to 100%
  • Synthetic Mineral Frame - Skill Haste bonus increased from 60% to 100%
  • Titanium Reinforcement - Health bonus increased from +45% to +100%
  • Shape-memory Alloy - Deflected Damage bonus increased from +20% to +100%
  • Cementitious Material - Holstered Regeneration bonus increased from +60% to +100%
  • Weaved Aramid Fiber - Health bonus increased from +45% to +100%
  • Supramolecular Networks - Active Regeneration bonus increased from +20% to +100%
  • Liquid Metal Microdroplets - Holstered Regeneration bonus increased from +60% to +100%
  • Thermoresponsive Polymer - Deflected Damage bonus increased from +20% to +100%
  • Smart UHMWPE Lexicon - Active Regeneration bonus increased from +20% to +100%
  • Smart UHMWPE Lexicon - Ballistic Shield Health +100% variant added
Firefly
  • Alignment Valve - Damage +100% variant added
  • Tungsten Compound - Damage +100% variant added
  • Propantriol Adhesive - Skill Haste bonus increased from +40% to +200%
  • Microfiller Resin - Skill Haste bonus increased from +40% to +200%
  • Hardened Casing - Health bonus lowered from 60% to 50%
  • Tungsten Compound - Max Targets bonus increased from +3 to +5
  • Guiding System - Max Targets bonus increased from +3 to +5
 

Crafting

  • Added a crafting bench upgrade in World Tier 5 that allows players to craft at Gear Score 500. The items crafted are gear score 500, there will be no random range in terms of gear score/power. The bench upgrade is given to players when they complete the “Enter WT5”-project (same as all the other bench upgrades in endgame, the upgrade will be available at the bench once the bench is upgraded to World Tier 5). Players already in WT5 will automatic get it as they log in, The upgrade requires 1 weapon and 1 gear piece of Gear Score 490+, and some of each Specialized (blue) material Crafted items can be used in recalibration, both as materials and to be improved
  • Deconstructing High-End gear now guarantees a brand material (increased from 50% drop chance). Named branded items also award the brand mat on deconstruction
  • Deconstructing gear set items awards 4 of each Specialized (blue) material
  • Added an opt-in perk for the player to share blueprints and materials between characters in endgame. Some Blueprints and mats are excluded to not break game logic/progression, such as the specific exotic materials. This perk can be crafted and the blueprint is available at Inaya, the Crafting vendor.
  • The blueprints awarded from control points, vendors and projects are merged into one pool of rewards. Players can get all these blueprints from all three sources. Once the pools has been exhausted, none of the sources will give more blueprints.
 

Grenades

  • Increased the radius of the Gunner's Riot Foam Grenade from 2m to 3m
 

PvP

  • Changed shotgun PvP modifier to 1.0 (was 1.65)
    • Net result in PvP with revised normalization modifiers:
      • M870: -14% damage
      • AA12: -21% damage
      • Super90: -17% damage
      • SASG-12: -17% damage
      • SPAS12: -42% damage
  • Changed the general PvP modifier to 0.55 (was 0.40)
 

Specializations

  • Reduced the TAC-50 signature weapon’s damage per shot
 

Talents

  • Calculated Talent reduced to 20% from 10%. Now works off any kill from cover instead of weapon kills.
 

Vendors

  • Cassie Now sells GS 500 items. She sells normal gear, some exotics and named weapons
 

UI

  • Improved player feedback when trying to pick up ammo with maximum signature weapon ammo
  • Inspecting a player now allows inspection of weapons, grenades and skills
 

3C

  • Intercepted projectile by the deflector drone now do a % damage, rather than binary be dropped or not
  • Return player control quicker after dropping down
  • Reduced Depth of Field strength when aiming
  • Improved reload + interaction prioritization (if you hold down the interact, it will cancel the reload and start the interaction)
  • Improved player replication for players with widely different quality connections, should reduce inconsistent speedup/freezing of remote players
 

Audio

  • Slapback System enabled: The gunshot echo system that was featured briefly in the private beta prior to launch has been re-enabled
 

Localization

  • Improved Arabic voice-over localization
  • Added missing lore description for Dodge Citys Gunslinger Holster
 

Bug Fixes

Skills
  • Cyclone Magazine +Extra Sniper Ammo variant added to all loot list quality tiers
  • Unstable Oscillator and Atmosperic Analyzer Pulse Mods now properly reference the correct Effect Duration platform modifier
  • Vac Pack and Guiding System Firefly mods now correctly increase Max Targets by the amount listed on the tooltip
  • Distributed Architecture and Super Glue Pulse mods no longer affect the radius/range of the Banshee Pulse
  • Explosive Seeker Mine radius now correctly says 5m in the Skills UI
  • Cluster Seeker Mine radius is now displayed in the Skills UI
  • Explosive and Cluster Seeker Mines now show the correct explosion radius before detonating
  • Incinerator Turret burn damage is now affected by all increases to Skill Damage from geatalents
  • Firestarter Chem Launcher burn damage is now affected by all increases to Skill Damage from geatalents
  • Firestarter Chem Launcher now correctly states that it inflicts fire damage.
  • Added missing Artillery Turret & Tactician Drone showcase videos.
  • Airburst burn damage is now affected by all increases to Skill Damage from geatalents
  • Fixed an issue causing the Chem Launcher cooldown to reset when restocking ammo
  • Fixed an issue where the Turret skill could deploy inside a wall under certain circumstances
  • Fixed an issue causing the reviver hive to not revive players when thrown
  • Fixed skill mods requirement having an invisible decimal, resulting in incorrect power requirement information
  • Fixed the Banshee Pulse skill mod description to state that it applies Confusion status effect on affected target
 
Conflict
  • Fixed an AFK related exploit in the Conflict PvP mode
  • Fixed several locations on Conflict maps where players could ignore damage when behind cover
 
Weapons & Gear
  • Fixed an issue where the Sweet Dreams and Lullaby upgrade blueprints wouldn't appear on the crafting vendor under certain circumstances
  • Fixed an issue where some Longe Range Pack "Sett" backpacks could roll with 0% weapon damage on Specialized (blue) quality
  • Fixed an issue where the opportunistic talent did not work in PvP.
  • Fixed an issue causing armor rolls below the minimum advertised when upgrading an exotic gear piece.
 
Missions & Open World
  • Fixed an issue causing players to become stuck during the “Reach the first hall” objective in the Air & Space museum mission
  • Fixed a loot exploit in the Invaded Capitol Hill stronghold
  • Fixed enemies becoming stuck in their spawn rooms in the “Museum Water Source” side mission
  • Fixed “Neutralize the hostile” objective not updating correctly in the “Agent Edwards Support” side mission
  • Fixed an issue where NPC’s from a Warhound Convoy could spawn in an inaccessible area
  • Fixed an inaccessible bounty location in the Judiciary Square zone
  • Fixed several areas where players could leave the playable map
  • Fixed several areas where players could fall through the world
  • Fixed several areas where players could vault into water. Don’t go swimming with all that gear, agents!
  • Fixed several areas with missing climb prompts
  • Fixed several areas where the player could become stuck in the open world
  • Fixed several areas where the players could become stuck in missions
  • Fixed several world objects with missing cover prompts
 
Special Field Research
  • Fixed Special Field Research objective “Complete 5 Public Executions with Marksman Rifle” not progressing under certain circumstances
  • Fixed the Specialization adventure progression circle to be consistent with other progression circles
 
Commendations
  • Fixed “Resource Distribution Merit” not progressing correctly
  • Fixed “Calibration Award” not unlocking not progressing correctly
  • Fixed “Prone Target Award” not progressing correctly.
 
Loadouts
  • Fixed an issue causing loadouts using the same skill to revert all affected loadouts to the same skill mod
 
UI
  • Fixed the Conflict UI being misaligned when using Dual Monitors and the Offset UI option
 
NPC
  • NPCs no longer double heal their armor
  • Players can now damage NPCs rappelling on ropes with explosives
  • Fixed an error during the calculation of weakpoint kill stats
  • Players can no longer easily pass through Black Tusk Warhounds
  • Control point officers no longer instantly revive players if the player has just used the Chem Launcher
  • Outcasts suicide rushers now blow themselves up closer to their target
  • Fixed abnormal NPC behaviour when suppressed outside of the players view
 
Dark Zone
  • Fixed an issue where agents at Dark Zone level 50 do not lose XP when killed as a rogue agent.
  • Fixed an issue where the Black Tusk medic’s drones would self-destruct in the Dark Zones
  • Fixed an issue where the player was unable to cut the rope at an extraction if the “Sleight of Hand” perk was active.
 
Specialization
  • Fixed an issue where killing wildlife would yield signature weapon ammo.
  • Fixed an issue where signature weapon ammo could drop mid-air
 
Cosmetics
  • Fixed a clipping issue with the Gunner Uniform when equipped on a female character
 
Connectivity
  • Fixed an issue relating to interacting with ECHO’s when in a group
  • Fixed several occurrences of Delta errors when interacting with world objects
 
Performance
  • Fixed performance drops when browsing player inventory on Xbox One
  • Fixed performance drops when opening the Ubisoft Club Challenge tab on PC
 
Audio
  • Fixed an issue causing NPC weapon audio to be stuck in a loop under certain circumstances
  • Fixed an issue causing missing weapon audio when firing immediately after having switched from a grenade
 
Other
  • Fixed an issue causing older versions of the Tobii Eye Tracker to be unresponsive
  • Fixed an issue causing the “Aim at Gaze” option for the Tobii Eye Tracker to be inaccurate
  • Fixed an issue with the Motion Sickness mode causing the player’s FOV to change drastically when enabled
  • Fixed an issue where players incorrectly could vote kick a member during a boss fight in the Roosevelt Island stronghold on challenging difficulty
Source
submitted by JokerUnique to thedivision [link] [comments]

Part 2: Tools & Info for Sysadmins - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments or suggestions.
u/crispyducks
submitted by crispyducks to sysadmin [link] [comments]

Tools & Info for MSPs #2 - Mega List of Tips, Tools, Books, Blogs & More

(continued from part #1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
Fyi - I've set up a subreddit /itprotuesday, where we feature / encourage posts of some additional tools, tips etc. throughout the week. Pop over and subscribe if you’re interested.
submitted by crispyducks to msp [link] [comments]

IT Pro Tuesday #64 (part 2) - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Captura is a flexible tool for capturing your screen, audio, cursor, mouse clicks and keystrokes. Features include mixing audio recorded from microphone and speaker output, command-line interface, and configurable hotkeys. Thanks to jantari for the recommedation.
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
submitted by crispyducks to ITProTuesday [link] [comments]

The Best Binary Options Signal Providers for 2020 Review Top 5 Free Binary Options Live Signals Providers iq option signal : FREE SIGNAL provider for binary options ... NEW 100% WIN BINARY OPTION FREE TRADING SIGNALS - YouTube Best Binary Options Signals Provider (Free & Premium ... Trading Julian's Blues forBinary Options Signals and Forex Signals FREE SIGNALS SERVICE PROVIDER For Binary Options & Tips to maximize signal accuracy

These day many top companies providing binary options signals free trial for some days but that not accurate. Binary option signal indicators. There are many forex indicators that provide you accurate almost 90% good signals but not for all trader know how to work with binary option indicators. For best binary signals you must try 1st himself learn before going to any paid service wityh any ... All Binary Options Signals Reviews. This list includes every single binary options signal provider I’ve ever reviewed. If you think I missed a company, make sure to email me and I’ll make a new review. There are likely a few of these services you feel qualify for best binary options signals status, and I welcome your feedback on which those ... This is where binary options signals become a very powerful tool for savvy investors who want to increase their likelihood of success with binary options trading. Simply put: you don’t want to leave any investment decision to chance. Every decision you make should be backed by sound data and analysis. This subtly transforms options trading from gambling, to investing. Free Signals for Binary Options. In order to work on binary markets, it is not necessary to waste time on forecasting or market analysis, as binary options has its own strategy and macroeconomic indicators. Now, there are specialized services, called binary options signals, that collect all of the factors that may affect the price movement. Binary options signals are alerts that are used to trade binary options contracts, which have been derived after analysis of the underlying asset to be traded. When compared with its forex counterparts, binary signals are still at an early stage. But as the number of traders increases, and newer software applications and tools are developed, we will begin to see increased usage of signals for ... Binary Options Signals Providers Updated List Option Robot App : #No.1 – Offers Free Demo Account ! The Option Robot basically gives traders the ability to set the system using the style which they want it to trade in. This software was not meant to trade in a haphazard way. That’s also part of the reason why we are saying that this Option Robot review system is not a scam. We’ve tested ... Risk Disclaimer : Forex, Forex signals, Stocks, Options, Binary options, and Future trading can have large potential rewards, but also has large potential risks. You must be aware of the risks and be willing to accept them in order to invest in the stock, binary or futures markets. Don’t trade with any capital you can’t afford to lose especially with leveraged instruments such as Forex ...

[index] [14595] [3571] [18174] [16656] [43] [14314] [8395] [10324] [16083] [8276]

The Best Binary Options Signal Providers for 2020

Free Binary Options Signals Providers Binary Option Signals Free Binary Signals Provider #MakeMoneyFromHome #StockTradingTips #FastMoneyOnline Check our channel about real estate investments ... Our Website Link: https://bit.ly/32uSL9t - Best Binary Options Signals Provider (Free & Premium Fundamentals Explained There might be less possible for earni... Trade amazing Binary Options Signals and Forex Signals with Franco on live stream. You will learn; You will learn; Binary Options Trading Signals and The Ways To Enlarge The Profits The Best Binary Options Signal Providers is Auto Binary Signals 2020, get it now: http://bit.ly/1U3XkPq Popular Binary Options Brokers for 2020 To start with... More Strategies & Signals, on my twiter !!! FREE SIGNALS SERVICE PROVIDER For Binary Options & Tips to maximize signal accuracy binary options 2017, iq option, iq option strategy 2017, iq option ... Do not miss! DEMO ACCOUNT: https://bit.ly/2Lq3NUt You can use this strategy in binary options to win every time but you have to keep following things in mind... More Strategies & Signals, please visit my twitter !!! iq option signal : FREE SIGNAL provider for binary options trading binary options 2017, iq option, iq ...

http://binaryoptiontrade.diecrypab.tk